City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '125.40.0.0 - 125.47.255.255'
% Abuse contact for '125.40.0.0 - 125.47.255.255' is 'zhaoyz3@chinaunicom.cn'
inetnum: 125.40.0.0 - 125.47.255.255
netname: UNICOM-HA
descr: China Unicom Henan province network
descr: China Unicom
country: CN
admin-c: CH1302-AP
tech-c: WW444-AP
abuse-c: AC1718-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-CNCGROUP-HA
mnt-routes: MAINT-CNCGROUP-RR
mnt-irt: IRT-CU-CN
last-modified: 2023-10-21T03:35:34Z
source: APNIC
irt: IRT-CU-CN
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
e-mail: zhaoyz3@chinaunicom.cn
abuse-mailbox: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
auth: # Filtered
remarks: zhaoyz3@chinaunicom.cn was validated on 2026-05-08
mnt-by: MAINT-CNCGROUP
last-modified: 2026-05-09T04:50:16Z
source: APNIC
role: ABUSE CUCN
country: ZZ
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
phone: +000000000
e-mail: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
nic-hdl: AC1718-AP
remarks: Generated from irt object IRT-CU-CN
remarks: zhaoyz3@chinaunicom.cn was validated on 2026-05-08
abuse-mailbox: zhaoyz3@chinaunicom.cn
mnt-by: APNIC-ABUSE
last-modified: 2026-05-08T01:31:32Z
source: APNIC
person: ChinaUnicom Hostmaster
nic-hdl: CH1302-AP
e-mail: hqs-ipabuse@chinaunicom.cn
address: No.21,Jin-Rong Street
address: Beijing,100033
address: P.R.China
phone: +86-10-66259764
fax-no: +86-10-66259764
country: CN
mnt-by: MAINT-CNCGROUP
last-modified: 2017-08-17T06:13:16Z
source: APNIC
person: Wei Wang
nic-hdl: WW444-AP
e-mail: abuse@public.zz.ha.cn
address: #55 San Quan Road, Zhengzhou, Henan Provice
phone: +86-371-65952358
fax-no: +86-371-65968952
country: CN
mnt-by: MAINT-CNCGROUP-HA
last-modified: 2010-03-05T08:20:01Z
source: APNIC
% Information related to '125.40.0.0/13AS4837'
route: 125.40.0.0/13
descr: CNC Group CHINA169 Henan Province Network
country: CN
origin: AS4837
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2008-09-04T07:54:43Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.42.117.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;125.42.117.250. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 23:02:10 CST 2026
;; MSG SIZE rcvd: 107
250.117.42.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
250.117.42.125.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 63.80.189.138 | attack | Autoban 63.80.189.138 AUTH/CONNECT |
2019-12-13 01:59:54 |
| 183.111.227.199 | attackbotsspam | Triggered by Fail2Ban at Vostok web server |
2019-12-13 01:26:37 |
| 63.80.189.137 | attackbots | Autoban 63.80.189.137 AUTH/CONNECT |
2019-12-13 02:00:22 |
| 172.245.179.210 | attackbots | 445/tcp [2019-12-12]1pkt |
2019-12-13 01:39:57 |
| 80.211.189.181 | attackbotsspam | Dec 12 14:30:07 pi sshd\[13321\]: Failed password for invalid user galliena from 80.211.189.181 port 33564 ssh2 Dec 12 14:35:57 pi sshd\[13630\]: Invalid user dasusr1 from 80.211.189.181 port 41534 Dec 12 14:35:57 pi sshd\[13630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.189.181 Dec 12 14:35:59 pi sshd\[13630\]: Failed password for invalid user dasusr1 from 80.211.189.181 port 41534 ssh2 Dec 12 14:41:49 pi sshd\[14047\]: Invalid user gerold from 80.211.189.181 port 49652 ... |
2019-12-13 01:50:44 |
| 181.129.182.3 | attack | Dec 12 17:39:42 web8 sshd\[3266\]: Invalid user detleff from 181.129.182.3 Dec 12 17:39:42 web8 sshd\[3266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.182.3 Dec 12 17:39:44 web8 sshd\[3266\]: Failed password for invalid user detleff from 181.129.182.3 port 52360 ssh2 Dec 12 17:46:25 web8 sshd\[6389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.182.3 user=root Dec 12 17:46:27 web8 sshd\[6389\]: Failed password for root from 181.129.182.3 port 52204 ssh2 |
2019-12-13 02:00:49 |
| 62.168.92.206 | attackspambots | Dec 12 17:30:42 localhost sshd\[107770\]: Invalid user claudio123 from 62.168.92.206 port 49730 Dec 12 17:30:42 localhost sshd\[107770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.168.92.206 Dec 12 17:30:43 localhost sshd\[107770\]: Failed password for invalid user claudio123 from 62.168.92.206 port 49730 ssh2 Dec 12 17:43:19 localhost sshd\[108204\]: Invalid user shen from 62.168.92.206 port 52854 Dec 12 17:43:19 localhost sshd\[108204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.168.92.206 ... |
2019-12-13 01:49:46 |
| 63.80.189.191 | attackbots | Autoban 63.80.189.191 AUTH/CONNECT |
2019-12-13 01:23:57 |
| 221.195.1.201 | attack | Dec 12 18:09:03 [host] sshd[23797]: Invalid user smuda from 221.195.1.201 Dec 12 18:09:03 [host] sshd[23797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.1.201 Dec 12 18:09:05 [host] sshd[23797]: Failed password for invalid user smuda from 221.195.1.201 port 57626 ssh2 |
2019-12-13 01:31:10 |
| 63.80.189.144 | attackbotsspam | Autoban 63.80.189.144 AUTH/CONNECT |
2019-12-13 01:54:59 |
| 201.137.255.14 | attackspambots | 445/tcp 445/tcp [2019-12-12]2pkt |
2019-12-13 01:56:09 |
| 63.80.189.166 | attackspambots | Autoban 63.80.189.166 AUTH/CONNECT |
2019-12-13 01:38:26 |
| 63.80.189.152 | attack | Autoban 63.80.189.152 AUTH/CONNECT |
2019-12-13 01:49:18 |
| 49.88.112.73 | attack | Dec 12 16:14:01 pi sshd\[18752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73 user=root Dec 12 16:14:03 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:14:07 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:14:10 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:45:37 pi sshd\[20191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73 user=root ... |
2019-12-13 01:30:41 |
| 63.80.189.184 | attackbots | Autoban 63.80.189.184 AUTH/CONNECT |
2019-12-13 01:27:37 |