City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.103.0.0 - 14.103.255.255'
% Abuse contact for '14.103.0.0 - 14.103.255.255' is 'gnoc@bytedance.com'
inetnum: 14.103.0.0 - 14.103.255.255
netname: VOLCANO-ENGINE
descr: Beijing Volcano Engine Technology Co., Ltd.
descr: 1309, 13/F, Building 4, Zijin Digital Park, Haidian District, Beijing
country: CN
admin-c: YW7147-AP
tech-c: JS4370-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
mnt-irt: IRT-VOLCANO-ENGINE-CN
last-modified: 2022-05-19T06:54:29Z
source: APNIC
irt: IRT-VOLCANO-ENGINE-CN
address: 1309, 13/F, Building 4, Zijin Digital Park, Haidian District, Beijing
e-mail: gnoc@bytedance.com
abuse-mailbox: gnoc@bytedance.com
admin-c: YW7147-AP
tech-c: JS4370-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:36:04Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Liu Nian
address: 1309, 13/F, Building 4, Zijin Digital Park, Haidian District, Beijing
country: CN
phone: +86-10-13810123695
e-mail: zhangzhaoyang.1@bytedance.com
nic-hdl: JS4370-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-01-06T01:34:46Z
source: APNIC
person: Chen Qi
address: 1309, 13/F, Building 4, Zijin Digital Park, Haidian District, Beijing
country: CN
phone: +86-10-13051468788
e-mail: gnoc@bytedance.com
nic-hdl: YW7147-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-01-06T01:34:08Z
source: APNIC
% Information related to '14.103.111.0/24AS137718'
route: 14.103.111.0/24
origin: AS137718
descr: China Internet Network Information Center
Floor1, Building No.1 C/-Chinese Academy of Sciences
4, South 4th Street
Haidian District,
mnt-by: MAINT-CNNIC-AP
last-modified: 2023-07-10T07:15:25Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.103.111.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.103.111.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025113001 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 01 08:00:13 CST 2025
;; MSG SIZE rcvd: 107
Host 172.111.103.14.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 172.111.103.14.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 223.223.194.101 | attack | SSH BruteForce Attack |
2020-08-08 20:07:46 |
| 80.95.89.145 | attackbots | Unauthorized connection attempt detected from IP address 80.95.89.145 to port 22 |
2020-08-08 20:14:53 |
| 98.165.128.190 | attackspam | Aug 8 05:31:07 www sshd[13435]: Invalid user admin from 98.165.128.190 Aug 8 05:31:09 www sshd[13435]: Failed password for invalid user admin from 98.165.128.190 port 37328 ssh2 Aug 8 05:31:10 www sshd[13439]: Invalid user admin from 98.165.128.190 Aug 8 05:31:13 www sshd[13439]: Failed password for invalid user admin from 98.165.128.190 port 37383 ssh2 Aug 8 05:31:14 www sshd[13441]: Invalid user admin from 98.165.128.190 Aug 8 05:31:16 www sshd[13441]: Failed password for invalid user admin from 98.165.128.190 port 37418 ssh2 Aug 8 05:31:18 www sshd[13451]: Invalid user admin from 98.165.128.190 Aug 8 05:31:20 www sshd[13451]: Failed password for invalid user admin from 98.165.128.190 port 37603 ssh2 Aug 8 05:31:21 www sshd[13457]: Invalid user admin from 98.165.128.190 Aug 8 05:31:24 www sshd[13457]: Failed password for invalid user admin from 98.165.128.190 port 37645 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=98.165.128.190 |
2020-08-08 20:17:08 |
| 68.183.83.38 | attack | Aug 8 11:52:17 lnxweb61 sshd[4543]: Failed password for root from 68.183.83.38 port 35152 ssh2 Aug 8 11:52:17 lnxweb61 sshd[4543]: Failed password for root from 68.183.83.38 port 35152 ssh2 |
2020-08-08 19:54:25 |
| 212.129.52.198 | attackbots | Website login hacking attempts. |
2020-08-08 20:01:45 |
| 66.45.251.150 | attack | TCP ports : 5500 / 5501 / 60001 |
2020-08-08 20:04:15 |
| 80.82.77.4 | attackspambots | firewall-block, port(s): 12111/udp, 32768/udp, 32771/udp, 49153/udp |
2020-08-08 20:12:46 |
| 36.37.177.73 | attackbots | Unauthorized IMAP connection attempt |
2020-08-08 20:10:48 |
| 185.234.218.85 | attack | Jul 22 07:48:42 mail postfix/smtpd[32695]: warning: unknown[185.234.218.85]: SASL LOGIN authentication failed: authentication failure |
2020-08-08 19:41:56 |
| 216.83.45.154 | attackspambots | SSH Brute Force |
2020-08-08 20:12:04 |
| 60.169.209.67 | attackbots | Unauthorized IMAP connection attempt |
2020-08-08 19:45:43 |
| 222.186.173.201 | attackspam | [MK-VM2] SSH login failed |
2020-08-08 19:59:26 |
| 106.250.131.11 | attack | Aug 8 15:57:54 webhost01 sshd[11505]: Failed password for root from 106.250.131.11 port 34028 ssh2 ... |
2020-08-08 19:52:41 |
| 117.50.107.175 | attack | Aug 8 05:44:35 vmd17057 sshd[11220]: Failed password for root from 117.50.107.175 port 55092 ssh2 ... |
2020-08-08 19:45:01 |
| 185.234.216.63 | attack | Jul 22 07:46:32 mail postfix/smtpd[32700]: warning: unknown[185.234.216.63]: SASL LOGIN authentication failed: authentication failure |
2020-08-08 19:50:09 |