City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.204.0.0 - 14.205.255.255'
% Abuse contact for '14.204.0.0 - 14.205.255.255' is 'zhaoyz3@chinaunicom.cn'
inetnum: 14.204.0.0 - 14.205.255.255
netname: UNICOM-YN
descr: UNICOM yunnan Province Network
descr: China Unicom
descr: No.21, Jin-Rong Street
descr: Beijing 100033
country: CN
admin-c: CH1302-AP
tech-c: JH1190-AP
abuse-c: AC1718-AP
status: ALLOCATED PORTABLE
remarks: service provider
mnt-by: APNIC-HM
mnt-lower: MAINT-CNCGROUP-YN
mnt-routes: MAINT-CNCGROUP-RR
mnt-irt: IRT-CU-CN
last-modified: 2025-01-22T13:10:29Z
source: APNIC
irt: IRT-CU-CN
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
e-mail: zhaoyz3@chinaunicom.cn
abuse-mailbox: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
auth: # Filtered
remarks: zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by: MAINT-CNCGROUP
last-modified: 2025-11-18T00:26:20Z
source: APNIC
role: ABUSE CUCN
country: ZZ
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
phone: +000000000
e-mail: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
nic-hdl: AC1718-AP
remarks: Generated from irt object IRT-CU-CN
remarks: zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox: zhaoyz3@chinaunicom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-10-17T02:26:56Z
source: APNIC
person: ChinaUnicom Hostmaster
nic-hdl: CH1302-AP
e-mail: hqs-ipabuse@chinaunicom.cn
address: No.21,Jin-Rong Street
address: Beijing,100033
address: P.R.China
phone: +86-10-66259764
fax-no: +86-10-66259764
country: CN
mnt-by: MAINT-CNCGROUP
last-modified: 2017-08-17T06:13:16Z
source: APNIC
person: JinLong He
nic-hdl: JH1190-AP
e-mail: hjl@yncnc.net
address: Add: 29/F,Stock Building , 62 Chuncheng Road, Kunming, Yunnan P.R.C.
phone: +86-0871-8880103
fax-no: +86-0871-8881300
country: cn
mnt-by: MAINT-CNCGROUP-YN
last-modified: 2008-09-04T07:46:25Z
source: APNIC
% Information related to '14.204.0.0/15AS4837'
route: 14.204.0.0/15
descr: China Unicom Yunnan Province Network
country: CN
origin: AS4837
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2010-09-26T02:26:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.205.104.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32828
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.205.104.200. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 04:30:29 CST 2025
;; MSG SIZE rcvd: 107
Host 200.104.205.14.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 200.104.205.14.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.33.67.94 | attack | Honeypot attack, port: 4567, PTR: host-41.33.67.94.tedata.net. |
2020-02-14 17:46:52 |
| 219.141.184.178 | attack | Typical blackmail attempt. But instead of the usual "I have a video of you where you visit sex sites", now a new variant. "You mess around with other women and I get your messages from it." And then the usual: The deal is next. You make a donation of $ 950 worth in Bit Coln value. Otherwise, well ... your secret will not be a secret anymore. I created a special archive with some materials for your wife that will be delivered if I don`t get my donation. It took me some time to accumulate enough information. Whoever falls for such shit is to blame. And by the way, if the idiot blackmailer reads this ... I'm not married at all. The blackmail comes via a chinese server again: 183.60.83.19#53(183.60.83.19) |
2020-02-14 17:48:35 |
| 199.249.230.89 | attackbots | Automatic report - Banned IP Access |
2020-02-14 17:29:37 |
| 211.199.160.119 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-14 17:48:35 |
| 138.197.113.240 | attackbotsspam | Feb 14 08:29:06 lnxmysql61 sshd[31869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.113.240 |
2020-02-14 17:12:12 |
| 92.118.37.86 | attack | Feb 14 10:30:18 debian-2gb-nbg1-2 kernel: \[3931843.978539\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=57590 PROTO=TCP SPT=55440 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-14 17:46:17 |
| 177.105.224.186 | attack | port scan and connect, tcp 80 (http) |
2020-02-14 17:42:07 |
| 2.187.97.160 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-14 17:27:53 |
| 200.251.23.6 | attack | Feb 14 07:57:39 plex sshd[2759]: Invalid user colord from 200.251.23.6 port 37644 |
2020-02-14 17:20:14 |
| 104.168.236.53 | attackbotsspam | Feb 14 08:19:57 dedicated sshd[25985]: Invalid user rabbitmq from 104.168.236.53 port 37252 |
2020-02-14 17:39:51 |
| 118.71.7.111 | attackspam | 1581656062 - 02/14/2020 05:54:22 Host: 118.71.7.111/118.71.7.111 Port: 445 TCP Blocked |
2020-02-14 17:26:24 |
| 119.237.21.126 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 17:31:14 |
| 60.248.127.85 | attack | Port probing on unauthorized port 37215 |
2020-02-14 17:10:54 |
| 69.229.6.11 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-02-14 17:17:43 |
| 103.87.153.78 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-14 17:51:14 |