City: Foshan
Region: Guangdong
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.208.0.0 - 14.223.255.255'
% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 14.208.0.0 - 14.223.255.255
netname: CHINANET-GD
descr: CHINANET Guangdong province network
descr: Data Communication Division
descr: China Telecom
country: CN
admin-c: CH93-AP
tech-c: IC83-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: service provider
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
notify: abuse_gdnoc@189.cn
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-GD
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:06:06Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2026-03-13T07:12:20Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
person: IPMASTER CHINANET-GD
nic-hdl: IC83-AP
e-mail: abuse_gdicnoc@163.com
address: NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone: +86-20-87189274
fax-no: +86-20-87189274
country: CN
mnt-by: MAINT-CHINANET-GD
remarks: IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox: abuse_gdicnoc@163.com
last-modified: 2021-05-12T09:06:58Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.212.180.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.212.180.87. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 11:30:03 CST 2026
;; MSG SIZE rcvd: 106
Host 87.180.212.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 87.180.212.14.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 67.129.129.34 | attackbotsspam | Port Scan: UDP/137 |
2019-09-14 13:48:42 |
| 114.229.201.15 | attackspambots | Port Scan: TCP/23 |
2019-09-14 13:07:34 |
| 209.200.15.177 | attack | Port Scan: TCP/445 |
2019-09-14 13:56:11 |
| 209.136.113.246 | attackbots | Port Scan: UDP/137 |
2019-09-14 13:56:51 |
| 110.155.160.46 | attackspam | Port Scan: TCP/22 |
2019-09-14 13:42:52 |
| 211.43.207.58 | attack | Port Scan: TCP/445 |
2019-09-14 13:55:33 |
| 124.127.60.194 | attack | Port Scan: UDP/49153 |
2019-09-14 13:39:53 |
| 4.7.140.250 | attackbotsspam | Port Scan: UDP/137 |
2019-09-14 13:27:06 |
| 79.107.198.112 | attack | Port Scan: TCP/23 |
2019-09-14 13:14:04 |
| 107.144.4.146 | attackbots | Port Scan: UDP/137 |
2019-09-14 13:43:57 |
| 167.71.198.106 | attackspam | Port Scan: TCP/443 |
2019-09-14 13:00:55 |
| 114.235.203.197 | attackspambots | Port Scan: TCP/443 |
2019-09-14 13:42:29 |
| 119.28.62.90 | attackbots | Port Scan: TCP/445 |
2019-09-14 13:05:38 |
| 27.36.141.192 | attackbotsspam | Sep 14 00:00:35 nginx sshd[64188]: error: maximum authentication attempts exceeded for root from 27.36.141.192 port 34944 ssh2 [preauth] Sep 14 00:00:35 nginx sshd[64188]: Disconnecting: Too many authentication failures [preauth] |
2019-09-14 13:52:21 |
| 201.217.80.226 | attack | Port Scan: TCP/5555 |
2019-09-14 12:54:48 |