City: Shenzhen
Region: Guangdong
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.208.0.0 - 14.223.255.255'
% Abuse contact for '14.208.0.0 - 14.223.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 14.208.0.0 - 14.223.255.255
netname: CHINANET-GD
descr: CHINANET Guangdong province network
descr: Data Communication Division
descr: China Telecom
country: CN
admin-c: CH93-AP
tech-c: IC83-AP
abuse-c: AC1573-AP
status: ALLOCATED PORTABLE
remarks: service provider
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
notify: abuse_gdnoc@189.cn
mnt-by: APNIC-HM
mnt-lower: MAINT-CHINANET-GD
mnt-irt: IRT-CHINANET-CN
last-modified: 2021-06-15T08:06:06Z
source: APNIC
irt: IRT-CHINANET-CN
address: No.31 ,jingrong street,beijing
address: 100032
e-mail: anti-spam@chinatelecom.cn
abuse-mailbox: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
auth: # Filtered
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by: MAINT-CHINANET
last-modified: 2026-03-13T07:12:20Z
source: APNIC
role: ABUSE CHINANETCN
country: ZZ
address: No.31 ,jingrong street,beijing
address: 100032
phone: +000000000
e-mail: anti-spam@chinatelecom.cn
admin-c: CH93-AP
tech-c: CH93-AP
nic-hdl: AC1573-AP
remarks: Generated from irt object IRT-CHINANET-CN
remarks: anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox: anti-spam@chinatelecom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T14:15:15Z
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@chinatelecom.cn
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
mnt-by: MAINT-CHINANET
last-modified: 2022-02-28T06:53:44Z
source: APNIC
person: IPMASTER CHINANET-GD
nic-hdl: IC83-AP
e-mail: abuse_gdicnoc@163.com
address: NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone: +86-20-87189274
fax-no: +86-20-87189274
country: CN
mnt-by: MAINT-CHINANET-GD
remarks: IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox: abuse_gdicnoc@163.com
last-modified: 2021-05-12T09:06:58Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.220.188.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.220.188.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 21:32:02 CST 2026
;; MSG SIZE rcvd: 106
Host 66.188.220.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.188.220.14.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.245.227.165 | attackbotsspam | Aug 2 14:17:50 PorscheCustomer sshd[21934]: Failed password for root from 157.245.227.165 port 45048 ssh2 Aug 2 14:22:03 PorscheCustomer sshd[22021]: Failed password for root from 157.245.227.165 port 57644 ssh2 ... |
2020-08-03 02:29:35 |
| 139.59.71.74 | attack | Aug 2 08:30:16 ny01 sshd[28663]: Failed password for root from 139.59.71.74 port 36544 ssh2 Aug 2 08:31:30 ny01 sshd[28833]: Failed password for root from 139.59.71.74 port 52436 ssh2 |
2020-08-03 02:11:34 |
| 208.66.193.8 | attackbots | Brute-force attempt banned |
2020-08-03 02:41:55 |
| 59.126.118.91 | attack | Port probing on unauthorized port 23 |
2020-08-03 02:14:02 |
| 171.235.74.244 | attack | 1596369979 - 08/02/2020 14:06:19 Host: 171.235.74.244/171.235.74.244 Port: 445 TCP Blocked |
2020-08-03 02:14:30 |
| 206.189.123.250 | attackbotsspam | Aug 2 14:06:13 mail sshd[2324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.123.250 user=root Aug 2 14:06:15 mail sshd[2324]: Failed password for root from 206.189.123.250 port 42898 ssh2 ... |
2020-08-03 02:16:44 |
| 112.170.98.216 | attack | 2020-08-02T23:54:20.233535luisaranguren sshd[801570]: Connection from 112.170.98.216 port 48268 on 10.10.10.6 port 22 rdomain "" 2020-08-02T23:54:21.669984luisaranguren sshd[801570]: Invalid user pi from 112.170.98.216 port 48268 ... |
2020-08-03 02:34:31 |
| 114.29.227.140 | attackbots | 1596369940 - 08/02/2020 14:05:40 Host: 114.29.227.140/114.29.227.140 Port: 445 TCP Blocked |
2020-08-03 02:37:31 |
| 180.242.183.200 | attackbotsspam | 1596369941 - 08/02/2020 14:05:41 Host: 180.242.183.200/180.242.183.200 Port: 445 TCP Blocked |
2020-08-03 02:35:11 |
| 78.164.213.131 | attackbots | Automatic report - Port Scan Attack |
2020-08-03 02:23:52 |
| 2001:41d0:1:a437::1 | attackspambots | 20 attempts against mh-misbehave-ban on cedar |
2020-08-03 02:41:25 |
| 37.139.103.193 | attack | Aug 2 14:06:14 choloepus sshd[27219]: Invalid user admina from 37.139.103.193 port 52142 Aug 2 14:06:14 choloepus sshd[27219]: Invalid user admina from 37.139.103.193 port 52142 Aug 2 14:06:14 choloepus sshd[27219]: Connection closed by invalid user admina 37.139.103.193 port 52142 [preauth] ... |
2020-08-03 02:19:35 |
| 89.248.172.85 | attack | 08/02/2020-13:51:22.554804 89.248.172.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-08-03 02:36:12 |
| 142.93.122.207 | attackspam | WordPress wp-login brute force :: 142.93.122.207 0.068 BYPASS [02/Aug/2020:17:12:40 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2003 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-03 02:48:18 |
| 79.153.248.238 | attackbotsspam | 20 attempts against mh-ssh on thorn |
2020-08-03 02:18:34 |