City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.129.136.0 - 150.129.139.255'
% Abuse contact for '150.129.136.0 - 150.129.139.255' is 'zhuanglei@erenb.cn'
inetnum: 150.129.136.0 - 150.129.139.255
netname: ERENB-NET
descr: TianJin ERENB Technology Development Co.,Ltd.
descr: 218 Room, 2F,No.56,DingZiGu NO.1 Road,Tianjin
country: CN
admin-c: ZM835-AP
tech-c: ZM836-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-ERENB-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNCGROUP-RR
last-modified: 2023-11-28T00:57:07Z
source: APNIC
irt: IRT-ERENB-NET-CN
address: Room 1302, Block A, HaiHeHuaDing Building, No.1 ZhangZiZhong Road, Hongqiao District, Tianjin
e-mail: zhuanglei@erenb.cn
abuse-mailbox: zhuanglei@erenb.cn
admin-c: ZM835-AP
tech-c: ZM835-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:07Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Sheng Wu
address: 218 Room, 2F,No.56,DingZiGu NO.1 Road,Tianjin
country: CN
phone: +86-022- 58311234
e-mail: ip@erenb.com
nic-hdl: ZM835-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2013-04-25T01:42:02Z
source: APNIC
person: Lei Zhuang
address: 218 Room, 2F,No.56,DingZiGu NO.1 Road,Tianjin
country: CN
phone: +86-022- 58311234
e-mail: root@zhuanglei.com
nic-hdl: ZM836-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2013-04-25T01:42:02Z
source: APNIC
% Information related to '150.129.136.0/22AS4837'
route: 150.129.136.0/22
descr: China Unicom CHINA169 Network
origin: AS4837
mnt-by: MAINT-CHINAGBN-AP
country: CN
last-modified: 2018-01-18T01:49:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.129.137.251
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.129.137.251. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031501 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 06:00:35 CST 2026
;; MSG SIZE rcvd: 108
b'Host 251.137.129.150.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 150.129.137.251.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 52.36.22.172 | attackspambots | 52.36.22.172 - - [10/May/2020:22:30:03 +0200] "GET /0.1.1.sql |
2020-05-11 07:07:26 |
| 41.249.211.242 | attackspambots | SSH Brute Force |
2020-05-11 07:23:58 |
| 220.143.93.134 | attackspam | Port probing on unauthorized port 9000 |
2020-05-11 07:13:35 |
| 121.69.44.6 | attackbotsspam | Invalid user auditor from 121.69.44.6 port 51542 |
2020-05-11 07:20:44 |
| 200.84.58.195 | attackspambots | Automatic report - SSH Brute-Force Attack |
2020-05-11 07:01:17 |
| 193.32.126.162 | attackspambots | $f2bV_matches |
2020-05-11 07:04:23 |
| 213.32.67.160 | attackbots | SSH Brute Force |
2020-05-11 07:25:59 |
| 80.232.252.82 | attack | 2020-05-10 22:34:20,745 fail2ban.actions: WARNING [ssh] Ban 80.232.252.82 |
2020-05-11 07:13:03 |
| 203.75.181.53 | attackspambots | SSH Brute Force |
2020-05-11 07:26:53 |
| 27.71.83.54 | attackbotsspam | SSH Brute Force |
2020-05-11 07:24:53 |
| 113.125.120.149 | attack | Invalid user oracle4 from 113.125.120.149 port 36378 |
2020-05-11 07:21:33 |
| 152.32.186.160 | attackspam | May 8 09:50:20 sd1 sshd[8252]: Invalid user bamboo from 152.32.186.160 May 8 09:50:20 sd1 sshd[8252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.186.160 May 8 09:50:22 sd1 sshd[8252]: Failed password for invalid user bamboo from 152.32.186.160 port 55254 ssh2 May 8 10:01:38 sd1 sshd[8572]: Invalid user admin from 152.32.186.160 May 8 10:01:38 sd1 sshd[8572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.186.160 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=152.32.186.160 |
2020-05-11 07:33:25 |
| 192.144.161.16 | attack | May 10 23:29:44 ns381471 sshd[29641]: Failed password for root from 192.144.161.16 port 45584 ssh2 |
2020-05-11 07:28:21 |
| 180.76.146.60 | attackbotsspam | SSH Brute Force |
2020-05-11 07:30:27 |
| 114.67.102.54 | attackspam | Triggered by Fail2Ban at Ares web server |
2020-05-11 07:15:27 |