Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
proxynormal
国家超导实验室
2025-08-28 13:13:03
proxynormal
国家超导实验室
2025-08-28 13:12:22
normal
国家超导实验室
2025-08-28 13:11:11
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       159.226.0.0 - 159.226.255.255
CIDR:           159.226.0.0/16
NetName:        APNIC-ERX-159-226-0-0
NetHandle:      NET-159-226-0-0-1
Parent:         NET159 (NET-159-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2003-10-29
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/159.226.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '159.226.0.0 - 159.226.255.255'

% Abuse contact for '159.226.0.0 - 159.226.255.255' is 'abuse-ip@cstnet.cn'

inetnum:        159.226.0.0 - 159.226.255.255
netname:        CSTNET-CN
descr:          Computer Network Information Center of Chinese Academy of Sciences (CNIC-CAS)
country:        CN
org:            ORG-CA107-AP
admin-c:        CNIC1-AP
tech-c:         CNIC1-AP
abuse-c:        AC2741-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CSTNET-CN
mnt-routes:     MAINT-CSTNET-CN
mnt-irt:        IRT-CSTNET-CN
last-modified:  2023-09-29T13:07:48Z
source:         APNIC

irt:            IRT-CSTNET-CN
address:        2 Dongsheng South Road, Haidian District, Beijing Beijing 100190
e-mail:         abuse-ip@cstnet.cn
abuse-mailbox:  abuse-ip@cstnet.cn
admin-c:        CNIC1-AP
tech-c:         CNIC1-AP
auth:           # Filtered
remarks:        abuse-ip@cstnet.cn was validated on 2025-07-25
mnt-by:         MAINT-CSTNET-CN
last-modified:  2025-07-25T01:16:40Z
source:         APNIC

organisation:   ORG-CA107-AP
org-name:       CNIC-CAS
org-type:       LIR
country:        CN
address:        2 Dongsheng South Road, Haidian District
phone:          +86.10.58812266
e-mail:         support@cnic.cn
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:50Z
source:         APNIC

role:           ABUSE CSTNETCN
country:        ZZ
address:        2 Dongsheng South Road, Haidian District, Beijing Beijing 100190
phone:          +000000000
e-mail:         abuse-ip@cstnet.cn
admin-c:        CNIC1-AP
tech-c:         CNIC1-AP
nic-hdl:        AC2741-AP
remarks:        Generated from irt object IRT-CSTNET-CN
remarks:        abuse-ip@cstnet.cn was validated on 2025-07-25
abuse-mailbox:  abuse-ip@cstnet.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-25T01:16:46Z
source:         APNIC

role:           Computer Network Information Center of Chinese Academy of Sciences administrator
address:        2 Dongsheng South Road, Haidian District, Beijing Beijing 100190
country:        CN
phone:          +86.10.58812266
e-mail:         supervise@cnic.cn
admin-c:        CNIC1-AP
tech-c:         CNIC1-AP
nic-hdl:        CNIC1-AP
mnt-by:         MAINT-CNICOCAOS-CN
last-modified:  2022-05-12T07:31:01Z
source:         APNIC

% Information related to '159.226.0.0/16AS7497'

route:          159.226.0.0/16
descr:          CSTNET's IP
country:        CN
origin:         AS7497
remarks:        Please contact ip-noc@cstnet.cn if you have any
remarks:        Questions regarding this object.
notify:         ip-noc@cstnet.cn
mnt-by:         MAINT-CSTNET-CN
last-modified:  2023-10-19T06:19:12Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.226.45.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.226.45.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 28 13:10:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 60.45.226.159.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 60.45.226.159.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
98.234.172.27 attackspam
23/tcp 23/tcp
[2020-09-21/27]2pkt
2020-09-28 16:39:08
115.84.87.215 attackbots
1601239034 - 09/27/2020 22:37:14 Host: 115.84.87.215/115.84.87.215 Port: 445 TCP Blocked
2020-09-28 16:08:53
27.73.59.126 attack
Sep 27 23:56:03 mail1 sshd[16494]: Did not receive identification string from 27.73.59.126 port 56185
Sep 27 23:56:11 mail1 sshd[16495]: Invalid user noc from 27.73.59.126 port 57320
Sep 27 23:56:11 mail1 sshd[16495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.73.59.126
Sep 27 23:56:13 mail1 sshd[16495]: Failed password for invalid user noc from 27.73.59.126 port 57320 ssh2
Sep 27 23:56:13 mail1 sshd[16495]: Connection closed by 27.73.59.126 port 57320 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.73.59.126
2020-09-28 16:13:32
93.188.163.15 attack
20 attempts against mh-ssh on star
2020-09-28 16:35:34
103.97.63.5 attackbots
445/tcp 1433/tcp...
[2020-07-30/09-27]7pkt,2pt.(tcp)
2020-09-28 16:21:42
220.249.9.90 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2020-08-18/09-27]4pkt,1pt.(tcp)
2020-09-28 16:05:15
118.25.133.220 attackspambots
(sshd) Failed SSH login from 118.25.133.220 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 02:31:00 optimus sshd[15882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.220  user=root
Sep 28 02:31:02 optimus sshd[15882]: Failed password for root from 118.25.133.220 port 58586 ssh2
Sep 28 02:35:14 optimus sshd[17645]: Invalid user andy from 118.25.133.220
Sep 28 02:35:14 optimus sshd[17645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.220 
Sep 28 02:35:15 optimus sshd[17645]: Failed password for invalid user andy from 118.25.133.220 port 38884 ssh2
2020-09-28 16:08:34
42.179.201.9 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-08-27/09-27]5pkt,1pt.(tcp)
2020-09-28 16:01:48
106.53.232.38 attack
Sep 28 07:14:36 hell sshd[32064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.232.38
Sep 28 07:14:38 hell sshd[32064]: Failed password for invalid user mine from 106.53.232.38 port 50652 ssh2
...
2020-09-28 16:00:51
200.195.136.12 attack
Invalid user it from 200.195.136.12 port 8292
2020-09-28 16:15:48
104.206.128.14 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-28 16:29:52
46.101.248.180 attackspambots
46.101.248.180 (DE/Germany/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 28 02:04:01 server2 sshd[11302]: Failed password for root from 195.80.151.30 port 37227 ssh2
Sep 28 02:03:59 server2 sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.80.151.30  user=root
Sep 28 02:06:33 server2 sshd[12828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.248.180  user=root
Sep 28 02:05:01 server2 sshd[11835]: Failed password for root from 128.199.133.235 port 53506 ssh2
Sep 28 01:55:44 server2 sshd[6983]: Failed password for root from 185.220.102.241 port 12520 ssh2
Sep 28 02:04:59 server2 sshd[11835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.235  user=root

IP Addresses Blocked:

195.80.151.30 (US/United States/-)
2020-09-28 16:31:35
64.139.73.170 attack
Automatic Fail2ban report - Trying login SSH
2020-09-28 16:09:38
49.235.163.198 attackbots
Sep 28 03:26:01 ns3164893 sshd[4877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.163.198
Sep 28 03:26:04 ns3164893 sshd[4877]: Failed password for invalid user cactiuser from 49.235.163.198 port 49576 ssh2
...
2020-09-28 16:13:05
111.229.177.38 attackbotsspam
Sep 28 09:58:38 vps639187 sshd\[27924\]: Invalid user john from 111.229.177.38 port 40712
Sep 28 09:58:38 vps639187 sshd\[27924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.177.38
Sep 28 09:58:40 vps639187 sshd\[27924\]: Failed password for invalid user john from 111.229.177.38 port 40712 ssh2
...
2020-09-28 16:05:01

Recently Reported IPs

10.0.76.48 120.233.87.36 172.32.17.67 10.138.235.235
195.86.109.147 38.182.107.22 49.117.188.64 162.216.149.246
209.97.139.86 10.10.1.114 216.167.79.214 194.114.136.209
194.114.136.219 103.46.247.1 108.95.78.243 10.7.59.27
19.218.21.106 154.91.153.165 115.49.101.201 39.128.204.13