City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '211.158.0.0 - 211.158.255.255'
% Abuse contact for '211.158.0.0 - 211.158.255.255' is 'ipas@cnnic.cn'
inetnum: 211.158.0.0 - 211.158.255.255
netname: CQCNC
descr: CHONGQING CNC BROADBAND NETWORKS CO.,LTD
country: CN
admin-c: zy567-AP
tech-c: zy567-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
last-modified: 2021-06-16T01:26:44Z
source: APNIC
irt: IRT-CNNIC-CN
address: Beijing, China
e-mail: ipas@cnnic.cn
abuse-mailbox: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
auth: # Filtered
remarks: Please note that CNNIC is not an ISP and is not
remarks: empowered to investigate complaints of network abuse.
remarks: Please contact the tech-c or admin-c of the network.
remarks: ipas@cnnic.cn is invalid
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-17T23:08:37Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: zhang yong
nic-hdl: ZY567-AP
e-mail: frankpeng@hltt.cn
address: 1-27-03 huaximeilu,No.17, 3rd Segment of the Renmin SouthRoad,Chengdu
phone: +86-028-85451443
fax-no: +86-028-85451579
country: cn
mnt-by: MAINT-CNNIC-AP
last-modified: 2008-09-04T07:30:38Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.158.131.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.158.131.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 12:30:37 CST 2026
;; MSG SIZE rcvd: 107
Host 39.131.158.211.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 39.131.158.211.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.108.66.24 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-27 05:28:37 |
| 51.79.52.150 | attackspambots | $f2bV_matches |
2019-12-27 04:55:19 |
| 194.182.86.126 | attackspambots | SSH bruteforce (Triggered fail2ban) |
2019-12-27 05:10:10 |
| 198.108.66.25 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-27 05:26:55 |
| 180.163.220.45 | attackspam | Automatic report - Banned IP Access |
2019-12-27 04:55:36 |
| 69.94.143.17 | attackspambots | Dec 26 16:48:11 grey postfix/smtpd\[2043\]: NOQUEUE: reject: RCPT from tatter.nabhaa.com\[69.94.143.17\]: 554 5.7.1 Service unavailable\; Client host \[69.94.143.17\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.143.17\]\; from=\ |
2019-12-27 05:21:44 |
| 200.195.171.74 | attackspam | Dec 26 11:02:43 web9 sshd\[744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.171.74 user=root Dec 26 11:02:45 web9 sshd\[744\]: Failed password for root from 200.195.171.74 port 45296 ssh2 Dec 26 11:05:55 web9 sshd\[1224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.171.74 user=root Dec 26 11:05:57 web9 sshd\[1224\]: Failed password for root from 200.195.171.74 port 58794 ssh2 Dec 26 11:09:01 web9 sshd\[1840\]: Invalid user hung from 200.195.171.74 |
2019-12-27 05:21:02 |
| 148.215.18.103 | attackspambots | Dec 26 20:09:24 XXXXXX sshd[24578]: Invalid user bjault from 148.215.18.103 port 36143 |
2019-12-27 05:03:40 |
| 198.108.66.91 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-27 05:08:16 |
| 117.211.161.171 | attack | SSH-bruteforce attempts |
2019-12-27 05:14:25 |
| 157.55.39.113 | attack | Automatic report - Banned IP Access |
2019-12-27 05:27:51 |
| 101.64.147.120 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-12-27 05:00:07 |
| 37.139.4.138 | attackbotsspam | Dec 26 22:00:43 vps691689 sshd[22868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 Dec 26 22:00:45 vps691689 sshd[22868]: Failed password for invalid user darbie from 37.139.4.138 port 36794 ssh2 ... |
2019-12-27 05:06:26 |
| 104.236.238.243 | attack | Automatic report - SSH Brute-Force Attack |
2019-12-27 05:16:12 |
| 183.166.171.104 | attack | 2019-12-26T15:47:14.837598 X postfix/smtpd[31867]: lost connection after AUTH from unknown[183.166.171.104] 2019-12-26T15:47:15.637371 X postfix/smtpd[31867]: lost connection after AUTH from unknown[183.166.171.104] 2019-12-26T15:47:15.825707 X postfix/smtpd[42991]: lost connection after AUTH from unknown[183.166.171.104] 2019-12-26T15:47:15.935087 X postfix/smtpd[42993]: lost connection after AUTH from unknown[183.166.171.104] |
2019-12-27 05:24:53 |