Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '211.64.0.0 - 211.69.255.255'

% Abuse contact for '211.64.0.0 - 211.69.255.255' is 'abuse@cernet.edu.cn'

inetnum:        211.64.0.0 - 211.69.255.255
netname:        CERNET-CN
descr:          China Education and Research Network
descr:          Room 224, Tsinghua University
descr:          Beijing, China
country:        CN
admin-c:        JW725-AP
tech-c:         XL364-AP
tech-c:         LZ530-AP
abuse-c:        AC1685-AP
status:         ALLOCATED PORTABLE
remarks:        confederation
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CERNET-AP
mnt-routes:     MAINT-CERNET-AP
mnt-irt:        IRT-CERNET-AP
last-modified:  2020-10-20T00:56:04Z
source:         APNIC

irt:            IRT-CERNET-AP
address:        Network Research Center,
address:        Main Bldg, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
fax-no:         +86-10-62785933
e-mail:         abuse@cernet.edu.cn
abuse-mailbox:  abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
auth:           # Filtered
remarks:        timezone GMT+8
remarks:        http://www.ccert.edu.cn
remarks:        abuse@cernet.edu.cn was validated on 2025-08-15
mnt-by:         MAINT-CERNET-AP
last-modified:  2025-09-04T00:59:41Z
source:         APNIC

role:           ABUSE CERNETAP
country:        ZZ
address:        Network Research Center,
address:        Main Bldg, Tsinghua Univ
address:        Beijing 100084, China
phone:          +86-10-62784301
e-mail:         abuse@cernet.edu.cn
admin-c:        CER-AP
tech-c:         CER-AP
nic-hdl:        AC1685-AP
remarks:        Generated from irt object IRT-CERNET-AP
remarks:        abuse@cernet.edu.cn was validated on 2025-08-15
abuse-mailbox:  abuse@cernet.edu.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-08-15T09:38:28Z
source:         APNIC

person:         Jianping Wu
address:        China Education and Research Network Center
address:        Room 225, Main Building, Tsinghua University
address:        Beijing 100084
address:        CN
country:        CN
phone:          +86-10-6278-5983
fax-no:         +86-10-6278-5933
e-mail:         jianping@cernet.edu.cn
nic-hdl:        JW725-AP
mnt-by:         MAINT-CERNET-AP
last-modified:  2011-12-22T05:23:32Z
source:         APNIC

person:         Ling Zhang
address:        Network Center
address:        South China University of Technology
address:        Guangzhou, Guangdong 510641, China
address:        CN
country:        CN
phone:          +86-20-87110596
fax-no:         +86-20-87110019
e-mail:         ling@scut.edu.cn
nic-hdl:        LZ530-AP
notify:         dbmon@apnic.net
mnt-by:         MAINT-CERNET-AP
last-modified:  2011-12-22T05:23:32Z
source:         APNIC

person:         Xing Li
address:        China Education and Research Network Center
address:        Room 225, Main Building, Tsinghua University
address:        Beijing 100084
address:        CN
country:        CN
phone:          +86-10-6278-5983
fax-no:         +86-10-6278-5933
e-mail:         xing@cernet.edu.cn
nic-hdl:        XL364-AP
mnt-by:         MAINT-CERNET-AP
last-modified:  2011-12-22T05:23:32Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.64.240.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.64.240.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101701 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 10:39:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 48.240.64.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.240.64.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.206.190.82 attackbots
Apr  6 12:00:41 srv206 sshd[24884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82  user=root
Apr  6 12:00:43 srv206 sshd[24884]: Failed password for root from 123.206.190.82 port 56696 ssh2
Apr  6 12:10:06 srv206 sshd[24934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82  user=root
Apr  6 12:10:07 srv206 sshd[24934]: Failed password for root from 123.206.190.82 port 39138 ssh2
...
2020-04-06 18:41:22
159.89.194.103 attack
Apr  6 11:37:59 sip sshd[5245]: Failed password for root from 159.89.194.103 port 55068 ssh2
Apr  6 11:45:20 sip sshd[8085]: Failed password for root from 159.89.194.103 port 41524 ssh2
2020-04-06 18:20:42
223.71.167.166 attackbotsspam
Apr  6 11:50:44 debian-2gb-nbg1-2 kernel: \[8425670.491770\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=223.71.167.166 DST=195.201.40.59 LEN=58 TOS=0x04 PREC=0x00 TTL=114 ID=17209 PROTO=UDP SPT=26345 DPT=626 LEN=38
2020-04-06 18:21:51
144.217.50.88 attackbots
4022/tcp 22/tcp 1723/tcp...
[2020-02-12/04-06]32pkt,13pt.(tcp)
2020-04-06 18:32:41
196.219.235.84 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=19346)(04061133)
2020-04-06 18:31:06
134.175.39.246 attackspambots
Apr  6 11:29:36 meumeu sshd[26395]: Failed password for root from 134.175.39.246 port 60348 ssh2
Apr  6 11:31:53 meumeu sshd[26643]: Failed password for root from 134.175.39.246 port 57426 ssh2
...
2020-04-06 18:24:22
5.101.0.209 attack
Port scan: Attack repeated for 24 hours
2020-04-06 18:57:57
165.22.143.3 attack
Apr  6 09:43:58 marvibiene sshd[48104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.3  user=root
Apr  6 09:44:00 marvibiene sshd[48104]: Failed password for root from 165.22.143.3 port 48484 ssh2
Apr  6 09:47:49 marvibiene sshd[48185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.3  user=root
Apr  6 09:47:51 marvibiene sshd[48185]: Failed password for root from 165.22.143.3 port 50530 ssh2
...
2020-04-06 18:52:36
185.175.93.6 attackspambots
Honeypot attack, port: 2000, PTR: PTR record not found
2020-04-06 18:27:51
165.22.110.2 attackbots
2020-04-06T06:27:44.638338mail.thespaminator.com sshd[3718]: Invalid user admin from 165.22.110.2 port 35898
2020-04-06T06:27:46.906625mail.thespaminator.com sshd[3718]: Failed password for invalid user admin from 165.22.110.2 port 35898 ssh2
...
2020-04-06 18:38:55
112.85.42.87 attack
2020-04-06T10:29:08.524661shield sshd\[22214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-04-06T10:29:09.968448shield sshd\[22214\]: Failed password for root from 112.85.42.87 port 28028 ssh2
2020-04-06T10:29:11.963270shield sshd\[22214\]: Failed password for root from 112.85.42.87 port 28028 ssh2
2020-04-06T10:29:13.890031shield sshd\[22214\]: Failed password for root from 112.85.42.87 port 28028 ssh2
2020-04-06T10:30:07.588435shield sshd\[22360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-04-06 18:37:20
222.186.175.154 attackspambots
Apr  6 12:50:51 vmd48417 sshd[5333]: Failed password for root from 222.186.175.154 port 34802 ssh2
2020-04-06 18:51:28
186.121.204.10 attack
2020-04-06 09:29:14,917 fail2ban.actions: WARNING [ssh] Ban 186.121.204.10
2020-04-06 18:48:41
85.38.164.51 attack
Apr  6 11:08:51 ns382633 sshd\[31654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.38.164.51  user=root
Apr  6 11:08:53 ns382633 sshd\[31654\]: Failed password for root from 85.38.164.51 port 59995 ssh2
Apr  6 11:17:43 ns382633 sshd\[943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.38.164.51  user=root
Apr  6 11:17:45 ns382633 sshd\[943\]: Failed password for root from 85.38.164.51 port 38493 ssh2
Apr  6 11:23:04 ns382633 sshd\[1850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.38.164.51  user=root
2020-04-06 18:59:32
45.13.93.82 attackspam
Unauthorized connection attempt detected from IP address 45.13.93.82 to port 999 [T]
2020-04-06 18:48:15

Recently Reported IPs

198.235.24.171 192.168.202.100 194.187.176.32 139.5.0.113
8.152.197.30 167.99.191.65 125.122.13.182 113.141.86.87
113.215.189.192 8.219.175.228 47.236.234.142 96.62.49.200
172.68.173.138 38.66.201.212 120.92.51.170 117.151.37.60
43.188.40.204 43.188.40.209 43.188.40.191 91.202.233.79