City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.146.0.0 - 219.147.31.255'
% Abuse contact for '219.146.0.0 - 219.147.31.255' is 'anti-spam@chinatelecom.cn'
inetnum: 219.146.0.0 - 219.147.31.255
netname: CHINANET-SD
descr: CHINANET shandong province network
descr: Shandong Telecom Corporation
descr: No.999,Shunhua road,Jinan,Shandong
country: CN
admin-c: XR55-AP
tech-c: XR55-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-CHINANET
mnt-lower: MAINT-CHINANET-SD
mnt-routes: MAINT-CHINANET-SD
last-modified: 2008-09-04T06:53:13Z
source: APNIC
person: Xin Ruosheng
nic-hdl: XR55-AP
e-mail: ipreport.sd@chinatelecom.cn
address: No.999, road Shunhua, Jinan, Shandong province,China
phone: +86-531-83190000
fax-no: +86-531-83190000
country: CN
mnt-by: MAINT-CHINANET-SD
last-modified: 2019-12-20T07:11:49Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.146.231.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.146.231.2. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040200 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 19:11:08 CST 2026
;; MSG SIZE rcvd: 106
Host 2.231.146.219.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.231.146.219.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 75.97.225.2 | attackspambots | Unauthorized connection attempt detected from IP address 75.97.225.2 to port 5555 [J] |
2020-01-19 20:07:38 |
| 89.201.83.3 | attack | Unauthorized connection attempt detected from IP address 89.201.83.3 to port 5555 [J] |
2020-01-19 20:31:01 |
| 54.37.233.192 | attackspam | Unauthorized connection attempt detected from IP address 54.37.233.192 to port 2220 [J] |
2020-01-19 20:10:49 |
| 109.184.4.110 | attack | Unauthorized connection attempt detected from IP address 109.184.4.110 to port 8080 [J] |
2020-01-19 20:01:42 |
| 51.83.139.30 | spambotsattackproxynormal | ed |
2020-01-19 20:18:41 |
| 124.156.50.94 | attackspam | Unauthorized connection attempt detected from IP address 124.156.50.94 to port 2396 [J] |
2020-01-19 19:58:52 |
| 125.132.110.205 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.132.110.205 to port 81 [J] |
2020-01-19 20:24:46 |
| 91.144.143.205 | attackbots | Unauthorized connection attempt detected from IP address 91.144.143.205 to port 88 [J] |
2020-01-19 20:30:47 |
| 106.58.172.117 | attackspambots | Unauthorized connection attempt detected from IP address 106.58.172.117 to port 8088 [J] |
2020-01-19 20:28:31 |
| 14.207.2.6 | attack | unauthorized connection attempt |
2020-01-19 20:14:44 |
| 63.227.217.163 | attackbots | Unauthorized connection attempt detected from IP address 63.227.217.163 to port 4567 [J] |
2020-01-19 20:09:09 |
| 128.199.128.215 | attack | $f2bV_matches |
2020-01-19 20:24:31 |
| 187.131.210.252 | attack | Unauthorized connection attempt detected from IP address 187.131.210.252 to port 23 [J] |
2020-01-19 19:53:32 |
| 177.207.204.230 | attack | Honeypot attack, port: 445, PTR: 177.207.204.230.static.gvt.net.br. |
2020-01-19 20:21:58 |
| 181.143.0.106 | attackbots | Unauthorized connection attempt detected from IP address 181.143.0.106 to port 23 [J] |
2020-01-19 19:56:41 |