City: unknown
Region: unknown
Country: China
Internet Service Provider: China Tietong
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '222.32.0.0 - 222.63.255.255'
% Abuse contact for '222.32.0.0 - 222.63.255.255' is 'liuxin15@cmtt.chinamobile.com'
inetnum: 222.32.0.0 - 222.63.255.255
netname: CTTNET
descr: China TieTong Telecommunications Corporation
descr: Jinze Mansion, 2 Guangningbo Street,
descr: Xicheng District, Beijing, China, 100032
country: CN
admin-c: WP188-AP
tech-c: LM273-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-CTTNET-CN
mnt-lower: MAINT-CN-CRTC
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:57:30Z
source: APNIC
irt: IRT-CTTNET-CN
address: Jinze Mansion, 2 Guangningbo Street, Xicheng District, Beijing
e-mail: liuxin15@cmtt.chinamobile.com
abuse-mailbox: liuxin15@cmtt.chinamobile.com
admin-c: WP188-AP
tech-c: WP188-AP
auth: # Filtered
remarks: liuxin15@cmtt.chinamobile.com was validated on 2025-06-30
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-06-30T01:35:36Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: liu min
address: Jinze Mansion, 2 Guangningbo Street, Xicheng District, Beijing
country: CN
phone: +86-13810874779
e-mail: gyzhao@cmtietong.com
nic-hdl: LM273-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-07-20T00:58:02Z
source: APNIC
person: Wang Pei
address: Jinze Mansion, 2 Guangningbo Street, Xicheng District, Beijing
country: CN
phone: +86-13601002911
e-mail: wpli@cmtietong.com
nic-hdl: WP188-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2018-07-20T01:00:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.49.15.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;222.49.15.235. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092100 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 21 20:04:23 CST 2025
;; MSG SIZE rcvd: 106
Host 235.15.49.222.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 235.15.49.222.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
42.247.22.66 | attackbotsspam | Feb 18 07:01:04 dedicated sshd[13143]: Invalid user buck from 42.247.22.66 port 47962 |
2020-02-18 17:19:30 |
49.213.214.130 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:30:41 |
49.213.202.108 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:37:33 |
106.12.155.162 | attackbotsspam | Feb 18 08:28:11 localhost sshd\[13354\]: Invalid user trade from 106.12.155.162 port 39854 Feb 18 08:28:11 localhost sshd\[13354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.155.162 Feb 18 08:28:13 localhost sshd\[13354\]: Failed password for invalid user trade from 106.12.155.162 port 39854 ssh2 ... |
2020-02-18 17:49:08 |
49.235.209.89 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:11:36 |
95.78.176.107 | attackspam | port |
2020-02-18 17:13:47 |
51.158.25.170 | attackbots | firewall-block, port(s): 25080/udp |
2020-02-18 17:35:55 |
49.235.146.76 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:18:29 |
106.13.23.35 | attackbotsspam | Feb 18 06:50:58 MK-Soft-VM8 sshd[2259]: Failed password for root from 106.13.23.35 port 34508 ssh2 ... |
2020-02-18 17:25:12 |
128.199.148.151 | attackspambots | Feb 18 09:00:32 l02a sshd[2681]: Invalid user clay from 128.199.148.151 Feb 18 09:00:32 l02a sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.148.151 Feb 18 09:00:32 l02a sshd[2681]: Invalid user clay from 128.199.148.151 Feb 18 09:00:34 l02a sshd[2681]: Failed password for invalid user clay from 128.199.148.151 port 52976 ssh2 |
2020-02-18 17:16:14 |
49.213.201.156 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:48:37 |
49.224.185.55 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 17:23:22 |
36.77.27.198 | attackbots | 1582001561 - 02/18/2020 05:52:41 Host: 36.77.27.198/36.77.27.198 Port: 445 TCP Blocked |
2020-02-18 17:45:07 |
180.183.235.120 | attackspambots | 1582001599 - 02/18/2020 05:53:19 Host: 180.183.235.120/180.183.235.120 Port: 445 TCP Blocked |
2020-02-18 17:16:50 |
112.85.42.186 | attackspambots | Feb 18 10:14:34 ns381471 sshd[26977]: Failed password for root from 112.85.42.186 port 39493 ssh2 |
2020-02-18 17:32:27 |