Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '39.96.0.0 - 39.108.255.255'

% Abuse contact for '39.96.0.0 - 39.108.255.255' is 'ipas@cnnic.cn'

inetnum:        39.96.0.0 - 39.108.255.255
netname:        ALISOFT
descr:          Aliyun Computing Co., LTD
descr:          5F, Builing D, the West Lake International Plaza of S&T
descr:          No.391 Wen'er Road, Hangzhou, Zhejiang, China, 310099
country:        CN
admin-c:        ZM1015-AP
tech-c:         ZM877-AP
tech-c:         ZM876-AP
tech-c:         ZM875-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-CNNIC-CN
last-modified:  2021-06-16T01:29:48Z
source:         APNIC

irt:            IRT-CNNIC-CN
address:        Beijing, China
e-mail:         ipas@cnnic.cn
abuse-mailbox:  ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
auth:           # Filtered
remarks:        Please note that CNNIC is not an ISP and is not
remarks:        empowered to investigate complaints of network abuse.
remarks:        Please contact the tech-c or admin-c of the network.
remarks:        ipas@cnnic.cn is invalid
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-17T23:08:37Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Li Jia
address:        NO.969 West Wen Yi Road, Yu Hang District, Hangzhou
country:        CN
phone:          +86-0571-85022088
e-mail:         jiali.jl@alibaba-inc.com
nic-hdl:        ZM1015-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:12:42Z
source:         APNIC

person:         Guoxin Gao
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022600
fax-no:         +86-0571-85022600
e-mail:         anti-spam@list.alibaba-inc.com
nic-hdl:        ZM875-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2014-07-30T01:56:01Z
source:         APNIC

person:         security trouble
e-mail:         abuse@alibaba-inc.com
address:        5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address:        Hangzhou, Zhejiang, China
phone:          +86-0571-85022600
country:        CN
mnt-by:         MAINT-CNNIC-AP
nic-hdl:        ZM876-AP
last-modified:  2025-07-01T07:06:11Z
source:         APNIC

person:         Guowei Pan
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022088-30763
fax-no:         +86-0571-85022600
e-mail:         abuse@alibaba-inc.com
nic-hdl:        ZM877-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:05:46Z
source:         APNIC

% Information related to '39.96.0.0/13AS37963'

route:          39.96.0.0/13
descr:          Hangzhou Alibaba Advertising Co.,Ltd.
country:        CN
origin:         AS37963
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:06Z
source:         APNIC

% Information related to '39.96.0.0/13AS45102'

route:          39.96.0.0/13
descr:          Alibaba (US) Technology Co., Ltd.
country:        CN
origin:         AS45102
mnt-by:         MAINT-CNNIC-AP
last-modified:  2019-08-07T23:28:05Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.98.88.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.98.88.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 21:31:27 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 157.88.98.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.88.98.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.232.192.57 attackspam
2019-06-22T15:10:08.030020 X postfix/smtpd[39207]: warning: unknown[114.232.192.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T15:59:08.250844 X postfix/smtpd[45392]: warning: unknown[114.232.192.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T16:32:55.146161 X postfix/smtpd[50732]: warning: unknown[114.232.192.57]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23 05:41:11
193.106.57.115 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-23 05:54:12
162.244.94.23 attack
xmlrpc attack
2019-06-23 05:51:37
60.216.221.110 attack
port 23 attempt blocked
2019-06-23 05:23:40
187.95.30.50 attackbots
Jun 17 23:53:19 mxgate1 postfix/postscreen[16783]: CONNECT from [187.95.30.50]:41498 to [176.31.12.44]:25
Jun 17 23:53:19 mxgate1 postfix/dnsblog[17205]: addr 187.95.30.50 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 17 23:53:19 mxgate1 postfix/dnsblog[17204]: addr 187.95.30.50 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 17 23:53:19 mxgate1 postfix/dnsblog[17204]: addr 187.95.30.50 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 17 23:53:19 mxgate1 postfix/dnsblog[17207]: addr 187.95.30.50 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 17 23:53:19 mxgate1 postfix/dnsblog[17203]: addr 187.95.30.50 listed by domain bl.spamcop.net as 127.0.0.2
Jun 17 23:53:20 mxgate1 postfix/postscreen[16783]: PREGREET 43 after 0.78 from [187.95.30.50]:41498: EHLO 187.95.30.50.netjacarei.NipCable.com

Jun 17 23:53:20 mxgate1 postfix/postscreen[16783]: DNSBL rank 5 for [187.95.30.50]:41498
Jun x@x
Jun 17 23:53:22 mxgate1 postfix/postscreen[16783]: HANGUP after 1.9 from........
-------------------------------
2019-06-23 05:22:14
195.211.84.104 attackbotsspam
Spam to target mail address hacked/leaked/bought from Kachingle
2019-06-23 05:23:15
106.14.175.70 attackspam
fail2ban honeypot
2019-06-23 05:51:55
148.72.30.228 attackspambots
xmlrpc attack
2019-06-23 06:03:24
66.147.244.183 attackspambots
xmlrpc attack
2019-06-23 06:02:43
79.8.128.160 attackspam
Telnetd brute force attack detected by fail2ban
2019-06-23 05:34:05
177.87.70.139 attack
SMTP-sasl brute force
...
2019-06-23 05:30:09
75.103.66.4 attackbotsspam
xmlrpc attack
2019-06-23 05:56:02
87.117.45.19 attackbotsspam
Unauthorised access (Jun 22) SRC=87.117.45.19 LEN=44 TTL=242 ID=18754 TCP DPT=445 WINDOW=1024 SYN
2019-06-23 05:38:30
58.218.66.7 attackspambots
Jun 22 19:53:02   TCP Attack: SRC=58.218.66.7 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=104  PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
2019-06-23 05:50:58
42.6.170.198 attackbots
port 23 attempt blocked
2019-06-23 05:32:02

Recently Reported IPs

39.100.81.231 74.48.144.143 149.56.160.175 66.132.172.178
176.65.139.231 198.199.104.186 2606:4700:10::6814:6640 2606:4700:10::6814:8896
49.175.36.22 74.41.154.158 182.187.88.177 212.73.148.41
43.128.73.132 58.71.239.99 39.173.105.161 122.193.247.161
5.226.140.10 31.14.254.42 185.216.145.172 139.135.60.0