Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.208.0.0 - 58.223.255.255'

% Abuse contact for '58.208.0.0 - 58.223.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        58.208.0.0 - 58.223.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          A12,Xin-Jie-Kou-Wai Street
descr:          Beijing 100088
country:        CN
admin-c:        CH93-AP
tech-c:         CJ186-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2020-09-11T09:10:30Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

role:           CHINANET JIANGSU
address:        260 Zhongyang Road,Nanjing 210037
country:        CN
phone:          +86-25-87799222
e-mail:         jsipmanager@163.com
remarks:        send anti-spam reports tojsipmanager@163.com
remarks:        send abuse reports tojsipmanager@163.com
remarks:        times in GMT+8
remarks:        www.jsinfo.net
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
nic-hdl:        CJ186-AP
notify:         jsipmanager@163.com
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-08-05T15:34:47Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.212.237.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.212.237.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031401 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 03:30:12 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 253.237.212.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.237.212.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.199.168.184 attackspambots
Sep 10 09:36:04 MK-Soft-Root1 sshd\[1652\]: Invalid user test from 139.199.168.184 port 45032
Sep 10 09:36:04 MK-Soft-Root1 sshd\[1652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.184
Sep 10 09:36:06 MK-Soft-Root1 sshd\[1652\]: Failed password for invalid user test from 139.199.168.184 port 45032 ssh2
...
2019-09-10 16:30:23
218.98.40.154 attackbots
Sep 10 04:12:18 debian sshd\[20044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.154  user=root
Sep 10 04:12:20 debian sshd\[20044\]: Failed password for root from 218.98.40.154 port 37686 ssh2
Sep 10 04:12:23 debian sshd\[20044\]: Failed password for root from 218.98.40.154 port 37686 ssh2
...
2019-09-10 16:17:39
1.223.26.13 attack
Sep 10 04:46:30 rpi sshd[24158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.223.26.13 
Sep 10 04:46:32 rpi sshd[24158]: Failed password for invalid user testftp from 1.223.26.13 port 35155 ssh2
2019-09-10 16:18:22
218.98.40.146 attackbotsspam
Sep  9 22:13:00 lcdev sshd\[11969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.146  user=root
Sep  9 22:13:02 lcdev sshd\[11969\]: Failed password for root from 218.98.40.146 port 57914 ssh2
Sep  9 22:13:10 lcdev sshd\[11983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.146  user=root
Sep  9 22:13:11 lcdev sshd\[11983\]: Failed password for root from 218.98.40.146 port 23761 ssh2
Sep  9 22:13:13 lcdev sshd\[11983\]: Failed password for root from 218.98.40.146 port 23761 ssh2
2019-09-10 16:28:03
118.163.193.82 attack
Sep 10 10:44:50 areeb-Workstation sshd[11397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.193.82
Sep 10 10:44:52 areeb-Workstation sshd[11397]: Failed password for invalid user radio from 118.163.193.82 port 45764 ssh2
...
2019-09-10 16:09:20
103.114.107.203 attackspam
Sep 10 08:16:19 lcl-usvr-01 sshd[11055]: Invalid user admin from 103.114.107.203
2019-09-10 16:28:31
41.85.189.66 attackspambots
www.geburtshaus-fulda.de 41.85.189.66 \[10/Sep/2019:03:16:08 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4092 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36"
www.geburtshaus-fulda.de 41.85.189.66 \[10/Sep/2019:03:16:12 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4092 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36"
2019-09-10 16:34:56
106.12.74.123 attackbots
Sep 10 03:59:41 game-panel sshd[30270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.123
Sep 10 03:59:44 game-panel sshd[30270]: Failed password for invalid user 12345 from 106.12.74.123 port 37410 ssh2
Sep 10 04:06:46 game-panel sshd[30550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.123
2019-09-10 16:12:05
158.69.223.91 attack
Automatic report - Banned IP Access
2019-09-10 16:00:37
188.254.0.182 attack
Sep  9 21:52:50 tdfoods sshd\[30333\]: Invalid user 123 from 188.254.0.182
Sep  9 21:52:50 tdfoods sshd\[30333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
Sep  9 21:52:52 tdfoods sshd\[30333\]: Failed password for invalid user 123 from 188.254.0.182 port 52326 ssh2
Sep  9 21:58:45 tdfoods sshd\[30911\]: Invalid user testuser1 from 188.254.0.182
Sep  9 21:58:45 tdfoods sshd\[30911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
2019-09-10 16:12:38
132.232.30.87 attack
Sep 10 10:15:38 markkoudstaal sshd[3376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
Sep 10 10:15:41 markkoudstaal sshd[3376]: Failed password for invalid user weblogic@123 from 132.232.30.87 port 43654 ssh2
Sep 10 10:23:30 markkoudstaal sshd[4034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
2019-09-10 16:46:56
140.206.75.18 attackspam
$f2bV_matches
2019-09-10 16:35:16
167.99.173.171 attackspam
2019-09-10T08:13:34.819432abusebot-5.cloudsearch.cf sshd\[27465\]: Invalid user testuser@123 from 167.99.173.171 port 43352
2019-09-10 16:19:02
177.10.143.118 attack
Sep 10 03:15:58 smtp postfix/smtpd[56104]: NOQUEUE: reject: RCPT from unknown[177.10.143.118]: 554 5.7.1 Service unavailable; Client host [177.10.143.118] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?177.10.143.118; from= to= proto=ESMTP helo=
...
2019-09-10 16:41:46
190.128.159.118 attackspambots
Sep 10 04:36:26 vps200512 sshd\[22989\]: Invalid user bot1 from 190.128.159.118
Sep 10 04:36:26 vps200512 sshd\[22989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.159.118
Sep 10 04:36:28 vps200512 sshd\[22989\]: Failed password for invalid user bot1 from 190.128.159.118 port 51898 ssh2
Sep 10 04:44:31 vps200512 sshd\[23192\]: Invalid user test01 from 190.128.159.118
Sep 10 04:44:31 vps200512 sshd\[23192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.159.118
2019-09-10 16:44:53

Recently Reported IPs

220.176.7.132 149.104.68.52 121.63.130.51 111.230.213.46
87.106.91.226 180.153.236.71 180.153.236.104 124.117.193.63
85.137.48.194 58.19.107.14 46.35.171.233 123.178.210.99
85.217.149.40 54.160.155.146 3.89.218.222 18.206.252.118
107.20.126.125 20.65.219.131 36.21.235.11 116.77.75.251