Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '59.32.0.0 - 59.42.255.255'

% Abuse contact for '59.32.0.0 - 59.42.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        59.32.0.0 - 59.42.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:09Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by:         MAINT-CHINANET
last-modified:  2025-09-04T00:59:42Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-24T03:21:54Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         abuse_gdicnoc@163.com
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox:  abuse_gdicnoc@163.com
last-modified:  2021-05-12T09:06:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.34.28.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.34.28.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092601 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 27 05:41:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 139.28.34.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.28.34.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.250.49.216 attack
SSH/22 MH Probe, BF, Hack -
2020-09-15 22:27:03
51.38.50.99 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-15 22:00:18
103.145.13.183 attack
[2020-09-14 19:34:58] NOTICE[1239][C-00003bf7] chan_sip.c: Call from '' (103.145.13.183:58334) to extension '8800046171121675' rejected because extension not found in context 'public'.
[2020-09-14 19:34:58] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-14T19:34:58.909-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="8800046171121675",SessionID="0x7f4d481972d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.13.183/58334",ACLName="no_extension_match"
[2020-09-14 19:40:13] NOTICE[1239][C-00003c01] chan_sip.c: Call from '' (103.145.13.183:60529) to extension '9900046171121675' rejected because extension not found in context 'public'.
[2020-09-14 19:40:13] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-14T19:40:13.790-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9900046171121675",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IP
...
2020-09-15 22:27:26
64.225.53.232 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-15 21:59:24
117.121.213.187 spambotsattack
Formtools to hack bankaccount, coming over as IMG Files and changing to SCR file for harming Windows systems
2020-09-15 22:36:09
83.48.29.116 attack
Sep 15 11:44:00 ns3164893 sshd[4813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.29.116  user=root
Sep 15 11:44:02 ns3164893 sshd[4813]: Failed password for root from 83.48.29.116 port 44026 ssh2
...
2020-09-15 22:26:26
104.155.163.244 attackbots
Bruteforce detected by fail2ban
2020-09-15 21:57:16
136.56.165.251 attackspam
3x Failed Password
2020-09-15 22:09:01
66.18.72.121 attackspam
Automatic report - Banned IP Access
2020-09-15 22:27:44
74.82.47.2 attackbotsspam
Trying ports that it shouldn't be.
2020-09-15 22:13:59
123.57.181.90 attackbots
(sshd) Failed SSH login from 123.57.181.90 (CN/China/-): 5 in the last 3600 secs
2020-09-15 22:29:57
89.1.66.100 attackspam
Sep 15 13:13:40 datenbank sshd[95418]: Failed password for root from 89.1.66.100 port 55418 ssh2
Sep 15 13:18:20 datenbank sshd[95428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.1.66.100  user=root
Sep 15 13:18:22 datenbank sshd[95428]: Failed password for root from 89.1.66.100 port 60402 ssh2
...
2020-09-15 22:18:05
190.85.162.162 attackspambots
Bruteforce detected by fail2ban
2020-09-15 22:21:06
175.24.16.135 attackspambots
prod11
...
2020-09-15 22:24:33
54.36.99.205 attackbotsspam
B: Abusive ssh attack
2020-09-15 22:06:38

Recently Reported IPs

139.59.135.166 34.221.19.242 82.165.16.214 162.216.149.217
180.76.199.13 167.86.95.210 159.65.148.99 93.65.19.209
172.16.29.2 185.226.197.32 143.44.193.146 58.49.233.126
8.160.132.124 65.58.176.209 45.203.61.2 171.13.14.37
54.151.57.110 101.43.45.77 2408:846c:4a70:4b0b:ad14:4135:d6ab:c095 195.178.110.199