City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.166.0.0 - 61.166.255.255'
% Abuse contact for '61.166.0.0 - 61.166.255.255' is 'anti-spam@chinatelecom.cn'
inetnum: 61.166.0.0 - 61.166.255.255
netname: CHINANET-YN
country: CN
descr: CHINANET Yunnan province network
admin-c: ZL48-AP
tech-c: ZL48-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-CHINANET
last-modified: 2008-09-04T06:49:46Z
source: APNIC
person: zhiyong liu
nic-hdl: ZL48-AP
e-mail: ynipmail@163.com
address: 136 beijin roadkunmingchina
phone: +86-871-68226585
fax-no: +86-871-8221536
country: CN
mnt-by: MAINT-CHINANET-YN
last-modified: 2018-12-27T01:58:34Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.166.210.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.166.210.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 13:30:34 CST 2026
;; MSG SIZE rcvd: 106
Host 53.210.166.61.in-addr.arpa not found: 2(SERVFAIL)
server can't find 61.166.210.53.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.53.21.172 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:28:00 |
| 201.248.7.78 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:19:00 |
| 202.143.113.57 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:15:51 |
| 202.185.141.97 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:14:26 |
| 200.46.37.98 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:29:35 |
| 200.52.41.201 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:28:32 |
| 203.177.166.240 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:12:18 |
| 212.129.17.32 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:59:41 |
| 200.32.10.210 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:29:51 |
| 202.94.164.58 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:17:05 |
| 203.160.169.66 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:13:00 |
| 201.122.221.164 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:21:54 |
| 200.116.226.180 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:26:00 |
| 202.131.230.19 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:16:28 |
| 210.245.101.28 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:07:16 |