City: Beijing
Region: Beijing
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.48.0.0 - 61.51.255.255'
% Abuse contact for '61.48.0.0 - 61.51.255.255' is 'zhaoyz3@chinaunicom.cn'
inetnum: 61.48.0.0 - 61.51.255.255
netname: UNICOM-BJ
descr: China Unicom Beijing province network
descr: China Unicom
country: CN
admin-c: CH1302-AP
tech-c: SY21-AP
abuse-c: AC1718-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-CNCGROUP-BJ
mnt-routes: MAINT-CNCGROUP-RR
mnt-irt: IRT-CU-CN
last-modified: 2025-01-22T13:07:34Z
source: APNIC
irt: IRT-CU-CN
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
e-mail: zhaoyz3@chinaunicom.cn
abuse-mailbox: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
auth: # Filtered
remarks: zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by: MAINT-CNCGROUP
last-modified: 2025-11-18T00:26:20Z
source: APNIC
role: ABUSE CUCN
country: ZZ
address: No.21,Financial Street
address: Beijing,100033
address: P.R.China
phone: +000000000
e-mail: zhaoyz3@chinaunicom.cn
admin-c: CH1302-AP
tech-c: CH1302-AP
nic-hdl: AC1718-AP
remarks: Generated from irt object IRT-CU-CN
remarks: zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox: zhaoyz3@chinaunicom.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-10-17T02:26:56Z
source: APNIC
person: ChinaUnicom Hostmaster
nic-hdl: CH1302-AP
e-mail: hqs-ipabuse@chinaunicom.cn
address: No.21,Jin-Rong Street
address: Beijing,100033
address: P.R.China
phone: +86-10-66259764
fax-no: +86-10-66259764
country: CN
mnt-by: MAINT-CNCGROUP
last-modified: 2017-08-17T06:13:16Z
source: APNIC
person: sun ying
address: fu xing men nei da jie 97, Xicheng District
address: Beijing 100800
country: CN
phone: +86-10-66030657
fax-no: +86-10-66078815
e-mail: hostmast@publicf.bta.net.cn
nic-hdl: SY21-AP
mnt-by: MAINT-CNCGROUP-BJ
last-modified: 2009-06-30T08:42:48Z
source: APNIC
% Information related to '61.48.0.0/14AS4808'
route: 61.48.0.0/14
descr: China Unicom Beijing Province Network
country: CN
origin: AS4808
mnt-by: MAINT-CNCGROUP-RR
last-modified: 2016-05-20T01:24:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.48.133.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.48.133.81. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 15:30:14 CST 2026
;; MSG SIZE rcvd: 105
Host 81.133.48.61.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.133.48.61.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 27.223.89.238 | attackspam | Dec 28 07:22:26 odroid64 sshd\[32598\]: User root from 27.223.89.238 not allowed because not listed in AllowUsers Dec 28 07:22:26 odroid64 sshd\[32598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238 user=root ... |
2019-12-28 20:01:39 |
| 192.169.216.233 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-28 20:27:08 |
| 49.88.112.61 | attack | Dec 28 13:27:13 ns3110291 sshd\[27763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.61 user=root Dec 28 13:27:15 ns3110291 sshd\[27763\]: Failed password for root from 49.88.112.61 port 7233 ssh2 Dec 28 13:27:19 ns3110291 sshd\[27763\]: Failed password for root from 49.88.112.61 port 7233 ssh2 Dec 28 13:27:21 ns3110291 sshd\[27763\]: Failed password for root from 49.88.112.61 port 7233 ssh2 Dec 28 13:27:24 ns3110291 sshd\[27763\]: Failed password for root from 49.88.112.61 port 7233 ssh2 ... |
2019-12-28 20:29:08 |
| 37.57.218.243 | attack | 20 attempts against mh-misbehave-ban on pluto.magehost.pro |
2019-12-28 20:13:07 |
| 175.204.91.168 | attackspam | B: f2b ssh aggressive 3x |
2019-12-28 19:56:00 |
| 45.127.56.140 | attackbotsspam | Telnet Server BruteForce Attack |
2019-12-28 20:32:10 |
| 81.159.229.169 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-28 19:53:14 |
| 177.44.18.114 | attack | postfix (unknown user, SPF fail or relay access denied) |
2019-12-28 20:22:24 |
| 117.37.227.186 | attackbotsspam | Scanning |
2019-12-28 20:27:50 |
| 65.30.69.110 | attackbots | Honeypot attack, port: 445, PTR: rrcs-65-30-69-110.central.biz.rr.com. |
2019-12-28 20:25:55 |
| 123.24.164.215 | attackbotsspam | Dec 28 07:21:58 mail postfix/smtpd[28122]: warning: unknown[123.24.164.215]: SASL PLAIN authentication failed: Dec 28 07:22:05 mail postfix/smtpd[28122]: warning: unknown[123.24.164.215]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 07:22:14 mail postfix/smtpd[28122]: warning: unknown[123.24.164.215]: SASL PLAIN authentication failed: ... |
2019-12-28 20:13:37 |
| 106.54.126.63 | attackspam | Invalid user nfs from 106.54.126.63 port 35734 |
2019-12-28 20:25:00 |
| 220.133.249.198 | attackbots | Honeypot attack, port: 445, PTR: 220-133-249-198.HINET-IP.hinet.net. |
2019-12-28 19:52:52 |
| 223.71.167.61 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2019-12-28 19:52:14 |
| 51.77.161.86 | attackspam | Unauthorized SSH login attempts |
2019-12-28 20:10:11 |