Testing Google IPs just got a whole lot more interesting.
The range 203.208.60.1-203.208.60.255 is from China and all those IPs have the proper reverse DNS crawl-203-208-60-nnn.googlebot.com.
Why 203.208.60.0 was skipped, I have no clue.
Here's the whole block allocated to GoogleCN
inetnum: 203.208.32.0 - 203.208.63.255
netname: GOOGLECN
country: CN
admin-c: ZM657-AP
tech-c: ZM657-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
changed: ipas@cnnic.cn 20110412
source: APNIC
route: 203.208.32.0/19
descr: FM China Network
origin: AS24424
notify: nst@corp.ganji.com
mnt-by: MAINT-CNNIC-AP
changed: nst@corp.ganji.com 20060612
source: APNIC
This appears to be legit so do what you must to make sure you're not bouncing Googlebot!
Now I have to punch a hole in my Great Firewall of China which, due to both email and web abuse, is in an actual iptables firewall, not a soft firewall like everything else.
Hat tip to new member Igal Zeifman [webmasterworld.com] for pointing me at this new development.