Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.116.120.0 - 103.116.123.255'

% Abuse contact for '103.116.120.0 - 103.116.123.255' is '1061251277@qq.com'

inetnum:        103.116.120.0 - 103.116.123.255
netname:        NET-EAST-NJ
descr:          Nanjing dongfang network information technology co. LTD.
country:        CN
admin-c:        ZXY88-AP
tech-c:         ZXY88-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-NET-EAST-NJ-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2023-11-28T00:55:50Z
source:         APNIC

irt:            IRT-NET-EAST-NJ-CN
address:        China science and technology co., 270 chengfu road, haidian district, Beijing.
e-mail:         1061251277@qq.com
abuse-mailbox:  1061251277@qq.com
admin-c:        ZXY88-AP
tech-c:         ZXY88-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:35:00Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Zhao xiaoyu
address:        China science and technology co., 270 chengfu road, haidian district, Beijing.
country:        CN
phone:          +86-18210314771
e-mail:         1061251277@qq.com
nic-hdl:        ZXY88-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2018-05-31T01:10:02Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.116.123.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.116.123.199.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400

;; Query time: 143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 05:37:33 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 199.123.116.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.123.116.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.130.187.26 attackspam
3389BruteforceFW23
2019-10-28 07:21:09
104.140.188.54 attackbotsspam
ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:25:48
77.247.108.77 attack
10/27/2019-19:31:59.101188 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-10-28 07:35:26
54.37.232.137 attackbotsspam
Oct 27 23:43:44 meumeu sshd[25888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.137 
Oct 27 23:43:45 meumeu sshd[25888]: Failed password for invalid user oracle from 54.37.232.137 port 58376 ssh2
Oct 27 23:47:10 meumeu sshd[26294]: Failed password for root from 54.37.232.137 port 39020 ssh2
...
2019-10-28 07:02:52
92.119.160.143 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-28 07:27:37
128.199.100.225 attackbots
Oct 27 22:26:10 ncomp sshd[17754]: Invalid user yves from 128.199.100.225
Oct 27 22:26:10 ncomp sshd[17754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.100.225
Oct 27 22:26:10 ncomp sshd[17754]: Invalid user yves from 128.199.100.225
Oct 27 22:26:12 ncomp sshd[17754]: Failed password for invalid user yves from 128.199.100.225 port 51177 ssh2
2019-10-28 07:05:25
113.57.194.148 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:24:57
89.248.168.176 attackspam
firewall-block, port(s): 5065/tcp, 5070/tcp
2019-10-28 07:30:21
89.20.36.1 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-28 07:31:25
92.119.160.97 attack
10/27/2019-19:16:01.918007 92.119.160.97 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 07:27:57
185.209.0.58 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-28 07:17:28
81.22.45.104 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-28 07:33:06
182.61.33.137 attackspambots
Oct 27 21:26:19 MK-Soft-VM6 sshd[27683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.137 
Oct 27 21:26:21 MK-Soft-VM6 sshd[27683]: Failed password for invalid user kernoops from 182.61.33.137 port 43622 ssh2
...
2019-10-28 07:01:50
198.12.64.90 attackspam
" "
2019-10-28 07:14:40
182.99.127.63 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:08:45

Recently Reported IPs

54.224.210.222 49.163.23.28 40.186.145.70 2606:4700:10::6816:2870
2606:4700:10::6814:8299 2606:4700:10::6814:7304 44.201.212.31 3.82.92.91
185.247.137.250 62.105.157.143 10.11.13.145 199.223.192.141
10.248.64.132 13.78.168.43 88.151.34.254 192.109.200.145
192.71.3.222 2606:4700:10::6814:8963 91.156.4.68 88.101.166.55