Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.192.0.0 - 111.207.255.255'

% Abuse contact for '111.192.0.0 - 111.207.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        111.192.0.0 - 111.207.255.255
netname:        UNICOM-BJ
descr:          China Unicom Beijing province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         SY21-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-BJ
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:42:11Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         sun ying
address:        fu xing men nei da jie 97, Xicheng District
address:        Beijing 100800
country:        CN
phone:          +86-10-66030657
fax-no:         +86-10-66078815
e-mail:         hostmast@publicf.bta.net.cn
nic-hdl:        SY21-AP
mnt-by:         MAINT-CNCGROUP-BJ
last-modified:  2009-06-30T08:42:48Z
source:         APNIC

% Information related to '111.192.0.0/12AS4808'

route:          111.192.0.0/12
descr:          China Unicom Beijing Province Network
country:        CN
origin:         AS4808
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2016-05-20T01:24:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.201.247.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.201.247.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012500 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 01:04:16 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 66.247.201.111.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.247.201.111.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.149.132.104 attackbotsspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=51363  .  dstport=2375  .     (2317)
2020-09-21 07:41:52
86.57.211.137 attackbotsspam
Unauthorized connection attempt from IP address 86.57.211.137 on Port 445(SMB)
2020-09-21 07:48:21
218.58.146.35 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 218.58.146.35:13883->gjan.info:23, len 40
2020-09-21 07:57:25
201.77.130.3 attack
2020-09-20T23:59:05.318722shield sshd\[30258\]: Invalid user alex from 201.77.130.3 port 56110
2020-09-20T23:59:05.331230shield sshd\[30258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.130.3
2020-09-20T23:59:07.577825shield sshd\[30258\]: Failed password for invalid user alex from 201.77.130.3 port 56110 ssh2
2020-09-21T00:03:38.332580shield sshd\[30572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.130.3  user=root
2020-09-21T00:03:40.049857shield sshd\[30572\]: Failed password for root from 201.77.130.3 port 33356 ssh2
2020-09-21 08:08:39
106.12.28.152 attackbotsspam
Sep 21 04:43:01 pve1 sshd[21035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.152 
Sep 21 04:43:02 pve1 sshd[21035]: Failed password for invalid user dts from 106.12.28.152 port 56806 ssh2
...
2020-09-21 12:03:46
106.12.222.209 attack
Sep 20 23:55:41 onepixel sshd[1401874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.209 
Sep 20 23:55:41 onepixel sshd[1401874]: Invalid user hadoop from 106.12.222.209 port 39382
Sep 20 23:55:44 onepixel sshd[1401874]: Failed password for invalid user hadoop from 106.12.222.209 port 39382 ssh2
Sep 21 00:00:10 onepixel sshd[1402596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.209  user=root
Sep 21 00:00:12 onepixel sshd[1402596]: Failed password for root from 106.12.222.209 port 47834 ssh2
2020-09-21 08:09:15
49.233.12.156 attack
Port probing on unauthorized port 6379
2020-09-21 07:51:48
70.185.144.101 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 12:02:27
161.81.37.174 attack
Sep 20 14:00:44 logopedia-1vcpu-1gb-nyc1-01 sshd[442861]: Failed password for root from 161.81.37.174 port 51826 ssh2
...
2020-09-21 07:49:59
193.27.228.172 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 15023 proto: tcp cat: Misc Attackbytes: 60
2020-09-21 07:36:41
142.93.68.181 attackbots
 TCP (SYN) 142.93.68.181:47400 -> port 23052, len 44
2020-09-21 07:47:37
112.219.169.123 attackbotsspam
Time:     Sun Sep 20 21:48:13 2020 +0000
IP:       112.219.169.123 (KR/South Korea/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 20 21:34:50 29-1 sshd[20386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.219.169.123  user=root
Sep 20 21:34:53 29-1 sshd[20386]: Failed password for root from 112.219.169.123 port 39186 ssh2
Sep 20 21:44:19 29-1 sshd[21626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.219.169.123  user=root
Sep 20 21:44:21 29-1 sshd[21626]: Failed password for root from 112.219.169.123 port 42526 ssh2
Sep 20 21:48:12 29-1 sshd[22112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.219.169.123  user=root
2020-09-21 07:42:47
218.92.0.250 attack
Sep 20 23:32:02 marvibiene sshd[32516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 20 23:32:04 marvibiene sshd[32516]: Failed password for root from 218.92.0.250 port 8011 ssh2
Sep 20 23:32:07 marvibiene sshd[32516]: Failed password for root from 218.92.0.250 port 8011 ssh2
Sep 20 23:32:02 marvibiene sshd[32516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 20 23:32:04 marvibiene sshd[32516]: Failed password for root from 218.92.0.250 port 8011 ssh2
Sep 20 23:32:07 marvibiene sshd[32516]: Failed password for root from 218.92.0.250 port 8011 ssh2
2020-09-21 07:40:03
116.12.251.132 attackbots
Sep 21 01:48:16 OPSO sshd\[15110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.132  user=root
Sep 21 01:48:19 OPSO sshd\[15110\]: Failed password for root from 116.12.251.132 port 6882 ssh2
Sep 21 01:51:01 OPSO sshd\[15723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.132  user=root
Sep 21 01:51:03 OPSO sshd\[15723\]: Failed password for root from 116.12.251.132 port 11791 ssh2
Sep 21 01:53:46 OPSO sshd\[16482\]: Invalid user test from 116.12.251.132 port 13668
Sep 21 01:53:46 OPSO sshd\[16482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.132
2020-09-21 07:54:46
106.53.238.111 attackspambots
Sep 20 22:51:52 gitlab sshd[232150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.238.111 
Sep 20 22:51:52 gitlab sshd[232150]: Invalid user admin from 106.53.238.111 port 51622
Sep 20 22:51:54 gitlab sshd[232150]: Failed password for invalid user admin from 106.53.238.111 port 51622 ssh2
Sep 20 22:55:23 gitlab sshd[232387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.238.111  user=root
Sep 20 22:55:25 gitlab sshd[232387]: Failed password for root from 106.53.238.111 port 55930 ssh2
...
2020-09-21 07:44:43

Recently Reported IPs

152.32.178.47 20.65.194.43 162.243.60.61 195.248.78.210
93.66.87.98 93.66.85.158 109.118.83.242 203.172.63.76
74.222.3.79 74.222.3.163 74.222.3.154 223.244.8.41
172.208.24.40 150.255.109.232 204.12.215.54 77.83.39.69
39.108.149.232 223.104.42.140 54.224.229.32 162.216.149.66