Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.212.0.0 - 111.215.255.255'

% Abuse contact for '111.212.0.0 - 111.215.255.255' is 'OCN-CNNIC@scn.com.cn'

inetnum:        111.212.0.0 - 111.215.255.255
netname:        COLNET
descr:          Oriental Cable Network Co., Ltd.
descr:          No. 2860, Jinke Road, Zhangjiang Hi-tech Area
descr:          Shanghai, P.R.China
country:        CN
admin-c:        YW7390-AP
tech-c:         YY135-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-COLNET-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2024-12-05T07:52:37Z
source:         APNIC

irt:            IRT-COLNET-CN
address:        NO 2860,jinke RD, pudong new area
address:        Shanghai, P.R.China, 201203
e-mail:         OCN-CNNIC@scn.com.cn
abuse-mailbox:  OCN-CNNIC@scn.com.cn
admin-c:        YW7390-AP
tech-c:         YY135-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-11-18T00:34:41Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Chen Wu
address:        NO 2860,jinke RD, pudong new area
address:        Shanghai, PR.China, 201203
country:        CN
phone:          +86-021-51196000-61452
fax-no:         +86-021-51196000-61339
e-mail:         wuchen@scn.com.cn
nic-hdl:        YW7390-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2024-12-05T07:49:37Z
source:         APNIC

person:         Yuening Yin
nic-hdl:        YY135-AP
e-mail:         antispam_y@scn.com.cn
address:        NO 2860,jinke RD, pudong new area
address:        Shanghai, P.R.China, 201203
phone:          +86-021-51196000-61323
fax-no:         +86-021-51196000-61339
country:        CN
mnt-by:         MAINT-CNNIC-AP
last-modified:  2008-09-04T07:29:54Z
source:         APNIC

% Information related to '111.212.0.0/14AS9812'

route:          111.212.0.0/14
descr:          Oriental Cable Network Co., Ltd.
descr:          No. 2860, Jinke Road, Zhangjiang Hi-tech Area
descr:          Shanghai, P.R.China
country:        CN
origin:         AS9812
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-10-27T00:58:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.215.59.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.215.59.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041600 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 19:17:03 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 168.59.215.111.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.59.215.111.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.52.44.7 attack
Wordpress attack - GET /xmlrpc.php
2020-07-11 03:00:29
1.206.5.100 attackspam
Vulnerability scan - HEAD /backup.rar; HEAD /backup.tar.gz; HEAD /backup.tgz; HEAD /web.rar; HEAD /web.tar.gz; HEAD /web.tgz; HEAD /wwwroot.rar; HEAD /wwwroot.tar.gz; HEAD /wwwroot.tgz; HEAD /www.rar; HEAD /www.tar.gz; HEAD /www.tgz; HEAD /1.rar; HEAD /1.tar.gz; HEAD /1.tgz; HEAD /.rar; HEAD /.tar.gz; HEAD /.tgz; HEAD /crystalmaker.rar; HEAD /crystalmaker.com.rar; HEAD /www.crystalmaker.com.rar; HEAD /crystalmaker.tar.gz; HEAD /crystalmaker.com.tar.gz; HEAD /www.crystalmaker.com.tar.gz; HEAD /crystalmaker.tgz; HEAD /crystalmaker.com.tgz; HEAD /www.crystalmaker.com.tgz
2020-07-11 03:05:36
178.216.173.18 attack
Gmail account has been hacked and deleted
2020-07-11 02:59:44
95.216.23.163 attackspambots
Bad Request - HEAD /../cgi-bin/sales/showProducts.cgi?status=std; GET /../cgi-bin/sales/showProducts.cgi?status=std
2020-07-11 02:52:52
201.95.181.241 attack
Unauthorized connection attempt from IP address 201.95.181.241 on Port 445(SMB)
2020-07-11 02:37:14
87.251.74.97 attackspambots
07/10/2020-15:05:51.398080 87.251.74.97 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-11 03:07:43
59.126.204.6 attackbots
Bad Request - GET /
2020-07-11 02:58:23
103.78.81.227 attackspam
Jul 10 20:36:36 buvik sshd[10196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.81.227
Jul 10 20:36:39 buvik sshd[10196]: Failed password for invalid user vinci from 103.78.81.227 port 39872 ssh2
Jul 10 20:40:02 buvik sshd[10693]: Invalid user choicelog from 103.78.81.227
...
2020-07-11 03:01:39
131.148.31.71 attack
Unauthorized connection attempt from IP address 131.148.31.71 on Port 445(SMB)
2020-07-11 03:00:05
170.82.246.208 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-11 03:04:13
116.99.77.49 attackspambots
1594384284 - 07/10/2020 14:31:24 Host: 116.99.77.49/116.99.77.49 Port: 445 TCP Blocked
2020-07-11 03:06:58
212.129.57.201 attackbots
k+ssh-bruteforce
2020-07-11 02:40:38
150.129.122.50 attackspambots
Wordpress attack - GET /wp-login.php
2020-07-11 02:33:58
139.216.40.36 attackspambots
Wordpress attack - GET /wp-login.php
2020-07-11 02:38:40
51.255.35.41 attack
2020-07-10T13:01:05.059902server.mjenks.net sshd[1076721]: Invalid user billy from 51.255.35.41 port 59355
2020-07-10T13:01:05.065639server.mjenks.net sshd[1076721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41
2020-07-10T13:01:05.059902server.mjenks.net sshd[1076721]: Invalid user billy from 51.255.35.41 port 59355
2020-07-10T13:01:06.980190server.mjenks.net sshd[1076721]: Failed password for invalid user billy from 51.255.35.41 port 59355 ssh2
2020-07-10T13:04:08.053887server.mjenks.net sshd[1077111]: Invalid user seino from 51.255.35.41 port 57467
...
2020-07-11 02:35:43

Recently Reported IPs

2606:4700:10::6816:3452 2606:4700:10::ac43:2728 2606:4700:10::6816:381d 121.237.149.161
2606:4700:10::6816:3652 2606:4700:10::6814:9545 2606:4700:10::6814:6098 35.189.142.243
34.55.131.57 203.190.172.159 66.132.195.52 58.243.46.63
171.37.47.7 80.200.240.132 2606:4700:10::ac43:2088 110.78.154.117
2606:4700:10::6816:2049 2606:4700:10::6816:4176 2606:4700:10::6816:2232 2606:4700:10::6814:5808