Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fuzhou

Region: Fujian

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.49.186.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.49.186.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024111100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 11 17:38:23 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 56.186.49.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 56.186.49.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.57.77.186 attack
Port Scan: UDP/137
2019-09-14 12:03:14
78.186.71.226 attackspam
Port Scan: TCP/445
2019-09-14 12:42:01
116.213.52.252 attack
proto=tcp  .  spt=42082  .  dpt=25  .     (listed on Dark List de Sep 13)     (940)
2019-09-14 12:08:49
73.138.249.174 attack
Port Scan: TCP/23
2019-09-14 12:15:41
217.245.51.46 attack
Port Scan: TCP/443
2019-09-14 12:52:00
36.35.168.250 attackbotsspam
Port Scan: TCP/23
2019-09-14 12:50:18
113.246.239.74 attack
Port Scan: TCP/22
2019-09-14 12:38:34
178.45.86.33 attackbotsspam
Port Scan: TCP/2222
2019-09-14 12:34:40
74.208.239.157 attackspam
Port Scan: TCP/445
2019-09-14 12:42:21
103.140.194.62 attackbotsspam
Port Scan: TCP/445
2019-09-14 12:12:59
146.158.59.141 attack
Port Scan: TCP/445
2019-09-14 12:06:51
222.117.218.135 attack
Port Scan: TCP/23
2019-09-14 12:25:08
203.218.197.85 attackbots
2019-09-13 13:16:21 server sshd[91881]: Failed password for invalid user admin from 203.218.197.85 port 60381 ssh2
2019-09-14 12:28:46
94.49.141.110 attack
Port Scan: TCP/445
2019-09-14 12:41:04
165.16.77.82 attack
Port Scan: TCP/445
2019-09-14 12:05:53

Recently Reported IPs

239.139.9.126 134.122.184.3 47.102.199.151 112.85.55.75
125.77.165.62 168.176.37.171 188.229.239.133 188.197.93.149
10.13.124.223 26.26.26.53 113.185.41.98 33.147.143.58
23.225.223.158 211.95.22.51 52.130.94.129 172.23.99.1
56.96.154.80 198.18.53.231 37.198.222.197 fd61:db43:75af::1