Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shenzhen

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.116.21.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7472
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.116.21.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 20:58:27 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 48.21.116.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.21.116.113.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
178.64.66.105 attackbots
Invalid user admin from 178.64.66.105 port 35049
2019-10-25 01:52:13
82.196.15.195 attack
Invalid user lloyd from 82.196.15.195 port 38762
2019-10-25 02:11:13
77.93.33.212 attackbots
Invalid user gl from 77.93.33.212 port 57026
2019-10-25 02:16:15
49.235.175.217 attack
$f2bV_matches_ltvn
2019-10-25 02:23:55
60.249.21.129 attackspam
Oct 24 14:54:31 firewall sshd[10794]: Failed password for invalid user mysql from 60.249.21.129 port 34384 ssh2
Oct 24 14:58:45 firewall sshd[10874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.129  user=root
Oct 24 14:58:47 firewall sshd[10874]: Failed password for root from 60.249.21.129 port 35910 ssh2
...
2019-10-25 02:19:27
51.77.147.95 attack
Invalid user test from 51.77.147.95 port 46466
2019-10-25 02:22:23
119.42.175.200 attackbotsspam
Invalid user admin from 119.42.175.200 port 53757
2019-10-25 02:02:44
134.175.141.166 attack
2019-10-24T17:43:29.302440abusebot-5.cloudsearch.cf sshd\[23549\]: Invalid user fuckyou from 134.175.141.166 port 59994
2019-10-25 02:00:01
113.195.163.54 attackbots
Invalid user admin from 113.195.163.54 port 42483
2019-10-25 02:04:27
178.128.158.113 attackspam
Oct 24 17:16:21 work-partkepr sshd\[310\]: Invalid user test from 178.128.158.113 port 33638
Oct 24 17:16:21 work-partkepr sshd\[310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.158.113
...
2019-10-25 01:50:59
34.92.12.73 attackbots
SSH brutforce
2019-10-25 02:28:18
140.143.242.159 attackbotsspam
Invalid user hue from 140.143.242.159 port 48604
2019-10-25 01:58:37
117.121.100.228 attack
Invalid user user from 117.121.100.228 port 36308
2019-10-25 02:03:56
164.52.193.155 attack
Invalid user zabbix from 164.52.193.155 port 46100
2019-10-25 01:54:09
34.93.238.77 attackbots
Invalid user buildbot from 34.93.238.77 port 42224
2019-10-25 02:27:51

Recently Reported IPs

46.90.24.70 82.200.166.226 199.66.68.85 88.39.14.18
39.207.255.80 74.208.121.152 95.112.9.127 171.99.107.59
67.166.161.101 47.31.126.32 2.144.82.149 132.61.186.20
52.24.56.4 212.84.67.55 137.178.219.50 72.169.121.113
64.136.99.21 36.68.112.151 124.248.252.252 39.89.226.253