Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zhengzhou

Region: Henan

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '115.48.0.0 - 115.63.255.255'

% Abuse contact for '115.48.0.0 - 115.63.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        115.48.0.0 - 115.63.255.255
netname:        UNICOM-HA
descr:          China Unicom Henan province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         WW444-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-HA
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:15:04Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Wei Wang
nic-hdl:        WW444-AP
e-mail:         abuse@public.zz.ha.cn
address:        #55 San Quan Road, Zhengzhou, Henan Provice
phone:          +86-371-65952358
fax-no:         +86-371-65968952
country:        CN
mnt-by:         MAINT-CNCGROUP-HA
last-modified:  2010-03-05T08:20:01Z
source:         APNIC

% Information related to '115.48.0.0/12AS4837'

route:          115.48.0.0/12
descr:          CNC Group CHINA169 Henan Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:55:26Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.57.30.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;115.57.30.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120101 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 02 09:01:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
98.30.57.115.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.30.57.115.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.133.187 attackbots
Port scan: Attack repeated for 24 hours
2020-04-05 02:36:57
164.52.51.197 attackbotsspam
Apr  4 13:45:53 ny01 sshd[22710]: Failed password for root from 164.52.51.197 port 38308 ssh2
Apr  4 13:50:26 ny01 sshd[23238]: Failed password for root from 164.52.51.197 port 35612 ssh2
2020-04-05 02:41:45
139.199.122.96 attackbots
(sshd) Failed SSH login from 139.199.122.96 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 19:40:43 ubnt-55d23 sshd[11391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.122.96  user=root
Apr  4 19:40:45 ubnt-55d23 sshd[11391]: Failed password for root from 139.199.122.96 port 15095 ssh2
2020-04-05 02:59:36
62.28.243.190 attackbots
Honeypot attack, port: 5555, PTR: static-wan-bl3-243-190-rev.webside.pt.
2020-04-05 02:33:42
222.186.180.41 attack
Apr  4 20:47:38 ovpn sshd\[27969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Apr  4 20:47:40 ovpn sshd\[27969\]: Failed password for root from 222.186.180.41 port 35482 ssh2
Apr  4 20:47:53 ovpn sshd\[27969\]: Failed password for root from 222.186.180.41 port 35482 ssh2
Apr  4 20:47:58 ovpn sshd\[28017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Apr  4 20:48:00 ovpn sshd\[28017\]: Failed password for root from 222.186.180.41 port 49710 ssh2
2020-04-05 02:55:14
210.16.93.20 attack
$f2bV_matches
2020-04-05 02:31:47
181.126.83.125 attackbots
(sshd) Failed SSH login from 181.126.83.125 (PY/Paraguay/mail.criterion.com.py): 10 in the last 3600 secs
2020-04-05 02:34:33
92.118.38.82 attack
2020-04-04 22:05:40 dovecot_login authenticator failed for \(User\) \[92.118.38.82\]: 535 Incorrect authentication data \(set_id=survey@org.ua\)2020-04-04 22:06:14 dovecot_login authenticator failed for \(User\) \[92.118.38.82\]: 535 Incorrect authentication data \(set_id=vodafone@org.ua\)2020-04-04 22:06:47 dovecot_login authenticator failed for \(User\) \[92.118.38.82\]: 535 Incorrect authentication data \(set_id=nlopez@org.ua\)
...
2020-04-05 03:09:56
157.50.101.166 attackspambots
1586007430 - 04/04/2020 15:37:10 Host: 157.50.101.166/157.50.101.166 Port: 445 TCP Blocked
2020-04-05 02:46:02
43.226.28.126 attackbotsspam
DATE:2020-04-04 15:37:09, IP:43.226.28.126, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-04-05 02:47:06
167.172.36.232 attack
$f2bV_matches
2020-04-05 03:05:30
212.83.58.35 attackspam
2020-04-04T20:03:41.600406ns386461 sshd\[2478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.58.35  user=root
2020-04-04T20:03:43.055282ns386461 sshd\[2478\]: Failed password for root from 212.83.58.35 port 43428 ssh2
2020-04-04T20:15:36.929623ns386461 sshd\[12892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.58.35  user=root
2020-04-04T20:15:39.209107ns386461 sshd\[12892\]: Failed password for root from 212.83.58.35 port 41292 ssh2
2020-04-04T20:19:56.364711ns386461 sshd\[16949\]: Invalid user www from 212.83.58.35 port 45792
...
2020-04-05 02:36:35
185.192.69.101 attackspam
HTTP SQL Injection Attempt, PTR: PTR record not found
2020-04-05 03:00:19
35.194.163.163 attackbotsspam
Apr  4 11:52:20 vps46666688 sshd[8621]: Failed password for root from 35.194.163.163 port 44442 ssh2
...
2020-04-05 02:53:11
110.175.1.123 attackbots
Port probing on unauthorized port 23
2020-04-05 03:06:58

Recently Reported IPs

115.60.130.70 115.53.120.42 111.18.244.78 111.16.91.167
212.135.41.129 35.203.211.54 80.94.95.98 178.128.168.52
47.85.1.212 47.236.207.24 192.159.99.95 171.37.94.184
240e:3b5:34e6:8830:480d:c1d:238b:6084 121.29.149.115 1.95.85.212 20.64.106.118
147.185.132.227 106.127.215.193 94.241.73.141 185.215.164.205