Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shenzhen

Region: Guangdong

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.212.122.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.212.122.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025072801 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 29 05:30:29 CST 2025
;; MSG SIZE  rcvd: 108
Host info
244.122.212.118.in-addr.arpa domain name pointer 244.122.212.118.adsl-pool.jx.chinaunicom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.122.212.118.in-addr.arpa	name = 244.122.212.118.adsl-pool.jx.chinaunicom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.38.144.202 attackspam
Apr 29 11:43:46 blackbee postfix/smtpd\[11635\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: authentication failure
Apr 29 11:45:08 blackbee postfix/smtpd\[11635\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: authentication failure
Apr 29 11:46:30 blackbee postfix/smtpd\[11635\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: authentication failure
Apr 29 11:47:52 blackbee postfix/smtpd\[11643\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: authentication failure
Apr 29 11:49:14 blackbee postfix/smtpd\[11645\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: authentication failure
...
2020-04-29 18:55:53
40.121.149.241 attackspam
DDOS
2020-04-29 18:48:24
171.225.241.127 attackbots
This IP has repeatedly tried to hack my Yahoo mail account from Vietnam
2020-04-29 19:03:01
69.51.13.102 attack
Invalid user webmaster from 69.51.13.102 port 40474
2020-04-29 18:25:47
1.53.64.240 attackbotsspam
Unauthorized connection attempt detected from IP address 1.53.64.240 to port 23 [T]
2020-04-29 18:35:48
112.85.42.189 attackspambots
[Block] Port Scanning | Rate: 10 hits/1hr
2020-04-29 18:25:34
46.51.73.245 attackspam
[portscan] Port scan
2020-04-29 18:52:15
222.186.173.183 attack
Apr 29 12:36:26 sso sshd[28443]: Failed password for root from 222.186.173.183 port 16714 ssh2
Apr 29 12:36:37 sso sshd[28443]: Failed password for root from 222.186.173.183 port 16714 ssh2
...
2020-04-29 18:39:38
180.149.186.60 attack
Invalid user pa from 180.149.186.60 port 46190
2020-04-29 18:31:23
125.167.68.34 attack
Icarus honeypot on github
2020-04-29 18:53:45
103.242.47.46 attackbots
Unauthorized connection attempt detected from IP address 103.242.47.46 to port 445 [T]
2020-04-29 18:36:19
176.37.60.16 attackspam
Invalid user ansible from 176.37.60.16 port 60806
2020-04-29 18:31:54
66.249.65.204 attack
Automatic report - Banned IP Access
2020-04-29 18:50:51
183.82.121.34 attack
Apr 29 12:35:26 server sshd[2870]: Failed password for root from 183.82.121.34 port 50634 ssh2
Apr 29 12:39:21 server sshd[3255]: Failed password for root from 183.82.121.34 port 57516 ssh2
...
2020-04-29 18:46:29
177.99.206.10 attackspam
Apr 29 11:59:19 ns382633 sshd\[28825\]: Invalid user jenkins from 177.99.206.10 port 57688
Apr 29 11:59:19 ns382633 sshd\[28825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.206.10
Apr 29 11:59:21 ns382633 sshd\[28825\]: Failed password for invalid user jenkins from 177.99.206.10 port 57688 ssh2
Apr 29 12:07:17 ns382633 sshd\[30571\]: Invalid user data01 from 177.99.206.10 port 51050
Apr 29 12:07:17 ns382633 sshd\[30571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.206.10
2020-04-29 19:02:36

Recently Reported IPs

110.207.217.243 44.234.49.247 45.56.110.153 54.186.39.177
178.62.5.72 134.209.5.1 178.128.75.1 223.66.30.133
223.66.30.224 157.230.172.23 58.37.225.174 40.124.184.7
165.227.22.140 147.185.132.249 147.185.132.51 44.220.132.166
198.23.200.72 195.184.76.28 199.45.155.92 8.222.223.100