Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.164.0.0 - 119.167.255.255'

% Abuse contact for '119.164.0.0 - 119.167.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        119.164.0.0 - 119.167.255.255
netname:        UNICOM-SD
descr:          China Unicom Shandong Province Network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         ZX14-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP
mnt-lower:      MAINT-CNCGROUP-SD
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:36:58Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         zhang xuemei
nic-hdl:        ZX14-AP
e-mail:         suzhou-haowei@163.com
address:        Jingsiyuan Park Wujiang Suzhou City
phone:          +86-512-63407501
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2008-09-04T07:31:15Z
source:         APNIC

% Information related to '119.164.0.0/14AS4837'

route:          119.164.0.0/14
descr:          CNC Group CHINA169 Shandong Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:55:14Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.164.103.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.164.103.112.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012901 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 05:00:33 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 112.103.164.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.103.164.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.110.154.177 attack
Automatic report - Banned IP Access
2019-10-24 16:24:39
106.12.9.182 attack
404 NOT FOUND
2019-10-24 16:28:17
129.146.100.134 attackbots
Oct 24 08:01:28 andromeda postfix/smtpd\[32881\]: warning: unknown\[129.146.100.134\]: SASL LOGIN authentication failed: authentication failure
Oct 24 08:01:29 andromeda postfix/smtpd\[33288\]: warning: unknown\[129.146.100.134\]: SASL LOGIN authentication failed: authentication failure
Oct 24 08:01:29 andromeda postfix/smtpd\[33148\]: warning: unknown\[129.146.100.134\]: SASL LOGIN authentication failed: authentication failure
Oct 24 08:01:30 andromeda postfix/smtpd\[32881\]: warning: unknown\[129.146.100.134\]: SASL LOGIN authentication failed: authentication failure
Oct 24 08:01:31 andromeda postfix/smtpd\[33148\]: warning: unknown\[129.146.100.134\]: SASL LOGIN authentication failed: authentication failure
2019-10-24 16:20:36
42.230.43.182 attackspam
ET EXPLOIT HackingTrio UA (Hello, World)
2019-10-24 16:17:10
101.51.157.248 attackspam
1433/tcp
[2019-10-24]1pkt
2019-10-24 15:58:23
43.226.144.107 attack
firewall-block, port(s): 8000/tcp
2019-10-24 16:25:52
106.12.33.174 attackbots
Oct 24 08:04:54 server sshd\[4687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.174  user=root
Oct 24 08:04:56 server sshd\[4687\]: Failed password for root from 106.12.33.174 port 51334 ssh2
Oct 24 08:05:08 server sshd\[5122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.174  user=root
Oct 24 08:05:10 server sshd\[5122\]: Failed password for root from 106.12.33.174 port 43022 ssh2
Oct 24 08:27:11 server sshd\[11789\]: Invalid user ro from 106.12.33.174
Oct 24 08:27:11 server sshd\[11789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.174 
...
2019-10-24 16:38:57
103.141.138.131 attackspambots
Invalid user admin from 103.141.138.131 port 56868
2019-10-24 16:33:29
80.82.70.239 attackbots
10/24/2019-04:04:11.580805 80.82.70.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 16:16:37
222.128.93.67 attack
Automatic report - Banned IP Access
2019-10-24 16:24:55
45.70.82.5 attack
firewall-block, port(s): 445/tcp
2019-10-24 16:25:26
222.186.175.202 attack
2019-10-24T10:29:26.183321scmdmz1 sshd\[22844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2019-10-24T10:29:27.824176scmdmz1 sshd\[22844\]: Failed password for root from 222.186.175.202 port 1878 ssh2
2019-10-24T10:29:32.619561scmdmz1 sshd\[22844\]: Failed password for root from 222.186.175.202 port 1878 ssh2
...
2019-10-24 16:34:59
185.176.27.254 attackbots
10/24/2019-03:41:31.077286 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-24 16:17:44
82.146.45.10 attack
$f2bV_matches
2019-10-24 16:12:12
37.113.128.95 attackbotsspam
firewall-block, port(s): 5555/tcp
2019-10-24 16:28:35

Recently Reported IPs

199.45.155.66 47.236.18.91 121.41.166.170 47.236.31.86
13.43.61.43 13.43.61.230 111.230.33.145 42.236.101.219
120.48.75.210 172.239.110.249 176.65.139.8 116.76.37.134
121.43.119.34 147.185.132.93 52.4.64.195 159.65.165.165
103.127.242.159 185.247.137.40 14.212.68.239 47.128.97.100