Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.49.113.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.49.113.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 08:03:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
12.113.49.119.in-addr.arpa domain name pointer 12.113.49.119.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.113.49.119.in-addr.arpa	name = 12.113.49.119.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.147.69 attackbots
Jul 30 17:33:59 intra sshd\[61712\]: Invalid user www-sftp-shared from 106.13.147.69Jul 30 17:34:01 intra sshd\[61712\]: Failed password for invalid user www-sftp-shared from 106.13.147.69 port 40938 ssh2Jul 30 17:36:55 intra sshd\[61758\]: Invalid user toor from 106.13.147.69Jul 30 17:36:58 intra sshd\[61758\]: Failed password for invalid user toor from 106.13.147.69 port 34374 ssh2Jul 30 17:39:48 intra sshd\[61812\]: Failed password for root from 106.13.147.69 port 56042 ssh2Jul 30 17:42:45 intra sshd\[61862\]: Invalid user master1 from 106.13.147.69
...
2019-07-30 23:26:11
78.128.112.114 attack
Port scan on 9 port(s): 290 644 777 2135 2139 2415 2888 2990 3860
2019-07-31 00:46:48
112.64.94.248 attackbots
2323/tcp
[2019-07-30]1pkt
2019-07-31 01:12:33
196.52.43.118 attackbots
Honeypot hit.
2019-07-30 23:26:55
49.68.61.186 attackspam
firewall-block, port(s): 22/tcp
2019-07-30 23:22:23
186.154.129.54 attack
60001/tcp
[2019-07-30]1pkt
2019-07-31 01:08:37
200.3.252.30 attackbots
Honeypot attack, port: 445, PTR: personal-f252-30.personal.net.py.
2019-07-31 00:27:40
54.36.149.107 attackbots
Automatic report - Banned IP Access
2019-07-31 00:33:45
202.159.17.212 attack
Jul 30 19:18:52 webhost01 sshd[31049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.159.17.212
Jul 30 19:18:53 webhost01 sshd[31049]: Failed password for invalid user geesoo from 202.159.17.212 port 34858 ssh2
...
2019-07-31 01:15:47
92.136.157.59 attackspam
Jul 30 17:13:48 lnxded63 sshd[19727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.136.157.59
2019-07-31 00:16:29
165.22.133.68 attack
Jul 30 19:19:59 itv-usvr-01 sshd[32144]: Invalid user dafong from 165.22.133.68
2019-07-30 23:24:06
139.59.79.56 attack
SSH Brute Force
2019-07-30 23:19:36
112.67.180.101 attackbotsspam
52869/tcp
[2019-07-30]1pkt
2019-07-31 00:54:54
68.145.147.98 attackspambots
5555/tcp
[2019-07-30]1pkt
2019-07-31 01:19:15
198.143.133.154 attack
port scan and connect, tcp 143 (imap)
2019-07-30 23:39:14

Recently Reported IPs

16.11.218.210 242.250.138.250 103.8.30.87 231.201.196.237
241.165.1.13 140.204.10.218 4.205.205.222 200.48.64.253
70.96.12.128 220.82.241.219 4.132.130.94 97.72.237.253
22.239.59.121 240.163.222.25 76.105.167.6 182.125.244.90
211.252.49.4 29.107.45.95 166.161.146.78 99.54.35.22