Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Jilin

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.49.222.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.49.222.111.			IN	A

;; AUTHORITY SECTION:
.			324	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100401 1800 900 604800 86400

;; Query time: 280 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 05 02:41:37 CST 2019
;; MSG SIZE  rcvd: 118
Host info
111.222.49.119.in-addr.arpa domain name pointer 111.222.49.119.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.222.49.119.in-addr.arpa	name = 111.222.49.119.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.243.130.167 attackspam
SSH/22 MH Probe, BF, Hack -
2020-02-12 21:43:21
183.89.214.25 attackspam
Unauthorized IMAP connection attempt
2020-02-12 21:28:22
1.34.1.229 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-12 21:37:47
89.197.95.194 attackspambots
Invalid user ujl from 89.197.95.194 port 55906
2020-02-12 21:34:14
108.66.197.226 attackspambots
Automatic report - Port Scan Attack
2020-02-12 21:25:34
46.101.224.184 attackbotsspam
$f2bV_matches
2020-02-12 21:49:38
88.235.214.72 attack
Unauthorised access (Feb 12) SRC=88.235.214.72 LEN=40 TTL=55 ID=53563 TCP DPT=23 WINDOW=56258 SYN
2020-02-12 22:09:00
186.95.69.107 attack
20/2/12@08:47:10: FAIL: Alarm-Network address from=186.95.69.107
...
2020-02-12 21:53:52
198.211.123.196 attackspambots
Feb 12 14:56:58 srv-ubuntu-dev3 sshd[77184]: Invalid user zaq12wsx from 198.211.123.196
Feb 12 14:56:58 srv-ubuntu-dev3 sshd[77184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.196
Feb 12 14:56:58 srv-ubuntu-dev3 sshd[77184]: Invalid user zaq12wsx from 198.211.123.196
Feb 12 14:56:59 srv-ubuntu-dev3 sshd[77184]: Failed password for invalid user zaq12wsx from 198.211.123.196 port 55750 ssh2
Feb 12 15:00:31 srv-ubuntu-dev3 sshd[77482]: Invalid user sakoda from 198.211.123.196
Feb 12 15:00:31 srv-ubuntu-dev3 sshd[77482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.196
Feb 12 15:00:31 srv-ubuntu-dev3 sshd[77482]: Invalid user sakoda from 198.211.123.196
Feb 12 15:00:33 srv-ubuntu-dev3 sshd[77482]: Failed password for invalid user sakoda from 198.211.123.196 port 57612 ssh2
Feb 12 15:04:05 srv-ubuntu-dev3 sshd[77728]: Invalid user webmail from 198.211.123.196
...
2020-02-12 22:12:45
149.56.12.88 attackspambots
Lines containing failures of 149.56.12.88
Feb 10 21:55:47 dns01 sshd[26992]: Invalid user muj from 149.56.12.88 port 33124
Feb 10 21:55:47 dns01 sshd[26992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.12.88
Feb 10 21:55:49 dns01 sshd[26992]: Failed password for invalid user muj from 149.56.12.88 port 33124 ssh2
Feb 10 21:55:49 dns01 sshd[26992]: Received disconnect from 149.56.12.88 port 33124:11: Bye Bye [preauth]
Feb 10 21:55:49 dns01 sshd[26992]: Disconnected from invalid user muj 149.56.12.88 port 33124 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.56.12.88
2020-02-12 22:06:50
91.217.43.219 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 21:56:10
189.207.46.15 attack
Unauthorized connection attempt from IP address 189.207.46.15 on Port 445(SMB)
2020-02-12 22:11:02
191.14.183.196 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-02-12 21:49:21
195.176.3.19 attack
02/12/2020-10:34:53.726180 195.176.3.19 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 42
2020-02-12 21:24:39
104.236.52.94 attackspam
SSH Login Failed
2020-02-12 21:31:02

Recently Reported IPs

66.119.207.3 75.152.215.87 183.110.242.71 68.197.120.139
193.56.130.181 49.36.251.49 102.126.21.12 1.52.100.14
112.91.56.114 95.138.190.243 221.118.226.44 87.195.134.213
213.30.47.33 106.46.218.190 168.0.4.27 107.25.171.223
85.254.1.139 88.117.62.83 209.85.222.197 39.87.173.190