Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.49.128.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.49.128.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 15:01:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 45.128.49.120.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 45.128.49.120.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
190.137.19.133 attackspam
Unauthorized connection attempt from IP address 190.137.19.133 on Port 445(SMB)
2020-02-22 04:13:55
210.131.0.50 spam
info@jackrabbit.co.nz which send to :
http://www.superpuperr.blogspot.com/p9okhbhjbrftfp9okgvkjn => Google => Yahoo => Yeah etc. => abusecomplaints@markmonitor.com
Message-ID: <0602d3e3e8c316e5c63442111acef24e6de0e44e91@jackrabbit.co.nz> => 210.131.0.50
jackrabbit.co.nz => 104.18.55.251
210.131.0.50 => hostmaster@nic.ad.jp
https://en.asytech.cn/report-ip/210.131.0.50
nifty.com => tech-contact@nifty.ad.jp, nifty-admin@list.nifty.co.jp, nifty-tec@list.nifty.co.jp, gtld-abuse@jprs.jp
https://www.mywot.com/scorecard/bizmail.nifty.com
https://www.mywot.com/scorecard/nifty.com
nifty.com => 222.158.213.148
2020-02-22 04:07:48
187.72.138.237 attackspam
20/2/21@08:11:34: FAIL: Alarm-Network address from=187.72.138.237
...
2020-02-22 04:21:54
113.128.104.219 attack
Fail2Ban Ban Triggered
2020-02-22 04:16:32
42.243.111.90 attackbotsspam
suspicious action Fri, 21 Feb 2020 15:02:31 -0300
2020-02-22 04:04:37
5.135.158.228 attackbotsspam
Feb 21 06:39:51 kapalua sshd\[29100\]: Invalid user sshuser from 5.135.158.228
Feb 21 06:39:51 kapalua sshd\[29100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3302583.ip-5-135-158.eu
Feb 21 06:39:53 kapalua sshd\[29100\]: Failed password for invalid user sshuser from 5.135.158.228 port 52022 ssh2
Feb 21 06:42:04 kapalua sshd\[29272\]: Invalid user developer from 5.135.158.228
Feb 21 06:42:04 kapalua sshd\[29272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3302583.ip-5-135-158.eu
2020-02-22 04:04:53
14.237.218.67 attackspambots
Brute force attempt
2020-02-22 04:14:10
62.210.209.92 attack
DATE:2020-02-21 18:15:30, IP:62.210.209.92, PORT:ssh SSH brute force auth (docker-dc)
2020-02-22 04:10:11
218.77.44.134 attackbotsspam
Port probing on unauthorized port 22
2020-02-22 04:27:32
1.55.238.233 attackbotsspam
1582293104 - 02/21/2020 14:51:44 Host: 1.55.238.233/1.55.238.233 Port: 445 TCP Blocked
2020-02-22 04:03:02
185.98.227.125 attack
Automatic report - Port Scan Attack
2020-02-22 04:35:31
46.119.129.193 attack
Email rejected due to spam filtering
2020-02-22 04:30:52
222.186.138.49 attackbots
suspicious action Fri, 21 Feb 2020 10:11:06 -0300
2020-02-22 04:37:18
144.202.68.181 attackbots
21.02.2020 18:19:37 - Wordpress fail 
Detected by ELinOX-ALM
2020-02-22 04:38:22
194.26.29.129 attack
02/21/2020-14:17:50.471969 194.26.29.129 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-22 04:24:27

Recently Reported IPs

234.95.211.14 14.30.237.95 103.28.145.233 142.54.36.240
6.115.103.121 94.194.55.102 32.124.134.159 18.103.2.190
37.234.99.26 165.193.205.188 227.12.23.61 90.172.234.117
124.162.135.185 15.235.23.48 8.191.5.82 65.35.103.251
82.180.71.10 167.136.194.179 59.25.28.27 136.244.164.108