Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Changzhou

Region: Jiangsu

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.192.203.0 - 122.192.203.255'

% Abuse contact for '122.192.203.0 - 122.192.203.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        122.192.203.0 - 122.192.203.255
netname:        JIANGSUGROUP
country:        CN
descr:          JIANGSU GROUP CO.,NANJING,JIANGSU PROVINCE
admin-c:        LL58-AP
tech-c:         LL58-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-JS
last-modified:  2010-10-22T07:38:05Z
source:         APNIC

person:         Lan Li
nic-hdl:        LL58-AP
e-mail:         js-cu-ipmanage@chinaunicom.cn
address:        No. 65 Beijing West Road,Nanjing,China
phone:          +86257900060
fax-no:         +86252900280
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2013-08-15T02:13:11Z
source:         APNIC

% Information related to '122.192.0.0/14AS4837'

route:          122.192.0.0/14
descr:          CNC Group CHINA169 Jiangsu Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:54:52Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.192.203.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.192.203.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 01:07:21 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 11.203.192.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.203.192.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.163.238.118 attack
Unauthorized connection attempt from IP address 113.163.238.118 on Port 445(SMB)
2020-09-24 23:53:47
121.8.154.106 attack
Unauthorized connection attempt from IP address 121.8.154.106 on Port 445(SMB)
2020-09-24 23:43:47
212.70.149.68 attack
2020-09-24 18:45:38 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=cacti@ift.org.ua\)2020-09-24 18:47:37 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=boards@ift.org.ua\)2020-09-24 18:49:35 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=bioinformatics@ift.org.ua\)
...
2020-09-24 23:55:58
112.85.42.172 attack
Sep 24 15:35:56 ip-172-31-61-156 sshd[24720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Sep 24 15:35:57 ip-172-31-61-156 sshd[24720]: Failed password for root from 112.85.42.172 port 1854 ssh2
...
2020-09-24 23:36:26
200.146.84.48 attackspam
Invalid user prueba from 200.146.84.48 port 35424
2020-09-24 23:33:01
125.46.162.96 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=64527  .  dstport=23  .     (2880)
2020-09-25 00:12:11
204.61.221.126 attack
Unauthorized connection attempt from IP address 204.61.221.126 on Port 445(SMB)
2020-09-24 23:47:48
117.223.233.115 attackspambots
Unauthorized connection attempt from IP address 117.223.233.115 on Port 445(SMB)
2020-09-25 00:07:25
49.205.158.123 attackbotsspam
Sep 24 17:53:01 pve1 sshd[11603]: Failed password for root from 49.205.158.123 port 53828 ssh2
...
2020-09-25 00:14:24
59.108.246.162 attackspambots
Invalid user user from 59.108.246.162 port 39630
2020-09-25 00:13:17
212.70.149.20 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 212.70.149.20 (BG/Bulgaria/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-09-24 12:08:05 dovecot_login authenticator failed for (User) [212.70.149.20]:7534: 535 Incorrect authentication data (set_id=ht@xeoserver.com)
2020-09-24 12:08:12 dovecot_login authenticator failed for (User) [212.70.149.20]:28138: 535 Incorrect authentication data (set_id=eski@xeoserver.com)
2020-09-24 12:08:15 dovecot_login authenticator failed for (User) [212.70.149.20]:24090: 535 Incorrect authentication data (set_id=eski@xeoserver.com)
2020-09-24 12:08:18 dovecot_login authenticator failed for (User) [212.70.149.20]:38836: 535 Incorrect authentication data (set_id=eski@xeoserver.com)
2020-09-24 12:08:25 dovecot_login authenticator failed for (User) [212.70.149.20]:5490: 535 Incorrect authentication data (set_id=eski@xeoserver.com)
2020-09-25 00:11:20
179.181.139.110 attackspam
Unauthorized connection attempt from IP address 179.181.139.110 on Port 445(SMB)
2020-09-24 23:38:59
31.166.246.251 attack
Unauthorized connection attempt from IP address 31.166.246.251 on Port 445(SMB)
2020-09-25 00:18:45
170.130.187.6 attack
Hit honeypot r.
2020-09-24 23:48:13
167.172.186.32 attackbots
167.172.186.32 - - [24/Sep/2020:12:34:44 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.186.32 - - [24/Sep/2020:12:58:09 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-25 00:02:48

Recently Reported IPs

2606:4700:10::6816:340 2606:4700:10::6816:2155 2606:4700:10::ac43:1927 185.174.235.118
139.28.219.68 2606:4700:10::6814:4700 2606:4700:10::6814:7645 66.132.172.40
218.144.97.95 47.147.0.242 90.188.248.249 107.172.252.228
2606:4700:10::6814:7679 2606:4700:10::6814:5149 2606:4700:10::6816:2749 109.162.246.177
2606:4700:10::6816:3124 47.129.124.119 34.38.211.183 87.121.84.147