Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chongqing

Region: Chongqìng

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '124.162.0.0 - 124.162.255.255'

% Abuse contact for '124.162.0.0 - 124.162.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        124.162.0.0 - 124.162.255.255
netname:        UNICOM-CQ
descr:          China Unicom Chongqing province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         MX379-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-CQ
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:38:38Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2026-05-08
mnt-by:         MAINT-CNCGROUP
last-modified:  2026-05-09T04:50:16Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2026-05-08
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-05-08T01:31:32Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         Min Xiao
nic-hdl:        MX379-AP
e-mail:         chenzs11@chinaunicom.cn
address:        6/F, K Standard Building, No.52, 4th Keyuan Street, High-Tech Zone, Chongqing, China
phone:          +86-23-86185233
fax-no:         +86-23-86185000
country:        CN
mnt-by:         MAINT-CNCGROUP-CQ
last-modified:  2009-04-21T07:55:52Z
source:         APNIC

% Information related to '124.162.0.0/16AS4837'

route:          124.162.0.0/16
descr:          CNC Group CHINA169 ChongQing Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-09-04T07:54:47Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.162.193.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59868
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.162.193.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052200 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 00:30:05 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 59.193.162.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.193.162.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.248.136.215 attackspambots
Failed password for invalid user from 14.248.136.215 port 40148 ssh2
2020-07-07 08:06:31
222.186.175.148 attack
Jul  7 02:16:46 home sshd[15408]: Failed password for root from 222.186.175.148 port 17276 ssh2
Jul  7 02:16:49 home sshd[15408]: Failed password for root from 222.186.175.148 port 17276 ssh2
Jul  7 02:16:59 home sshd[15408]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 17276 ssh2 [preauth]
...
2020-07-07 08:25:39
23.152.32.242 attackspam
2020-07-07 08:06:16
193.176.215.168 attackbots
failed_logins
2020-07-07 08:14:52
222.186.175.169 attackspambots
2020-07-06T20:23:43.182867uwu-server sshd[3677705]: Failed password for root from 222.186.175.169 port 18774 ssh2
2020-07-06T20:23:46.612594uwu-server sshd[3677705]: Failed password for root from 222.186.175.169 port 18774 ssh2
2020-07-06T20:23:52.105923uwu-server sshd[3677705]: Failed password for root from 222.186.175.169 port 18774 ssh2
2020-07-06T20:23:56.262884uwu-server sshd[3677705]: Failed password for root from 222.186.175.169 port 18774 ssh2
2020-07-06T20:24:01.419816uwu-server sshd[3677705]: Failed password for root from 222.186.175.169 port 18774 ssh2
...
2020-07-07 08:24:16
61.177.172.159 attack
Jul  6 23:57:55 scw-tender-jepsen sshd[1394]: Failed password for root from 61.177.172.159 port 11882 ssh2
Jul  6 23:57:58 scw-tender-jepsen sshd[1394]: Failed password for root from 61.177.172.159 port 11882 ssh2
2020-07-07 08:02:37
178.73.215.171 attackbots
firewall-block, port(s): 102/tcp
2020-07-07 07:56:57
218.92.0.145 attackspambots
Jul  7 01:46:24 piServer sshd[8744]: Failed password for root from 218.92.0.145 port 17969 ssh2
Jul  7 01:46:28 piServer sshd[8744]: Failed password for root from 218.92.0.145 port 17969 ssh2
Jul  7 01:46:32 piServer sshd[8744]: Failed password for root from 218.92.0.145 port 17969 ssh2
Jul  7 01:46:36 piServer sshd[8744]: Failed password for root from 218.92.0.145 port 17969 ssh2
...
2020-07-07 07:51:53
120.88.46.170 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-07-07 08:17:11
222.186.175.216 attackbots
Scanned 69 times in the last 24 hours on port 22
2020-07-07 08:10:25
113.190.159.21 attack
Failed password for invalid user from 113.190.159.21 port 38119 ssh2
2020-07-07 07:59:39
123.21.31.218 attackspam
Failed password for invalid user from 123.21.31.218 port 33885 ssh2
2020-07-07 07:58:12
218.92.0.138 attackspambots
Scanned 26 times in the last 24 hours on port 22
2020-07-07 08:14:07
85.209.0.101 attackspambots
Scanned 4 times in the last 24 hours on port 22
2020-07-07 08:19:16
191.18.60.52 attack
Failed password for invalid user from 191.18.60.52 port 27701 ssh2
2020-07-07 07:55:14

Recently Reported IPs

2606:4700:10::6816:2983 2606:4700:10::6816:216 2606:4700:10::6816:1278 159.183.101.134
101.91.136.16 39.100.83.238 2606:4700:10::6816:2645 2606:4700:10::ac43:595
2606:4700:10::ac43:2620 34.133.170.169 185.126.117.24 2606:4700:10::6816:493
2606:4700:10::ac43:1580 160.119.76.46 121.41.167.149 3.85.134.131
2606:4700:10::6816:230 2606:4700:10::ac43:1995 2606:4700:10::6816:1423 2606:4700:10::6814:7958