Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: CERNET2 IX at South China University of Technology

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.66.119.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35830
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;211.66.119.16.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 01:38:16 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 16.119.66.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 16.119.66.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.231.54.157 attackbots
IP blocked
2020-05-21 03:41:45
111.42.66.150 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-05-21 03:30:06
196.223.227.102 attackspambots
Automatic report - Port Scan Attack
2020-05-21 03:20:32
80.82.64.219 attack
ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack
2020-05-21 03:35:53
41.41.226.50 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 03:12:26
221.13.12.19 attack
Web Server Scan. RayID: 592aa77abd9b0256, UA: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729), Country: CN
2020-05-21 03:47:26
186.216.68.121 attackbots
(smtpauth) Failed SMTP AUTH login from 186.216.68.121 (BR/Brazil/186-216-68-121.uni-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-20 20:31:05 plain authenticator failed for ([186.216.68.121]) [186.216.68.121]: 535 Incorrect authentication data (set_id=m.kamran@safanicu.com)
2020-05-21 03:22:12
78.68.121.208 attackspambots
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 03:36:09
221.213.75.20 attack
Web Server Scan. RayID: 590495f8285c0517, UA: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E), Country: CN
2020-05-21 03:47:12
35.174.40.168 attackspambots
SmallBizIT.US 1 packets to tcp(3389)
2020-05-21 03:16:46
45.13.93.90 attackbots
firewall-block, port(s): 8899/tcp, 9090/tcp
2020-05-21 03:11:15
213.14.244.69 attackspambots
20/5/20@12:00:04: FAIL: Alarm-Network address from=213.14.244.69
...
2020-05-21 03:19:38
83.224.154.188 attackbots
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 03:32:51
138.197.131.249 attackbots
May 20 19:02:19 server sshd[8421]: Failed password for invalid user ypi from 138.197.131.249 port 47900 ssh2
May 20 19:06:11 server sshd[12207]: Failed password for invalid user nqv from 138.197.131.249 port 56856 ssh2
May 20 19:10:06 server sshd[15845]: Failed password for invalid user nke from 138.197.131.249 port 37584 ssh2
2020-05-21 03:25:35
170.130.187.38 attackspam
Unauthorized connection attempt detected from IP address 170.130.187.38 to port 5060
2020-05-21 03:23:10

Recently Reported IPs

162.125.185.35 92.112.122.246 36.145.30.125 183.130.120.249
212.129.58.131 212.24.141.120 221.184.161.179 201.214.216.40
69.58.10.107 93.83.28.29 177.36.44.202 42.102.42.159
125.79.6.149 112.151.55.5 148.108.214.198 94.23.196.208
211.55.226.232 58.19.75.68 71.100.135.254 194.156.67.57