Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.120.49.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.120.49.111.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022042200 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 22 13:59:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
111.49.120.221.in-addr.arpa domain name pointer 221-120-49-111.emome-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.49.120.221.in-addr.arpa	name = 221-120-49-111.emome-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.16.91.247 attack
Port 23 (Telnet) access denied
2020-02-14 03:06:52
202.166.170.30 attackbots
1581621348 - 02/13/2020 20:15:48 Host: 202.166.170.30/202.166.170.30 Port: 445 TCP Blocked
2020-02-14 03:27:34
222.186.30.209 attack
Feb 13 19:57:44 MK-Soft-VM8 sshd[26987]: Failed password for root from 222.186.30.209 port 20997 ssh2
Feb 13 19:57:46 MK-Soft-VM8 sshd[26987]: Failed password for root from 222.186.30.209 port 20997 ssh2
...
2020-02-14 02:58:47
110.164.139.210 attack
ssh brute force
2020-02-14 02:51:05
203.109.46.142 attackspam
Lines containing failures of 203.109.46.142 (max 1000)
Feb 13 11:05:51 HOSTNAME sshd[9593]: Did not receive identification string from 203.109.46.142 port 57026
Feb 13 11:06:13 HOSTNAME sshd[9594]: Invalid user Adminixxxr from 203.109.46.142 port 49808
Feb 13 11:06:13 HOSTNAME sshd[9594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.109.46.142
Feb 13 11:06:15 HOSTNAME sshd[9594]: Failed password for invalid user Adminixxxr from 203.109.46.142 port 49808 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.109.46.142
2020-02-14 03:07:21
192.241.239.215 attackbotsspam
ssh brute force
2020-02-14 03:10:11
43.245.47.114 attackspambots
Lines containing failures of 43.245.47.114
Feb 13 11:05:53 home sshd[5105]: Invalid user admin from 43.245.47.114 port 53192
Feb 13 11:05:53 home sshd[5105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.245.47.114 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=43.245.47.114
2020-02-14 02:58:19
2.147.233.60 attackbotsspam
Unauthorized connection attempt from IP address 2.147.233.60 on Port 445(SMB)
2020-02-14 03:26:13
208.126.214.120 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 03:22:05
45.148.10.179 attackspambots
[Fri Feb 14 01:22:21.938674 2020] [:error] [pid 8535:tid 140443720324864] [client 45.148.10.179:60000] [client 45.148.10.179] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "XkWT3V4hW2oDbgQMnvebogAAAYM"]
...
2020-02-14 03:09:31
208.114.149.10 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 03:27:19
106.13.118.216 attack
ssh brute force
2020-02-14 02:45:03
79.79.14.184 attackspam
Port probing on unauthorized port 23
2020-02-14 03:00:48
178.239.121.197 attack
ssh brute force
2020-02-14 02:56:41
213.183.101.89 attackbotsspam
...
2020-02-14 02:44:01

Recently Reported IPs

4.22.191.103 213.226.195.199 45.165.178.0 85.197.58.176
96.75.1.80 79.182.235.82 139.158.204.92 222.254.156.152
93.51.158.109 111.162.250.102 161.145.222.215 152.16.78.1
111.195.200.33 44.200.48.185 104.250.86.194 193.203.215.68
88.243.35.231 166.113.146.181 23.49.244.130 198.12.84.20