Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
221.217.49.6 attackbots
2323/tcp
[2020-06-22]1pkt
2020-06-23 06:01:06
221.217.49.147 attack
$f2bV_matches
2020-03-04 22:02:15
221.217.49.46 attack
$f2bV_matches
2020-03-04 22:00:35
221.217.49.46 attack
Invalid user brou from 221.217.49.46 port 61950
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.46
Failed password for invalid user brou from 221.217.49.46 port 61950 ssh2
Invalid user bounnong from 221.217.49.46 port 45542
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.46
2019-11-29 06:22:40
221.217.49.46 attackspambots
Invalid user schriver from 221.217.49.46 port 8500
2019-11-27 06:40:18
221.217.49.147 attack
Nov 13 00:31:14 ovpn sshd\[5215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.147  user=backup
Nov 13 00:31:16 ovpn sshd\[5215\]: Failed password for backup from 221.217.49.147 port 43622 ssh2
Nov 13 00:43:24 ovpn sshd\[7882\]: Invalid user primuth from 221.217.49.147
Nov 13 00:43:24 ovpn sshd\[7882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.147
Nov 13 00:43:26 ovpn sshd\[7882\]: Failed password for invalid user primuth from 221.217.49.147 port 43092 ssh2
2019-11-13 08:15:02
221.217.49.147 attack
Nov 10 13:42:03 h2177944 sshd\[15455\]: Invalid user oracle from 221.217.49.147 port 36344
Nov 10 13:42:03 h2177944 sshd\[15455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.147
Nov 10 13:42:05 h2177944 sshd\[15455\]: Failed password for invalid user oracle from 221.217.49.147 port 36344 ssh2
Nov 10 14:04:25 h2177944 sshd\[16829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.49.147  user=root
...
2019-11-10 21:46:30
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '221.216.0.0 - 221.223.255.255'

% Abuse contact for '221.216.0.0 - 221.223.255.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        221.216.0.0 - 221.223.255.255
netname:        UNICOM-BJ
descr:          China Unicom Beijing province network
descr:          China Unicom
country:        CN
admin-c:        CH1302-AP
tech-c:         SY21-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-BJ
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2021-11-09T07:38:09Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn is invalid
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-09-10T13:07:04Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn is invalid
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-10T13:08:11Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         sun ying
address:        fu xing men nei da jie 97, Xicheng District
address:        Beijing 100800
country:        CN
phone:          +86-10-66030657
fax-no:         +86-10-66078815
e-mail:         hostmast@publicf.bta.net.cn
nic-hdl:        SY21-AP
mnt-by:         MAINT-CNCGROUP-BJ
last-modified:  2009-06-30T08:42:48Z
source:         APNIC

% Information related to '221.216.0.0/13AS4808'

route:          221.216.0.0/13
descr:          China Unicom Beijing Province Network
country:        CN
origin:         AS4808
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2016-05-20T01:24:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.217.49.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.217.49.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100101 1800 900 604800 86400

;; Query time: 163 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 02 02:30:45 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 7.49.217.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.49.217.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.211.180.187 attackspam
Unauthorized connection attempt detected from IP address 27.211.180.187 to port 81 [J]
2020-01-16 07:26:56
95.66.138.61 attackspambots
Unauthorized connection attempt detected from IP address 95.66.138.61 to port 8080 [J]
2020-01-16 07:40:39
150.109.181.149 attackbots
Unauthorized connection attempt detected from IP address 150.109.181.149 to port 6082 [J]
2020-01-16 07:16:01
89.233.219.46 attack
Unauthorized connection attempt detected from IP address 89.233.219.46 to port 23 [J]
2020-01-16 07:42:07
175.141.236.153 attack
Unauthorized connection attempt detected from IP address 175.141.236.153 to port 8000 [J]
2020-01-16 07:35:04
159.89.169.109 attack
Jan 16 00:04:11 MK-Soft-VM7 sshd[1449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109 
Jan 16 00:04:13 MK-Soft-VM7 sshd[1449]: Failed password for invalid user admin from 159.89.169.109 port 52288 ssh2
...
2020-01-16 07:14:49
37.139.2.218 attackbots
Unauthorized connection attempt detected from IP address 37.139.2.218 to port 2220 [J]
2020-01-16 07:49:36
83.97.20.184 attack
Jan 16 00:14:45 hell sshd[718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.97.20.184
Jan 16 00:14:47 hell sshd[718]: Failed password for invalid user test from 83.97.20.184 port 55772 ssh2
...
2020-01-16 07:43:57
122.51.81.57 attackspam
Unauthorized connection attempt detected from IP address 122.51.81.57 to port 2220 [J]
2020-01-16 07:17:49
210.92.149.98 attack
Unauthorized connection attempt detected from IP address 210.92.149.98 to port 23 [J]
2020-01-16 07:51:11
45.251.241.12 attackspambots
Unauthorized connection attempt detected from IP address 45.251.241.12 to port 80 [J]
2020-01-16 07:48:51
43.254.45.10 attackbots
Unauthorized connection attempt detected from IP address 43.254.45.10 to port 2220 [J]
2020-01-16 07:49:12
201.138.10.143 attackbots
Unauthorized connection attempt detected from IP address 201.138.10.143 to port 81 [J]
2020-01-16 07:28:24
123.118.22.103 attackspam
Unauthorized connection attempt detected from IP address 123.118.22.103 to port 1433 [J]
2020-01-16 07:36:55
112.119.19.122 attackbotsspam
Unauthorized connection attempt detected from IP address 112.119.19.122 to port 5555 [J]
2020-01-16 07:38:06

Recently Reported IPs

35.203.210.77 185.149.24.123 20.65.226.8 20.80.88.167
91.231.89.241 91.231.89.139 91.196.152.1 212.50.252.27
195.178.110.218 124.165.77.119 101.91.148.219 35.215.103.29
139.99.35.34 135.181.43.127 20.55.2.194 104.236.212.70
192.168.98.234 120.25.179.199 169.150.203.240 188.94.32.139