Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '222.168.0.0 - 222.169.255.255'

% Abuse contact for '222.168.0.0 - 222.169.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        222.168.0.0 - 222.169.255.255
netname:        CHINANET-JL
descr:          CHINANET Jilin province network
descr:          Jilin Telecom Corporation
descr:          No.2136,Dong-Nan-Hu Road,Changchun,130000,Jilin
country:        CN
admin-c:        YL1057-AP
tech-c:         CH93-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        This object can only modify by APNIC hostmaster
remarks:        If you wish to modify this object details please
remarks:        send email to hostmaster@apnic.net with your
remarks:        organisation account name in the subject line.
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JL
mnt-routes:     MAINT-CHINANET-JL
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:16Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         YI LU
nic-hdl:        YL1057-AP
e-mail:         18943124057@189.cn
address:        No.2136,Southeast lake  Street,Changchun,130042,Jilin
phone:          +86-431-85880000
fax-no:         +86-431-5881234
country:        CN
mnt-by:         MAINT-CHINANET-JL
last-modified:  2019-11-13T03:31:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.168.237.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.168.237.156.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 00:34:49 CST 2026
;; MSG SIZE  rcvd: 108
Host info
156.237.168.222.in-addr.arpa domain name pointer 156.237.168.222.broad.th.jl.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
156.237.168.222.in-addr.arpa	name = 156.237.168.222.broad.th.jl.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.192.93.122 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 17:04:19
58.213.123.195 attack
Feb 20 05:52:34 h2497892 dovecot: pop3-login: Disconnected \(no auth attempts in 0 secs\): user=\<\>, rip=58.213.123.195, lip=85.214.205.138, session=\
Feb 20 05:52:36 h2497892 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=58.213.123.195, lip=85.214.205.138, session=\<5UxhrPqezbQ61XvD\>
Feb 20 05:52:43 h2497892 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=58.213.123.195, lip=85.214.205.138, session=\
...
2020-02-20 17:18:55
222.186.175.220 attackbots
SSH brutforce
2020-02-20 17:08:33
93.163.176.106 attackspam
Port probing on unauthorized port 81
2020-02-20 16:51:29
61.28.108.122 attackspambots
Feb 20 05:01:31 firewall sshd[27235]: Invalid user nagios from 61.28.108.122
Feb 20 05:01:33 firewall sshd[27235]: Failed password for invalid user nagios from 61.28.108.122 port 3001 ssh2
Feb 20 05:04:46 firewall sshd[27335]: Invalid user wangq from 61.28.108.122
...
2020-02-20 16:49:25
200.166.197.34 attack
$f2bV_matches
2020-02-20 16:47:56
27.67.142.10 attackbots
Honeypot attack, port: 445, PTR: localhost.
2020-02-20 17:07:03
125.24.169.182 attackbotsspam
Honeypot attack, port: 445, PTR: node-xiu.pool-125-24.dynamic.totinternet.net.
2020-02-20 17:04:43
112.166.168.86 attackspambots
1582174357 - 02/20/2020 11:52:37 Host: 112.166.168.86/112.166.168.86 Port: 23 TCP Blocked
...
2020-02-20 17:19:51
183.82.54.178 attackbotsspam
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-20 17:29:27
49.88.112.55 attackbots
Feb 20 10:25:12 MK-Soft-VM3 sshd[17590]: Failed password for root from 49.88.112.55 port 53302 ssh2
Feb 20 10:25:15 MK-Soft-VM3 sshd[17590]: Failed password for root from 49.88.112.55 port 53302 ssh2
...
2020-02-20 17:25:58
180.177.33.184 attackbots
Honeypot attack, port: 445, PTR: 180-177-33-184.dynamic.kbronet.com.tw.
2020-02-20 16:53:03
74.222.4.12 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 16:56:19
157.55.39.102 attack
Automatic report - Banned IP Access
2020-02-20 17:16:53
171.224.180.148 attack
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-02-20 17:07:26

Recently Reported IPs

142.87.249.209 126.87.114.240 10.244.225.176 2606:4700:10::6814:5509
2606:4700:10::6814:8023 2606:4700:10::6816:1886 2606:4700:10::6816:4828 2606:4700:10::6814:6895
2606:4700:10::6814:5807 2606:4700:10::6816:363 2606:4700:10::6816:2277 2606:4700:10::6816:2405
2606:4700:10::6814:6498 2606:4700:10::6816:4056 2606:4700:10::6814:9874 110.77.226.217
110.78.150.143 2606:4700:10::6814:6779 2606:4700:10::6816:1478 2606:4700:10::ac43:627