Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.66.48.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.66.48.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:35:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
82.48.66.223.in-addr.arpa domain name pointer 82.48.66.223.static.js.chinamobile.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.48.66.223.in-addr.arpa	name = 82.48.66.223.static.js.chinamobile.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.73.180.216 attackbotsspam
Automatic report - Port Scan Attack
2019-10-15 03:31:24
121.122.141.49 attackbotsspam
2019-10-14T19:36:32.862699abusebot-5.cloudsearch.cf sshd\[26362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.141.49  user=root
2019-10-15 03:55:04
110.182.61.38 attack
" "
2019-10-15 03:39:35
120.89.64.8 attackbots
Oct 14 16:24:41 server sshd[50408]: Failed password for invalid user marry from 120.89.64.8 port 58798 ssh2
Oct 14 16:34:46 server sshd[52533]: Failed password for root from 120.89.64.8 port 53446 ssh2
Oct 14 16:39:10 server sshd[53495]: Failed password for invalid user bi from 120.89.64.8 port 35288 ssh2
2019-10-15 03:25:27
211.220.27.191 attackspam
2019-10-14T17:30:18.842704abusebot-5.cloudsearch.cf sshd\[25104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191  user=root
2019-10-15 03:46:15
117.141.105.44 attack
Port 1433 Scan
2019-10-15 03:51:51
46.229.168.136 attack
Malicious Traffic/Form Submission
2019-10-15 03:22:41
111.231.139.30 attackbotsspam
2019-10-14T14:29:47.055732tmaserv sshd\[4901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30  user=root
2019-10-14T14:29:48.744752tmaserv sshd\[4901\]: Failed password for root from 111.231.139.30 port 38575 ssh2
2019-10-14T14:35:09.820135tmaserv sshd\[5073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30  user=root
2019-10-14T14:35:12.047497tmaserv sshd\[5073\]: Failed password for root from 111.231.139.30 port 58174 ssh2
2019-10-14T14:40:25.670087tmaserv sshd\[5251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30  user=root
2019-10-14T14:40:27.278756tmaserv sshd\[5251\]: Failed password for root from 111.231.139.30 port 49527 ssh2
...
2019-10-15 03:50:44
157.245.96.68 attackbotsspam
SSH Bruteforce
2019-10-15 04:02:47
137.59.51.73 attackbots
Port 1433 Scan
2019-10-15 03:39:49
212.237.26.114 attack
Oct 14 14:03:42 localhost sshd\[640\]: Invalid user Virginie from 212.237.26.114 port 50562
Oct 14 14:03:42 localhost sshd\[640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.26.114
Oct 14 14:03:44 localhost sshd\[640\]: Failed password for invalid user Virginie from 212.237.26.114 port 50562 ssh2
2019-10-15 03:38:15
190.113.142.197 attackspam
2019-10-14T13:16:19.133478abusebot-7.cloudsearch.cf sshd\[24851\]: Invalid user geoff from 190.113.142.197 port 43687
2019-10-15 03:29:13
116.111.109.223 attackbots
Oct 14 14:39:48 b2b-pharm sshd[26154]: Invalid user admin from 116.111.109.223 port 53833
Oct 14 14:39:48 b2b-pharm sshd[26154]: error: maximum authentication attempts exceeded for invalid user admin from 116.111.109.223 port 53833 ssh2 [preauth]
Oct 14 14:39:48 b2b-pharm sshd[26154]: Invalid user admin from 116.111.109.223 port 53833
Oct 14 14:39:48 b2b-pharm sshd[26154]: error: maximum authentication attempts exceeded for invalid user admin from 116.111.109.223 port 53833 ssh2 [preauth]
Oct 14 14:39:48 b2b-pharm sshd[26154]: Invalid user admin from 116.111.109.223 port 53833
Oct 14 14:39:48 b2b-pharm sshd[26154]: error: maximum authentication attempts exceeded for invalid user admin from 116.111.109.223 port 53833 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.111.109.223
2019-10-15 03:43:49
218.28.234.53 attackspambots
failed_logins
2019-10-15 03:59:45
185.90.118.80 attackspam
10/14/2019-14:23:56.616265 185.90.118.80 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-15 03:42:18

Recently Reported IPs

210.232.204.174 165.172.218.167 198.175.209.138 247.170.253.122
61.118.166.158 115.252.52.141 67.92.157.210 171.203.45.220
241.188.68.27 238.57.92.19 41.34.231.125 16.48.91.207
156.201.116.110 9.142.213.189 140.227.100.13 198.241.38.107
131.202.199.117 248.88.216.95 255.229.45.175 53.81.45.220