Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.248.108.0 - 43.248.111.255'

% Abuse contact for '43.248.108.0 - 43.248.111.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        43.248.108.0 - 43.248.111.255
netname:        UNICOM-YN
descr:          UNICOM yunnan Province Network
descr:          China Unicom
descr:          No.156,Fu-Xing-Men-Nei Street,
descr:          Beijing 100031
country:        CN
admin-c:        CH1302-AP
tech-c:         JH1190-AP
abuse-c:        AC1718-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CN-CUCGROUP
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:10:30Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         hqs-ipabuse@chinaunicom.cn
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

person:         JinLong He
nic-hdl:        JH1190-AP
e-mail:         hjl@yncnc.net
address:        Add: 29/F,Stock Building , 62 Chuncheng Road, Kunming, Yunnan  P.R.C.
phone:          +86-0871-8880103
fax-no:         +86-0871-8881300
country:        cn
mnt-by:         MAINT-CNCGROUP-YN
last-modified:  2008-09-04T07:46:25Z
source:         APNIC

% Information related to '43.248.108.0/22AS4837'

route:          43.248.108.0/22
descr:          China Unicom CHINA169 Yunnan Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2014-11-24T03:14:01Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.248.109.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.248.109.147.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 13:00:38 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 147.109.248.43.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.109.248.43.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.129.118.220 attack
Jun 24 01:04:46 foo sshd[30799]: Invalid user anurag from 150.129.118.220
Jun 24 01:04:46 foo sshd[30799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.129.118.220 
Jun 24 01:04:48 foo sshd[30799]: Failed password for invalid user anurag from 150.129.118.220 port 40898 ssh2
Jun 24 01:04:48 foo sshd[30799]: Received disconnect from 150.129.118.220: 11: Bye Bye [preauth]
Jun 24 01:06:35 foo sshd[30804]: Invalid user if from 150.129.118.220
Jun 24 01:06:35 foo sshd[30804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.129.118.220 
Jun 24 01:06:38 foo sshd[30804]: Failed password for invalid user if from 150.129.118.220 port 49050 ssh2
Jun 24 01:06:38 foo sshd[30804]: Received disconnect from 150.129.118.220: 11: Bye Bye [preauth]
Jun 24 01:08:09 foo sshd[30811]: Invalid user cd from 150.129.118.220
Jun 24 01:08:09 foo sshd[30811]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2019-06-27 10:46:10
77.136.87.155 attackbots
Automatic report - Web App Attack
2019-06-27 10:35:08
164.132.177.229 attackbotsspam
Brute force attack stopped by firewall
2019-06-27 10:28:56
217.21.147.112 attackbots
firewall-block, port(s): 445/tcp
2019-06-27 10:53:34
37.114.151.30 attack
Jun 27 04:33:03 pl2server sshd[1822933]: Invalid user admin from 37.114.151.30
Jun 27 04:33:03 pl2server sshd[1822933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.151.30
Jun 27 04:33:05 pl2server sshd[1822933]: Failed password for invalid user admin from 37.114.151.30 port 44537 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.114.151.30
2019-06-27 11:04:55
91.191.223.195 attackspambots
Brute force attack stopped by firewall
2019-06-27 10:34:14
186.1.169.21 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 15:11:38,721 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.1.169.21)
2019-06-27 10:31:44
119.224.53.230 attack
Jun 24 03:32:32 xb3 sshd[32182]: reveeclipse mapping checking getaddrinfo for default-rdns.vocus.co.nz [119.224.53.230] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 24 03:32:34 xb3 sshd[32182]: Failed password for invalid user ubuntu from 119.224.53.230 port 60503 ssh2
Jun 24 03:32:35 xb3 sshd[32182]: Received disconnect from 119.224.53.230: 11: Bye Bye [preauth]
Jun 24 03:36:05 xb3 sshd[26860]: reveeclipse mapping checking getaddrinfo for default-rdns.vocus.co.nz [119.224.53.230] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 24 03:36:07 xb3 sshd[26860]: Failed password for invalid user jaewn from 119.224.53.230 port 49106 ssh2
Jun 24 03:36:08 xb3 sshd[26860]: Received disconnect from 119.224.53.230: 11: Bye Bye [preauth]
Jun 24 03:37:40 xb3 sshd[30360]: reveeclipse mapping checking getaddrinfo for default-rdns.vocus.co.nz [119.224.53.230] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 24 03:37:42 xb3 sshd[30360]: Failed password for invalid user vpn from 119.224.53.230 port 56309 ssh2
J........
-------------------------------
2019-06-27 10:45:08
201.48.233.194 attack
[ssh] SSH attack
2019-06-27 10:55:50
179.108.246.146 attack
libpam_shield report: forced login attempt
2019-06-27 10:44:20
104.168.64.89 attackspambots
firewall-block, port(s): 80/tcp
2019-06-27 11:00:57
109.229.36.98 attack
[portscan] Port scan
2019-06-27 10:46:47
125.64.94.211 attackspambots
27.06.2019 02:06:23 Connection to port 8649 blocked by firewall
2019-06-27 10:40:57
193.29.15.56 attackspam
Port scan: Attack repeated for 24 hours
2019-06-27 10:42:58
193.169.252.18 attackspambots
SMTP_hacking
2019-06-27 11:00:29

Recently Reported IPs

2606:4700:10::6816:4294 191.176.194.150 101.36.121.140 43.165.126.130
213.199.36.187 2606:4700:10::6814:6268 2606:4700:10::6816:4797 158.28.54.174
110.78.153.115 2606:4700:10::6814:6880 2606:4700:10::6816:735 203.25.78.4
40.124.175.52 10.16.222.185 163.227.180.182 252.46.183.189
168.93.214.89 134.35.157.182 147.185.133.18 161.248.116.1