Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Xinjiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.113.4.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54115
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.113.4.122.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 00:46:55 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 122.4.113.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 122.4.113.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.116.199.99 attack
Feb 18 03:10:34 firewall sshd[9003]: Invalid user agent from 14.116.199.99
Feb 18 03:10:36 firewall sshd[9003]: Failed password for invalid user agent from 14.116.199.99 port 56014 ssh2
Feb 18 03:12:27 firewall sshd[9070]: Invalid user mpws from 14.116.199.99
...
2020-02-18 17:25:56
49.213.201.142 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 17:51:08
116.1.148.213 attack
Port scan: Attack repeated for 24 hours
2020-02-18 17:38:33
116.107.146.18 attack
" "
2020-02-18 17:35:41
47.75.128.216 attack
$f2bV_matches
2020-02-18 18:00:22
222.186.180.41 attack
Feb 18 10:25:09 MK-Soft-Root2 sshd[20224]: Failed password for root from 222.186.180.41 port 15006 ssh2
Feb 18 10:25:15 MK-Soft-Root2 sshd[20224]: Failed password for root from 222.186.180.41 port 15006 ssh2
...
2020-02-18 17:33:04
170.239.148.117 attack
firewall-block, port(s): 1433/tcp
2020-02-18 17:31:47
49.224.185.55 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 17:23:22
110.137.179.150 attack
1582001536 - 02/18/2020 05:52:16 Host: 110.137.179.150/110.137.179.150 Port: 445 TCP Blocked
2020-02-18 18:04:58
66.96.233.31 attackspambots
Feb 18 08:11:13 legacy sshd[25780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.233.31
Feb 18 08:11:15 legacy sshd[25780]: Failed password for invalid user bpoint from 66.96.233.31 port 42453 ssh2
Feb 18 08:15:16 legacy sshd[25993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.233.31
...
2020-02-18 17:22:33
31.167.5.254 attackbots
Email rejected due to spam filtering
2020-02-18 18:05:20
94.190.0.11 attackbots
20/2/17@23:52:17: FAIL: Alarm-Network address from=94.190.0.11
20/2/17@23:52:17: FAIL: Alarm-Network address from=94.190.0.11
...
2020-02-18 18:03:29
51.38.34.142 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-02-18 17:59:58
52.33.81.41 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-18 17:27:03
137.101.197.73 attackbotsspam
unauthorized connection attempt
2020-02-18 17:47:08

Recently Reported IPs

125.248.191.131 171.61.174.11 48.105.204.161 5.146.64.46
68.183.189.4 61.134.123.54 211.131.184.37 216.14.27.103
96.23.226.227 69.227.124.133 90.222.119.113 218.199.174.94
40.211.155.15 73.181.92.47 117.147.180.137 180.211.55.88
211.3.99.36 53.65.192.119 44.145.47.92 168.234.72.134