Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wuxi

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.64.0.0 - 49.95.255.255'

% Abuse contact for '49.64.0.0 - 49.95.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        49.64.0.0 - 49.95.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          260 Zhongyang Road,Nanjing 210037
country:        CN
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         jsipmanager@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2022-04-26T07:40:27Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         CHINANET-JS Hostmaster
nic-hdl:        CH360-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-87799222
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2026-03-17T06:28:18Z
source:         APNIC

person:         CHINANET-JS Network Operations
nic-hdl:        CN142-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588721
phone:          +86-25-86788130
phone:          +86-25-86788122
phone:          +86-25-86588787
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

person:         CHINANET-JS Security Administrater
nic-hdl:        CS306-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-87799222
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2026-03-17T06:29:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.76.204.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.76.204.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 23:01:14 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 196.204.76.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.204.76.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.231.2 attack
ssh brute force
2020-06-12 19:25:28
184.105.139.67 attackspambots
Unauthorized connection attempt detected from IP address 184.105.139.67 to port 23
2020-06-12 19:33:44
159.65.85.251 attack
Automatic report - Banned IP Access
2020-06-12 19:30:55
103.3.226.230 attack
Invalid user ssh from 103.3.226.230 port 40784
2020-06-12 19:00:28
8.129.168.101 attackspam
[2020-06-12 07:06:42] NOTICE[1273] chan_sip.c: Registration from '' failed for '8.129.168.101:56171' - Wrong password
[2020-06-12 07:06:42] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-12T07:06:42.935-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="sip9",SessionID="0x7f31c03e14a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/8.129.168.101/56171",Challenge="2a4c8e38",ReceivedChallenge="2a4c8e38",ReceivedHash="596c712c2481be9d11244e64ac602ed6"
[2020-06-12 07:14:16] NOTICE[1273] chan_sip.c: Registration from '' failed for '8.129.168.101:54411' - Wrong password
[2020-06-12 07:14:16] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-12T07:14:16.511-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="sip10",SessionID="0x7f31c02f7128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/8.129.168.1
...
2020-06-12 19:23:29
124.205.224.179 attackspam
Jun 12 13:14:19 vps687878 sshd\[31319\]: Invalid user web from 124.205.224.179 port 36646
Jun 12 13:14:19 vps687878 sshd\[31319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179
Jun 12 13:14:21 vps687878 sshd\[31319\]: Failed password for invalid user web from 124.205.224.179 port 36646 ssh2
Jun 12 13:17:36 vps687878 sshd\[31829\]: Invalid user x from 124.205.224.179 port 41438
Jun 12 13:17:36 vps687878 sshd\[31829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179
...
2020-06-12 19:23:44
222.85.224.85 attackbotsspam
Brute force attempt
2020-06-12 19:37:11
14.166.105.230 attackspambots
20/6/11@23:49:47: FAIL: Alarm-Network address from=14.166.105.230
...
2020-06-12 19:13:29
116.218.131.209 attackbots
Jun 11 23:15:23 php1 sshd\[854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.218.131.209  user=root
Jun 11 23:15:24 php1 sshd\[854\]: Failed password for root from 116.218.131.209 port 18701 ssh2
Jun 11 23:22:34 php1 sshd\[1365\]: Invalid user mata from 116.218.131.209
Jun 11 23:22:34 php1 sshd\[1365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.218.131.209
Jun 11 23:22:36 php1 sshd\[1365\]: Failed password for invalid user mata from 116.218.131.209 port 2712 ssh2
2020-06-12 19:08:52
69.250.156.161 attack
Brute-force attempt banned
2020-06-12 19:35:07
103.45.189.29 attackbotsspam
Icarus honeypot on github
2020-06-12 19:34:14
176.215.252.1 attackspam
Jun 12 13:07:53 debian-2gb-nbg1-2 kernel: \[14218795.069759\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.215.252.1 DST=195.201.40.59 LEN=40 TOS=0x10 PREC=0x60 TTL=246 ID=32660 PROTO=TCP SPT=54505 DPT=5048 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-12 19:21:44
219.101.192.141 attackspam
ssh intrusion attempt
2020-06-12 19:11:34
61.177.172.158 attackspam
2020-06-12T10:16:47.450941shield sshd\[8003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-06-12T10:16:49.921428shield sshd\[8003\]: Failed password for root from 61.177.172.158 port 20012 ssh2
2020-06-12T10:16:52.066924shield sshd\[8003\]: Failed password for root from 61.177.172.158 port 20012 ssh2
2020-06-12T10:16:54.377610shield sshd\[8003\]: Failed password for root from 61.177.172.158 port 20012 ssh2
2020-06-12T10:17:46.501276shield sshd\[8201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-06-12 19:07:59
62.170.27.85 attackbots
firewall-block, port(s): 445/tcp
2020-06-12 19:03:19

Recently Reported IPs

220.185.85.118 171.213.223.4 171.114.231.250 125.112.149.92
118.120.181.118 114.233.89.117 114.230.58.162 203.236.207.239
111.224.218.219 106.57.252.236 2606:4700:10::6814:4513 2606:4700:10::6816:4250
121.134.176.108 2606:4700:10::6814:5081 2606:4700:10::6814:7100 2606:4700:10::6816:4925
2606:4700:10::6814:9657 2606:4700:10::6814:5367 2606:4700:10::6816:1935 2606:4700:10::6814:4901