Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.64.0.0 - 49.95.255.255'

% Abuse contact for '49.64.0.0 - 49.95.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        49.64.0.0 - 49.95.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          260 Zhongyang Road,Nanjing 210037
country:        CN
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         jsipmanager@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2022-04-26T07:40:27Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         CHINANET-JS Hostmaster
nic-hdl:        CH360-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-87799222
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2026-03-17T06:28:18Z
source:         APNIC

person:         CHINANET-JS Network Operations
nic-hdl:        CN142-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588721
phone:          +86-25-86788130
phone:          +86-25-86788122
phone:          +86-25-86588787
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

person:         CHINANET-JS Security Administrater
nic-hdl:        CS306-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-87799222
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2026-03-17T06:29:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.77.220.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.77.220.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 10:40:59 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 72.220.77.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.220.77.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.172.117.190 attackspambots
Fail2Ban Ban Triggered
2019-12-26 13:29:37
92.53.69.6 attackspam
2019-12-26T06:20:00.9462861240 sshd\[19121\]: Invalid user dhudson from 92.53.69.6 port 54852
2019-12-26T06:20:00.9496471240 sshd\[19121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6
2019-12-26T06:20:03.4605891240 sshd\[19121\]: Failed password for invalid user dhudson from 92.53.69.6 port 54852 ssh2
...
2019-12-26 13:30:02
59.92.181.142 attack
DATE:2019-12-26 06:00:07, IP:59.92.181.142, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (honey-neo-dc)
2019-12-26 13:21:15
46.37.31.195 attack
xmlrpc attack
2019-12-26 13:28:08
37.146.126.198 attackbotsspam
UTC: 2019-12-25 port: 23/tcp
2019-12-26 13:06:46
176.12.6.42 attackbotsspam
UTC: 2019-12-25 port: 23/tcp
2019-12-26 13:27:48
221.113.12.231 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 26-12-2019 05:00:13.
2019-12-26 13:03:13
222.186.175.140 attackspambots
2019-12-26T05:31:30.341695shield sshd\[5651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
2019-12-26T05:31:32.245126shield sshd\[5651\]: Failed password for root from 222.186.175.140 port 44550 ssh2
2019-12-26T05:31:35.131754shield sshd\[5651\]: Failed password for root from 222.186.175.140 port 44550 ssh2
2019-12-26T05:31:38.433447shield sshd\[5651\]: Failed password for root from 222.186.175.140 port 44550 ssh2
2019-12-26T05:31:42.098213shield sshd\[5651\]: Failed password for root from 222.186.175.140 port 44550 ssh2
2019-12-26 13:36:38
218.241.251.213 attackbotsspam
Dec 26 04:12:47 XXX sshd[2105]: Invalid user zoeller from 218.241.251.213 port 18774
2019-12-26 13:37:06
78.195.178.119 attackbots
Dec 26 04:48:36 XXXXXX sshd[9292]: Invalid user pi from 78.195.178.119 port 59302
2019-12-26 13:35:38
175.6.5.233 attackbotsspam
Dec 26 04:29:40 XXX sshd[2197]: Invalid user ubuntu from 175.6.5.233 port 38176
2019-12-26 13:33:55
187.95.124.230 attack
Dec 26 05:56:39 Invalid user gambit from 187.95.124.230 port 43716
2019-12-26 13:27:24
118.126.105.120 attackspam
Dec 26 05:56:25 pornomens sshd\[32418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.120  user=root
Dec 26 05:56:28 pornomens sshd\[32418\]: Failed password for root from 118.126.105.120 port 52484 ssh2
Dec 26 06:07:24 pornomens sshd\[32526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.120  user=root
...
2019-12-26 13:34:43
90.188.39.117 attack
Unauthorized connection attempt from IP address 90.188.39.117 on Port 445(SMB)
2019-12-26 13:18:52
103.242.153.150 attackbots
Unauthorized connection attempt from IP address 103.242.153.150 on Port 445(SMB)
2019-12-26 13:25:40

Recently Reported IPs

143.110.212.103 124.70.69.176 60.220.238.134 47.108.163.205
47.108.217.185 223.104.223.9 223.104.223.0 117.176.139.98
195.46.39.40 122.193.247.198 2606:4700:10::6814:4903 2606:4700:10::6816:1904
2606:4700:10::6816:2097 2606:4700:10::6816:152 2606:4700:10::6816:49 2606:4700:10::6814:9280
2606:4700:10::6816:2143 110.78.153.73 222.167.47.43 49.212.174.16