Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.64.0.0 - 49.95.255.255'

% Abuse contact for '49.64.0.0 - 49.95.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        49.64.0.0 - 49.95.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          260 Zhongyang Road,Nanjing 210037
country:        CN
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         jsipmanager@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2022-04-26T07:40:27Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         CHINANET-JS Hostmaster
nic-hdl:        CH360-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588231
phone:          +86-25-86588745
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:08:59Z
source:         APNIC

person:         CHINANET-JS Network Operations
nic-hdl:        CN142-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588721
phone:          +86-25-86788130
phone:          +86-25-86788122
phone:          +86-25-86588787
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

person:         CHINANET-JS Security Administrater
nic-hdl:        CS306-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588745
phone:          +86-25-86588231
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.78.84.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.78.84.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030601 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 05:24:01 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 123.84.78.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.84.78.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.124.254.31 attackbotsspam
frenzy
2020-08-18 07:40:43
85.96.222.98 spamattack
Used as VPN for attempted hack of multiple personal accounts.
2020-08-18 07:15:41
111.175.186.150 attackspam
Invalid user dokku from 111.175.186.150 port 9068
2020-08-18 07:12:29
94.102.53.112 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-08-18 07:14:14
91.121.146.198 attackspambots
Port Scan
...
2020-08-18 07:20:23
64.225.38.250 attackspam
Aug 17 17:52:47 logopedia-1vcpu-1gb-nyc1-01 sshd[431366]: Invalid user registry from 64.225.38.250 port 50568
...
2020-08-18 07:07:12
64.225.73.186 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-18 07:08:33
129.211.146.50 attackbots
Aug 17 16:54:14 NPSTNNYC01T sshd[30687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50
Aug 17 16:54:16 NPSTNNYC01T sshd[30687]: Failed password for invalid user redmine from 129.211.146.50 port 51322 ssh2
Aug 17 17:00:04 NPSTNNYC01T sshd[31188]: Failed password for root from 129.211.146.50 port 59510 ssh2
...
2020-08-18 07:11:53
179.217.33.43 attackbotsspam
2020-08-17T21:20:31.112559shield sshd\[11283\]: Invalid user kush from 179.217.33.43 port 58210
2020-08-17T21:20:31.123893shield sshd\[11283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.33.43
2020-08-17T21:20:33.272272shield sshd\[11283\]: Failed password for invalid user kush from 179.217.33.43 port 58210 ssh2
2020-08-17T21:25:35.441707shield sshd\[12720\]: Invalid user tftpd from 179.217.33.43 port 37932
2020-08-17T21:25:35.453524shield sshd\[12720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.33.43
2020-08-18 07:16:50
222.186.180.142 attack
2020-08-17T23:22:22.091754vps1033 sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-08-17T23:22:23.913372vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2
2020-08-17T23:22:22.091754vps1033 sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
2020-08-17T23:22:23.913372vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2
2020-08-17T23:22:26.301264vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2
...
2020-08-18 07:25:23
104.225.252.10 attack
" "
2020-08-18 07:42:54
60.164.250.12 attackspam
Aug 17 22:25:35 db sshd[7839]: Invalid user moto from 60.164.250.12 port 59912
...
2020-08-18 07:07:25
222.186.15.115 attackspam
Aug 17 19:59:30 vm0 sshd[25402]: Failed password for root from 222.186.15.115 port 28293 ssh2
Aug 18 01:36:21 vm0 sshd[30472]: Failed password for root from 222.186.15.115 port 33564 ssh2
...
2020-08-18 07:36:26
73.112.76.135 attack
port scan and connect, tcp 443 (https)
2020-08-18 07:15:11
106.13.10.242 attackbots
Aug 18 00:34:57 cho sshd[889591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.242 
Aug 18 00:34:57 cho sshd[889591]: Invalid user le from 106.13.10.242 port 51460
Aug 18 00:34:59 cho sshd[889591]: Failed password for invalid user le from 106.13.10.242 port 51460 ssh2
Aug 18 00:38:32 cho sshd[889798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.242  user=root
Aug 18 00:38:34 cho sshd[889798]: Failed password for root from 106.13.10.242 port 46944 ssh2
...
2020-08-18 07:38:42

Recently Reported IPs

112.45.101.155 185.211.101.91 216.167.2.233 220.167.232.114
44.201.59.250 94.231.206.2 94.231.206.109 35.203.210.87
34.53.191.143 41.193.162.193 100.50.36.245 203.223.35.175
91.230.168.214 14.212.55.90 222.132.254.139 180.153.236.196
17.241.227.111 17.241.219.17 216.180.246.181 18.203.249.140