Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lianyungang

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.64.0.0 - 49.95.255.255'

% Abuse contact for '49.64.0.0 - 49.95.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        49.64.0.0 - 49.95.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          260 Zhongyang Road,Nanjing 210037
country:        CN
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         jsipmanager@163.com
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2022-04-26T07:40:27Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         CHINANET-JS Hostmaster
nic-hdl:        CH360-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588231
phone:          +86-25-86588745
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:08:59Z
source:         APNIC

person:         CHINANET-JS Network Operations
nic-hdl:        CN142-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588721
phone:          +86-25-86788130
phone:          +86-25-86788122
phone:          +86-25-86588787
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

person:         CHINANET-JS Security Administrater
nic-hdl:        CS306-AP
e-mail:         jsipmanager@163.com
address:        Room 1001#, 260 Zhongyang Road, Nanjing,Jiangsu Province
phone:          +86-25-86588745
phone:          +86-25-86588231
fax-no:         +86-25-86588104
country:        CN
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-03-15T07:09:00Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.88.36.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.88.36.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030400 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 01:15:16 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 86.36.88.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.36.88.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.236.10.109 attack
Automatic report - Banned IP Access
2020-08-01 17:05:21
152.32.166.14 attackspambots
Aug  1 08:17:25  sshd\[29198\]: User root from 152.32.166.14 not allowed because not listed in AllowUsersAug  1 08:17:28  sshd\[29198\]: Failed password for invalid user root from 152.32.166.14 port 45956 ssh2
...
2020-08-01 16:54:23
79.104.59.202 attackspam
DATE:2020-08-01 05:50:59, IP:79.104.59.202, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-08-01 16:57:37
114.199.112.138 attackbotsspam
114.199.112.138 - - [01/Aug/2020:04:51:32 +0100] "POST /wp-login.php HTTP/1.1" 200 6326 "http://emresolutions.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
114.199.112.138 - - [01/Aug/2020:04:51:33 +0100] "POST /wp-login.php HTTP/1.1" 200 6319 "http://emresolutions.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
114.199.112.138 - - [01/Aug/2020:04:51:34 +0100] "POST /wp-login.php HTTP/1.1" 200 6326 "http://emresolutions.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
...
2020-08-01 16:40:31
218.75.210.46 attackbots
SSH Brute Force
2020-08-01 16:30:58
49.88.112.117 attackspambots
Aug  1 00:49:57 ws12vmsma01 sshd[37600]: Failed password for root from 49.88.112.117 port 14529 ssh2
Aug  1 00:49:59 ws12vmsma01 sshd[37600]: Failed password for root from 49.88.112.117 port 14529 ssh2
Aug  1 00:50:01 ws12vmsma01 sshd[37600]: Failed password for root from 49.88.112.117 port 14529 ssh2
...
2020-08-01 16:37:52
165.227.25.239 attack
Aug  1 10:33:12 vmd36147 sshd[11646]: Failed password for root from 165.227.25.239 port 58464 ssh2
Aug  1 10:36:28 vmd36147 sshd[18664]: Failed password for root from 165.227.25.239 port 53038 ssh2
...
2020-08-01 16:47:52
87.251.74.181 attack
350 packets to ports 3001 3005 3006 3008 3010 3011 3013 3016 3022 3025 3026 3034 3036 3037 3038 3039 3040 3045 3046 3047 3050 3053 3056 3058 3066 3067 3068 3071 3079 3081 3097 3098 3102 3103 3126 3127 3135 3136 3139 3147 3148 3169 3170 3173 3175 3178 3180 3183, etc.
2020-08-01 16:39:54
35.188.182.88 attackbots
Aug  1 10:15:33 lnxmail61 sshd[28282]: Failed password for root from 35.188.182.88 port 36716 ssh2
Aug  1 10:15:33 lnxmail61 sshd[28282]: Failed password for root from 35.188.182.88 port 36716 ssh2
2020-08-01 16:49:30
114.32.225.4 attackspambots
Tried our host z.
2020-08-01 16:58:36
212.64.5.28 attack
Jul 28 09:24:29 m3061 sshd[25721]: Invalid user pany from 212.64.5.28
Jul 28 09:24:29 m3061 sshd[25721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.5.28


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.64.5.28
2020-08-01 16:34:54
112.95.225.158 attackspambots
Invalid user re from 112.95.225.158 port 44081
2020-08-01 16:34:04
63.250.58.164 attack
22/tcp
[2020-08-01]1pkt
2020-08-01 16:38:39
1.234.13.176 attackspambots
SSH Brute Force
2020-08-01 16:31:25
146.88.240.4 attackbotsspam
 UDP 146.88.240.4:46097 -> port 500, len 74
2020-08-01 16:57:09

Recently Reported IPs

39.98.60.195 144.202.55.158 118.113.246.35 109.167.82.111
2606:4700:10::6814:6290 2606:4700:10::6816:449 2606:4700:10::6816:2438 2606:4700:10::6814:9789
2606:4700:10::6816:4809 2606:4700:10::6814:7080 2606:4700:10::ac43:1114 2606:4700:10::6814:8888
2606:4700:10::6814:9034 104.28.246.122 154.23.164.157 121.134.176.106
121.230.89.134 2606:4700:10::6816:1005 2606:4700:10::ac43:843 2606:4700:10::6814:5504