Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.116.42.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.116.42.6.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 03:46:35 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 6.42.116.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.42.116.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.149.243.66 attack
My-Apache-Badbots (ownc)
2019-07-28 18:56:30
185.65.180.250 attackspam
3389BruteforceFW23
2019-07-28 19:36:46
186.227.146.66 attackbotsspam
failed_logins
2019-07-28 19:31:28
197.159.135.49 attack
My-Apache-Badbots (ownc)
2019-07-28 18:58:28
51.83.74.203 attackbotsspam
Invalid user spice from 51.83.74.203 port 47821
2019-07-28 18:51:48
181.188.191.77 attack
firewall-block, port(s): 445/tcp
2019-07-28 19:14:14
201.216.193.65 attackspam
2019-07-28T11:04:25.130639abusebot-3.cloudsearch.cf sshd\[16706\]: Invalid user scaner from 201.216.193.65 port 42749
2019-07-28 19:27:36
154.8.185.249 attackspambots
My-Apache-Badbots (ownc)
2019-07-28 19:03:51
207.46.13.100 attackbots
Automatic report - Banned IP Access
2019-07-28 19:22:30
134.73.129.156 attackspam
Jul 28 02:03:06 mail sshd\[32350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.156  user=root
Jul 28 02:03:09 mail sshd\[32350\]: Failed password for root from 134.73.129.156 port 34790 ssh2
...
2019-07-28 18:57:17
119.29.186.34 attackspam
SSH Bruteforce @ SigaVPN honeypot
2019-07-28 19:34:51
104.194.11.156 attackspambots
Jul 28 11:40:05 debian sshd\[21798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.11.156  user=root
Jul 28 11:40:08 debian sshd\[21798\]: Failed password for root from 104.194.11.156 port 43530 ssh2
...
2019-07-28 18:45:46
195.49.150.18 attackspambots
Unauthorized connection attempt from IP address 195.49.150.18 on Port 3389(RDP)
2019-07-28 19:05:41
107.170.196.63 attackbotsspam
" "
2019-07-28 19:07:37
189.90.134.252 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-07-28 19:06:06

Recently Reported IPs

1.116.182.30 1.117.100.19 1.117.150.76 1.117.233.128
1.117.249.174 1.119.148.138 1.12.226.90 1.12.229.181
1.12.234.140 1.12.250.137 1.13.159.10 1.13.179.15
1.13.196.163 1.13.21.149 1.13.21.26 1.13.4.19
1.14.107.2 1.14.132.171 1.14.136.187 1.14.142.185