Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.42.0.0 - 101.43.255.255'

% Abuse contact for '101.42.0.0 - 101.43.255.255' is 'abuse@tencent.com'

inetnum:        101.42.0.0 - 101.43.255.255
netname:        TENCENT-CN
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
descr:          Floor 6, Yinke Building, 38 Haidian St, Haidian District
country:        CN
org:            ORG-TCCC1-AP
admin-c:        TCA15-AP
tech-c:         TCA15-AP
abuse-c:        AT992-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TENCENT-CN
mnt-routes:     MAINT-TENCENT-CN
mnt-irt:        IRT-TENCENT-CN
last-modified:  2020-07-22T13:10:59Z
source:         APNIC

irt:            IRT-TENCENT-CN
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
e-mail:         tencent_noc@tencent.com
abuse-mailbox:  abuse@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
auth:           # Filtered
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
mnt-by:         MAINT-COMSENZ1-CN
last-modified:  2025-11-18T00:31:31Z
source:         APNIC

organisation:   ORG-TCCC1-AP
org-name:       Tencent Cloud Computing (Beijing) Co., Ltd
org-type:       LIR
country:        CN
address:        309 West Zone, 3F. 49 Zhichun Road. Haidian District.
phone:          +86-10-62671299
fax-no:         +86-10-82602088-41299
e-mail:         tencent_idc@tencent.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:21Z
source:         APNIC

role:           ABUSE TENCENTCN
country:        ZZ
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
phone:          +000000000
e-mail:         tencent_noc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        AT992-AP
remarks:        Generated from irt object IRT-TENCENT-CN
remarks:        abuse@tencent.com was validated on 2025-10-29
remarks:        tencent_noc@tencent.com was validated on 2025-10-29
abuse-mailbox:  abuse@tencent.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-29T07:07:38Z
source:         APNIC

role:           Tencent Cloud administrator
address:        Floor 6, Yinke Building, 38 Haidian St, Haidian District, Beijing Beijing 100080
country:        CN
phone:          +86-10-62671299
e-mail:         tencent_idc@tencent.com
admin-c:        TCA15-AP
tech-c:         TCA15-AP
nic-hdl:        TCA15-AP
mnt-by:         MAINT-AP-DIALPAD
fax-no:         +86-10-62671299
last-modified:  2017-04-04T10:34:03Z
source:         APNIC

% Information related to '101.42.0.0/15AS45090'

route:          101.42.0.0/15
origin:         AS45090
descr:          Tencent Cloud Computing (Beijing) Co., Ltd
                309 West Zone, 3F. 49 Zhichun Road. Haidian District.
mnt-by:         MAINT-TENCENT-CN
last-modified:  2020-02-24T07:34:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.42.45.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.42.45.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 16:57:16 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 144.45.42.101.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.45.42.101.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.54.155.223 attackspam
Aug 14 05:32:06 OPSO sshd\[31462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.155.223  user=admin
Aug 14 05:32:07 OPSO sshd\[31462\]: Failed password for admin from 113.54.155.223 port 39748 ssh2
Aug 14 05:37:40 OPSO sshd\[32164\]: Invalid user jobsubmit from 113.54.155.223 port 58524
Aug 14 05:37:40 OPSO sshd\[32164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.155.223
Aug 14 05:37:43 OPSO sshd\[32164\]: Failed password for invalid user jobsubmit from 113.54.155.223 port 58524 ssh2
2019-08-14 11:42:39
118.70.171.69 attackspam
Unauthorized connection attempt from IP address 118.70.171.69 on Port 445(SMB)
2019-08-14 11:31:08
18.139.23.173 attackspam
Automatic report - Banned IP Access
2019-08-14 12:16:21
205.237.93.1 attackbots
Automatic report - Banned IP Access
2019-08-14 11:52:30
59.48.153.231 attackspambots
Aug 13 21:57:28 aat-srv002 sshd[3379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.48.153.231
Aug 13 21:57:31 aat-srv002 sshd[3379]: Failed password for invalid user support from 59.48.153.231 port 29141 ssh2
Aug 13 22:03:28 aat-srv002 sshd[3557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.48.153.231
Aug 13 22:03:29 aat-srv002 sshd[3557]: Failed password for invalid user ji from 59.48.153.231 port 43471 ssh2
...
2019-08-14 11:46:11
51.68.173.108 attackbotsspam
Aug 14 05:32:15 vps647732 sshd[9858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
Aug 14 05:32:17 vps647732 sshd[9858]: Failed password for invalid user art from 51.68.173.108 port 36100 ssh2
...
2019-08-14 11:58:27
67.205.195.40 attack
Aug 14 05:03:21 nextcloud sshd\[6482\]: Invalid user meika from 67.205.195.40
Aug 14 05:03:21 nextcloud sshd\[6482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.195.40
Aug 14 05:03:23 nextcloud sshd\[6482\]: Failed password for invalid user meika from 67.205.195.40 port 41180 ssh2
...
2019-08-14 11:50:11
119.193.78.15 attackbots
" "
2019-08-14 11:54:31
118.89.228.250 attackbotsspam
2019-08-14T03:40:54.408471abusebot-8.cloudsearch.cf sshd\[6824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.228.250  user=root
2019-08-14 12:14:20
36.68.170.150 attackspam
Unauthorized connection attempt from IP address 36.68.170.150 on Port 445(SMB)
2019-08-14 12:06:15
35.231.252.44 attackspambots
xmlrpc attack
2019-08-14 11:41:03
59.20.189.173 attackbots
DATE:2019-08-14 05:03:24, IP:59.20.189.173, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-08-14 11:51:24
104.238.97.230 attackbotsspam
NAME : GO-DADDY-COM-LLC CIDR : 104.238.64.0/18 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack USA - Arizona - block certain countries :) IP: 104.238.97.230  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-14 12:02:20
182.156.218.102 attackspam
Unauthorized connection attempt from IP address 182.156.218.102 on Port 445(SMB)
2019-08-14 11:57:35
85.70.251.149 attack
Unauthorized connection attempt from IP address 85.70.251.149 on Port 445(SMB)
2019-08-14 11:32:53

Recently Reported IPs

106.75.10.182 120.53.108.28 106.75.247.182 42.247.111.130
2606:4700:10::6814:6854 141.11.140.44 192.168.100.46 80.66.76.105
2606:4700:10::6816:54 210.58.226.105 94.34.167.110 9.252.1.141
55.232.161.205 53.239.220.70 45.135.228.212 45.135.228.0
41.164.98.50 110.78.158.61 2606:4700:10::6814:9208 2606:4700:10::ac43:2688