Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.40.10.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.40.10.42.			IN	A

;; AUTHORITY SECTION:
.			45	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 06:33:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 42.10.40.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.10.40.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.229.131 attack
Unauthorized connection attempt detected from IP address 192.241.229.131 to port 2638
2020-03-13 08:29:03
49.235.16.103 attackspambots
Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: Invalid user at from 49.235.16.103
Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103
Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: Invalid user at from 49.235.16.103
Mar 12 22:03:38 srv-ubuntu-dev3 sshd[60088]: Failed password for invalid user at from 49.235.16.103 port 43374 ssh2
Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: Invalid user testuser from 49.235.16.103
Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103
Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: Invalid user testuser from 49.235.16.103
Mar 12 22:05:54 srv-ubuntu-dev3 sshd[60418]: Failed password for invalid user testuser from 49.235.16.103 port 42756 ssh2
...
2020-03-13 08:09:22
210.74.11.97 attackbots
Invalid user ftpusr from 210.74.11.97 port 37382
2020-03-13 08:21:33
118.163.176.97 attack
Mar 13 00:14:19 mout sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.176.97  user=root
Mar 13 00:14:21 mout sshd[22565]: Failed password for root from 118.163.176.97 port 38368 ssh2
Mar 13 00:37:34 mout sshd[23991]: Invalid user admin from 118.163.176.97 port 34166
2020-03-13 08:08:02
192.241.254.155 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-13 08:16:54
223.71.167.164 attackspambots
Mar 12 23:48:22 mail postfix/submission/smtpd[91207]: lost connection after UNKNOWN from unknown[223.71.167.164]
2020-03-13 08:19:52
51.91.110.249 attack
2020-03-12T22:06:06.865818  sshd[28306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.249  user=root
2020-03-12T22:06:08.263581  sshd[28306]: Failed password for root from 51.91.110.249 port 59416 ssh2
2020-03-12T22:08:15.460594  sshd[28328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.249  user=root
2020-03-12T22:08:17.902021  sshd[28328]: Failed password for root from 51.91.110.249 port 53830 ssh2
...
2020-03-13 08:08:55
144.91.97.19 attack
Mar 12 22:47:31 vmd48417 sshd[29228]: Failed password for root from 144.91.97.19 port 36446 ssh2
2020-03-13 08:17:19
106.13.117.17 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-03-13 08:26:54
183.116.126.117 attackspam
Mar 12 21:08:13 system,error,critical: login failure for user root from 183.116.126.117 via telnet
Mar 12 21:08:13 system,error,critical: login failure for user root from 183.116.126.117 via telnet
Mar 12 21:08:16 system,error,critical: login failure for user admin from 183.116.126.117 via telnet
Mar 12 21:08:17 system,error,critical: login failure for user admin from 183.116.126.117 via telnet
Mar 12 21:08:18 system,error,critical: login failure for user admin from 183.116.126.117 via telnet
Mar 12 21:08:20 system,error,critical: login failure for user admin from 183.116.126.117 via telnet
Mar 12 21:08:22 system,error,critical: login failure for user root from 183.116.126.117 via telnet
Mar 12 21:08:23 system,error,critical: login failure for user admin from 183.116.126.117 via telnet
Mar 12 21:08:28 system,error,critical: login failure for user root from 183.116.126.117 via telnet
Mar 12 21:08:28 system,error,critical: login failure for user root from 183.116.126.117 via telnet
2020-03-13 08:01:34
36.77.26.243 attack
20/3/12@19:19:16: FAIL: Alarm-Network address from=36.77.26.243
...
2020-03-13 08:42:47
198.108.66.231 attack
Portscan or hack attempt detected by psad/fwsnort
2020-03-13 08:21:48
61.218.32.119 attackbots
Mar 12 18:10:09 askasleikir sshd[76900]: Failed password for root from 61.218.32.119 port 57744 ssh2
Mar 12 18:06:57 askasleikir sshd[76739]: Failed password for invalid user applmgr from 61.218.32.119 port 57824 ssh2
Mar 12 17:55:34 askasleikir sshd[76147]: Failed password for invalid user zju from 61.218.32.119 port 56742 ssh2
2020-03-13 08:32:06
51.68.65.174 attack
Mar 13 00:23:58 mail sshd\[742\]: Invalid user diego from 51.68.65.174
Mar 13 00:23:58 mail sshd\[742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.65.174
Mar 13 00:24:00 mail sshd\[742\]: Failed password for invalid user diego from 51.68.65.174 port 60136 ssh2
...
2020-03-13 08:38:04
123.31.41.20 attack
Invalid user yaoyiming from 123.31.41.20 port 63005
2020-03-13 08:37:01

Recently Reported IPs

178.84.1.248 197.35.83.33 101.46.224.0 104.145.4.65
92.77.230.132 67.115.93.153 84.169.117.116 143.24.18.181
164.222.90.255 252.33.79.114 111.167.248.151 63.230.43.120
244.143.242.189 29.50.55.30 201.54.0.125 129.48.80.255
58.52.187.79 67.252.25.20 236.132.208.75 218.157.161.81