Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '110.42.0.0 - 110.42.127.255'

% Abuse contact for '110.42.0.0 - 110.42.127.255' is 'noc@nbgaofang.com'

inetnum:        110.42.0.0 - 110.42.127.255
netname:        nbgaofang
descr:          Ningbo Zhuo Zhi Innovation Network Technology Co., Ltd
descr:          1088-13 No.1558 Jiangnan Road,NingBo,China
country:        CN
admin-c:        YW7352-AP
tech-c:         JS3943-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-NBGAOFANG-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2024-06-24T06:41:30Z
source:         APNIC

irt:            IRT-nbgaofang-CN
address:        1088-13 No.1558 Jiangnan Road,NingBo,China
e-mail:         noc@nbgaofang.com
abuse-mailbox:  noc@nbgaofang.com
admin-c:        YW7352-AP
tech-c:         JS3943-AP
auth:           # Filtered
mnt-by:         MAINT-CNNIC-AP
last-modified:  2024-06-24T06:41:30Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Tianyuan Wu
address:        1088-13 No.1558 Jiangnan Road,NingBo,China
country:        CN
phone:          +86-0574-88093323
e-mail:         noc@nbgaofang.com
nic-hdl:        JS3943-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2017-03-16T01:56:02Z
source:         APNIC

person:         sean lin
address:        088-13 No.1558 Jiangnan Road,NingBo,China
country:        CN
phone:          +86-18067210136
e-mail:         op@6736.com
nic-hdl:        YW7352-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2024-06-24T07:52:54Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.42.43.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;110.42.43.231.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 14:30:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 231.43.42.110.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 231.43.42.110.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.111.241.107 attackspambots
Hits on port : 6023
2020-06-06 13:28:17
185.175.93.14 attackspam
06/06/2020-01:29:29.756436 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-06 13:34:43
185.216.140.70 attackbotsspam
slow and persistent scanner
2020-06-06 13:04:56
185.97.116.165 attack
2020-06-06T04:50:22.610592shield sshd\[26238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165  user=root
2020-06-06T04:50:24.108597shield sshd\[26238\]: Failed password for root from 185.97.116.165 port 55712 ssh2
2020-06-06T04:54:17.637557shield sshd\[27629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165  user=root
2020-06-06T04:54:19.396471shield sshd\[27629\]: Failed password for root from 185.97.116.165 port 57414 ssh2
2020-06-06T04:58:24.614645shield sshd\[28604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165  user=root
2020-06-06 13:07:00
173.249.53.80 attack
Jun  4 14:24:15 cumulus sshd[7912]: Did not receive identification string from 173.249.53.80 port 33458
Jun  4 14:24:15 cumulus sshd[7913]: Did not receive identification string from 173.249.53.80 port 55954
Jun  4 14:24:15 cumulus sshd[7915]: Did not receive identification string from 173.249.53.80 port 37450
Jun  4 14:24:15 cumulus sshd[7914]: Did not receive identification string from 173.249.53.80 port 53188
Jun  4 14:24:15 cumulus sshd[7916]: Did not receive identification string from 173.249.53.80 port 60632
Jun  4 14:24:15 cumulus sshd[7918]: Did not receive identification string from 173.249.53.80 port 37092
Jun  4 14:24:15 cumulus sshd[7917]: Did not receive identification string from 173.249.53.80 port 54396
Jun  4 14:25:15 cumulus sshd[7981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.53.80  user=r.r
Jun  4 14:25:15 cumulus sshd[7983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=s........
-------------------------------
2020-06-06 13:17:43
64.227.2.96 attackspambots
Jun  6 06:36:47 abendstille sshd\[17677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  user=root
Jun  6 06:36:49 abendstille sshd\[17677\]: Failed password for root from 64.227.2.96 port 37478 ssh2
Jun  6 06:40:55 abendstille sshd\[21774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  user=root
Jun  6 06:40:58 abendstille sshd\[21774\]: Failed password for root from 64.227.2.96 port 41166 ssh2
Jun  6 06:45:11 abendstille sshd\[26061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  user=root
...
2020-06-06 13:02:37
83.97.20.35 attackspam
Jun  6 07:07:03 debian-2gb-nbg1-2 kernel: \[13678773.700107\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.35 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=53006 DPT=9595 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-06 13:11:26
119.235.91.95 attackbotsspam
1591417150 - 06/06/2020 06:19:10 Host: 119.235.91.95/119.235.91.95 Port: 445 TCP Blocked
2020-06-06 13:22:25
13.76.221.79 attackbots
2020-06-06T05:22:31.641802shield sshd\[2591\]: Invalid user chile\\r from 13.76.221.79 port 21926
2020-06-06T05:22:31.645686shield sshd\[2591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.221.79
2020-06-06T05:22:33.629861shield sshd\[2591\]: Failed password for invalid user chile\\r from 13.76.221.79 port 21926 ssh2
2020-06-06T05:24:20.324394shield sshd\[2994\]: Invalid user Pa\$\$w0rd2020\\r from 13.76.221.79 port 33976
2020-06-06T05:24:20.328021shield sshd\[2994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.221.79
2020-06-06 13:28:45
189.237.120.119 attackbots
Jun  6 09:18:56 gw1 sshd[21298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.237.120.119
Jun  6 09:18:58 gw1 sshd[21298]: Failed password for invalid user new123$%^\r from 189.237.120.119 port 39006 ssh2
...
2020-06-06 13:38:31
183.82.149.121 attackbots
Jun  5 18:50:59 sachi sshd\[6368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.121  user=root
Jun  5 18:51:01 sachi sshd\[6368\]: Failed password for root from 183.82.149.121 port 39720 ssh2
Jun  5 18:55:04 sachi sshd\[6674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.121  user=root
Jun  5 18:55:06 sachi sshd\[6674\]: Failed password for root from 183.82.149.121 port 42730 ssh2
Jun  5 18:59:07 sachi sshd\[6977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.121  user=root
2020-06-06 13:09:41
222.186.180.8 attack
Jun  6 07:21:23 minden010 sshd[13144]: Failed password for root from 222.186.180.8 port 60964 ssh2
Jun  6 07:21:26 minden010 sshd[13144]: Failed password for root from 222.186.180.8 port 60964 ssh2
Jun  6 07:21:37 minden010 sshd[13144]: Failed password for root from 222.186.180.8 port 60964 ssh2
Jun  6 07:21:37 minden010 sshd[13144]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 60964 ssh2 [preauth]
...
2020-06-06 13:24:15
112.186.79.4 attackbotsspam
Jun  5 19:13:48 sachi sshd\[8281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4  user=root
Jun  5 19:13:51 sachi sshd\[8281\]: Failed password for root from 112.186.79.4 port 55844 ssh2
Jun  5 19:18:06 sachi sshd\[8614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4  user=root
Jun  5 19:18:08 sachi sshd\[8614\]: Failed password for root from 112.186.79.4 port 57814 ssh2
Jun  5 19:22:16 sachi sshd\[8928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4  user=root
2020-06-06 13:22:46
62.210.112.34 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-06 13:34:17
192.35.168.102 attackspambots
Hits on port : 110
2020-06-06 13:26:45

Recently Reported IPs

10.12.100.122 183.15.178.6 10.3.12.3 115.192.61.8
129.222.116.169 47.120.31.77 109.105.210.92 140.249.219.201
110.7.106.170 110.7.106.209 54.189.221.247 34.38.38.180
194.92.43.186 194.187.179.160 14.212.92.198 14.220.183.124
159.203.90.251 27.46.75.9 122.53.218.236 23.39.210.15