Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Harbin

Region: Heilongjiang

Country: China

Internet Service Provider: China Mobile Communications Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
GPON Home Routers Remote Code Execution Vulnerability
2020-04-02 05:51:06
Comments on same subnet:
IP Type Details Datetime
111.42.102.79 attackspam
User agent spoofing, Connecting to IP instead of domain name, Page: /HNAP1/
2020-05-07 01:14:37
111.42.102.67 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-04-25 03:32:16
111.42.102.153 attackbots
Unauthorized connection attempt detected from IP address 111.42.102.153 to port 2323 [J]
2020-01-23 00:28:39
111.42.102.142 attack
unauthorized connection attempt
2020-01-09 17:44:14
111.42.102.65 attack
Unauthorized connection attempt detected from IP address 111.42.102.65 to port 23 [T]
2020-01-09 01:59:28
111.42.102.128 attackspam
Jan  5 22:51:44 debian-2gb-nbg1-2 kernel: \[520425.417666\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.42.102.128 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0xE0 TTL=49 ID=36552 PROTO=TCP SPT=1600 DPT=23 WINDOW=57023 RES=0x00 SYN URGP=0
2020-01-06 05:54:28
111.42.102.129 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-05 00:45:19
111.42.102.81 attackbots
Dec 26 15:50:33 h2177944 kernel: \[570559.418076\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40763 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Dec 26 15:50:33 h2177944 kernel: \[570559.418089\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40763 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Dec 26 15:50:36 h2177944 kernel: \[570562.569922\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40764 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Dec 26 15:50:36 h2177944 kernel: \[570562.569936\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40764 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Dec 26 15:50:43 h2177944 kernel: \[570568.878485\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=
2019-12-27 03:21:44
111.42.102.134 attack
5060/udp
[2019-12-13]1pkt
2019-12-14 00:53:02
111.42.102.140 attackspam
23/tcp
[2019-12-12]1pkt
2019-12-13 00:29:39
111.42.102.145 attack
Automatic report - Port Scan Attack
2019-12-11 13:17:16
111.42.102.74 attack
Mirai and Reaper Exploitation Traffic
2019-11-23 05:19:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.42.102.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;111.42.102.127.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040101 1800 900 604800 86400

;; Query time: 158 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 05:51:01 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 127.102.42.111.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 127.102.42.111.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
186.29.157.129 attackbotsspam
unauthorized connection attempt
2020-02-19 16:47:42
36.77.92.35 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-19 16:38:50
116.106.245.203 attackbots
unauthorized connection attempt
2020-02-19 16:51:06
185.102.219.172 spambotsattackproxynormal
iCloud support app
2020-02-19 17:17:18
180.182.220.130 attack
unauthorized connection attempt
2020-02-19 16:49:20
194.186.160.132 attack
unauthorized connection attempt
2020-02-19 16:39:44
77.160.240.236 attack
unauthorized connection attempt
2020-02-19 16:54:37
181.206.33.10 attackbots
unauthorized connection attempt
2020-02-19 16:48:07
62.11.53.233 attack
unauthorized connection attempt
2020-02-19 17:17:43
210.183.89.42 attack
Unauthorized connection attempt detected from IP address 210.183.89.42 to port 23
2020-02-19 17:02:20
111.241.69.60 attack
port 23
2020-02-19 16:52:02
181.114.219.19 attack
unauthorized connection attempt
2020-02-19 17:05:41
1.1.140.126 attackspambots
unauthorized connection attempt
2020-02-19 16:59:24
222.255.121.146 attackspam
firewall-block, port(s): 1433/tcp
2020-02-19 16:59:55
220.133.184.52 attack
unauthorized connection attempt
2020-02-19 16:39:21

Recently Reported IPs

35.163.119.16 36.83.159.194 86.75.182.206 108.161.136.178
186.133.196.184 119.51.241.126 145.53.13.127 5.162.130.168
13.84.165.188 46.177.32.44 184.102.54.42 86.122.50.105
47.204.254.121 64.113.47.233 188.255.50.165 81.150.218.50
125.179.51.23 177.138.76.49 164.132.108.195 162.21.211.6