Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.42.22.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.42.22.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 00:43:14 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 12.22.42.111.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 12.22.42.111.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
202.79.168.240 attack
Apr  8 12:12:31 MainVPS sshd[17842]: Invalid user admin from 202.79.168.240 port 53758
Apr  8 12:12:31 MainVPS sshd[17842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.79.168.240
Apr  8 12:12:31 MainVPS sshd[17842]: Invalid user admin from 202.79.168.240 port 53758
Apr  8 12:12:33 MainVPS sshd[17842]: Failed password for invalid user admin from 202.79.168.240 port 53758 ssh2
Apr  8 12:19:27 MainVPS sshd[31520]: Invalid user ubuntu from 202.79.168.240 port 36886
...
2020-04-08 19:36:57
159.89.10.77 attack
Apr  7 23:51:13 lanister sshd[1865]: Failed password for invalid user sam from 159.89.10.77 port 59826 ssh2
Apr  7 23:51:12 lanister sshd[1865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.10.77
Apr  7 23:51:12 lanister sshd[1865]: Invalid user sam from 159.89.10.77
Apr  7 23:51:13 lanister sshd[1865]: Failed password for invalid user sam from 159.89.10.77 port 59826 ssh2
2020-04-08 19:51:47
45.95.168.245 attack
Unauthorized connection attempt detected from IP address 45.95.168.245 to port 22
2020-04-08 19:31:54
111.67.207.242 attackbots
IP blocked
2020-04-08 19:45:45
222.244.199.178 attackspam
Honeypot hit.
2020-04-08 19:50:51
92.63.194.94 attackbots
Apr  8 13:43:34 srv206 sshd[13541]: Invalid user admin from 92.63.194.94
...
2020-04-08 19:44:02
45.148.10.197 attack
Apr  8 12:55:14 vps sshd[407984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.197
Apr  8 12:55:17 vps sshd[407984]: Failed password for invalid user admin from 45.148.10.197 port 59548 ssh2
Apr  8 12:55:17 vps sshd[408278]: Invalid user admin from 45.148.10.197 port 50120
Apr  8 12:55:17 vps sshd[408278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.197
Apr  8 12:55:20 vps sshd[408278]: Failed password for invalid user admin from 45.148.10.197 port 50120 ssh2
...
2020-04-08 19:04:42
68.183.229.218 attack
2020-04-08T02:29:05.566149linuxbox-skyline sshd[14475]: Invalid user test from 68.183.229.218 port 41146
...
2020-04-08 19:34:55
222.186.175.140 attackspambots
(sshd) Failed SSH login from 222.186.175.140 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  8 13:46:35 amsweb01 sshd[370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Apr  8 13:46:37 amsweb01 sshd[370]: Failed password for root from 222.186.175.140 port 31942 ssh2
Apr  8 13:46:40 amsweb01 sshd[370]: Failed password for root from 222.186.175.140 port 31942 ssh2
Apr  8 13:46:43 amsweb01 sshd[370]: Failed password for root from 222.186.175.140 port 31942 ssh2
Apr  8 13:46:47 amsweb01 sshd[370]: Failed password for root from 222.186.175.140 port 31942 ssh2
2020-04-08 19:50:19
81.16.10.158 attackbots
CMS (WordPress or Joomla) login attempt.
2020-04-08 19:31:17
139.59.2.184 attackbots
ssh intrusion attempt
2020-04-08 19:40:38
165.22.211.237 attackbots
2020-04-08T10:41:11Z - RDP login failed multiple times. (165.22.211.237)
2020-04-08 19:26:43
181.30.28.120 attackbots
Apr  8 06:34:27 vps46666688 sshd[25318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.120
Apr  8 06:34:29 vps46666688 sshd[25318]: Failed password for invalid user tom from 181.30.28.120 port 38692 ssh2
...
2020-04-08 19:28:15
92.63.194.91 attack
Unauthorized connection attempt detected from IP address 92.63.194.91 to port 22 [T]
2020-04-08 19:52:04
112.17.184.171 attackbotsspam
Brute force attempt
2020-04-08 19:24:59

Recently Reported IPs

108.87.153.121 11.222.124.182 110.205.92.59 98.83.37.133
42.253.112.166 42.21.45.113 223.39.11.16 204.1.52.194
215.204.18.228 20.199.38.229 163.195.24.139 14.35.128.111
26.136.72.103 150.135.12.77 14.190.84.109 114.7.186.192
121.236.187.243 79.198.173.14 77.0.98.199 7.42.237.158