Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yangzhou

Region: Jiangsu

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.20.42.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.20.42.12.			IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 08:45:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 12.42.20.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.42.20.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.170.199.11 attackspambots
23.06.2019 04:32:28 Connection to port 389 blocked by firewall
2019-06-23 12:49:40
213.6.54.242 attackbots
23/tcp 23/tcp 23/tcp
[2019-05-05/06-22]3pkt
2019-06-23 12:35:11
68.183.88.131 attack
Jun 23 06:54:54 server2 sshd\[534\]: User root from 68.183.88.131 not allowed because not listed in AllowUsers
Jun 23 06:54:55 server2 sshd\[536\]: Invalid user admin from 68.183.88.131
Jun 23 06:54:57 server2 sshd\[538\]: Invalid user admin from 68.183.88.131
Jun 23 06:54:58 server2 sshd\[540\]: Invalid user user from 68.183.88.131
Jun 23 06:54:59 server2 sshd\[542\]: Invalid user ubnt from 68.183.88.131
Jun 23 06:55:01 server2 sshd\[544\]: Invalid user admin from 68.183.88.131
2019-06-23 12:37:12
189.198.134.2 attack
445/tcp 445/tcp
[2019-06-18/22]2pkt
2019-06-23 12:26:10
94.176.76.230 attackspam
(Jun 23)  LEN=40 TTL=244 ID=50068 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 23)  LEN=40 TTL=244 ID=5027 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 23)  LEN=40 TTL=244 ID=27829 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=5358 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=7561 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=8651 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=22480 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=45239 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=44605 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=61580 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=244 ID=56463 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=244 ID=11269 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=244 ID=61785 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=244 ID=7175 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=244 ID=65298 DF TCP DPT=23 WINDOW=14600 SYN 
...
2019-06-23 12:56:24
183.82.250.61 attack
ports scanning
2019-06-23 12:30:51
45.119.212.105 attackspambots
$f2bV_matches
2019-06-23 12:48:19
170.82.7.250 attack
23/tcp 8080/tcp...
[2019-05-03/06-22]5pkt,2pt.(tcp)
2019-06-23 12:42:25
191.208.30.172 attackspambots
ports scanning
2019-06-23 12:54:51
60.29.241.2 attack
Jun 23 02:07:24 tux-35-217 sshd\[8185\]: Invalid user marek from 60.29.241.2 port 12618
Jun 23 02:07:24 tux-35-217 sshd\[8185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.241.2
Jun 23 02:07:26 tux-35-217 sshd\[8185\]: Failed password for invalid user marek from 60.29.241.2 port 12618 ssh2
Jun 23 02:13:31 tux-35-217 sshd\[8254\]: Invalid user rot from 60.29.241.2 port 57063
Jun 23 02:13:31 tux-35-217 sshd\[8254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.241.2
...
2019-06-23 12:57:20
177.11.188.186 attackspam
23.06.2019 02:14:11 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-23 12:36:29
104.239.230.235 attack
fail2ban honeypot
2019-06-23 12:24:29
222.188.98.45 attackspambots
20 attempts against mh-ssh on light.magehost.pro
2019-06-23 13:02:58
139.99.107.166 attack
2019-06-22T21:14:18.819094mizuno.rwx.ovh sshd[13384]: Connection from 139.99.107.166 port 47696 on 78.46.61.178 port 22
2019-06-22T21:14:19.991617mizuno.rwx.ovh sshd[13384]: Invalid user bartek from 139.99.107.166 port 47696
2019-06-22T21:14:19.999356mizuno.rwx.ovh sshd[13384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.107.166
2019-06-22T21:14:18.819094mizuno.rwx.ovh sshd[13384]: Connection from 139.99.107.166 port 47696 on 78.46.61.178 port 22
2019-06-22T21:14:19.991617mizuno.rwx.ovh sshd[13384]: Invalid user bartek from 139.99.107.166 port 47696
2019-06-22T21:14:22.584833mizuno.rwx.ovh sshd[13384]: Failed password for invalid user bartek from 139.99.107.166 port 47696 ssh2
...
2019-06-23 12:31:28
177.103.220.193 attack
proto=tcp  .  spt=43986  .  dpt=25  .     (listed on Blocklist de  Jun 22)     (40)
2019-06-23 13:04:43

Recently Reported IPs

112.20.225.129 112.20.68.245 112.20.76.35 112.20.76.53
112.200.12.210 112.200.138.113 112.200.15.31 85.216.176.227
112.238.233.200 112.238.243.135 112.238.5.192 112.238.90.12
112.238.92.47 112.239.102.23 112.239.113.28 112.239.113.34
112.239.114.3 112.239.121.154 112.239.121.178 112.239.122.153