Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.42.67.243 attackbotsspam
04/16/2020-23:53:23.313703 112.42.67.243 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-17 17:45:21
112.42.6.41 attackbotsspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 56 - Sun Jul 15 01:35:18 2018
2020-02-27 22:35:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.42.6.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.42.6.52.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:13:37 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 52.6.42.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 52.6.42.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.192.231.132 attackbotsspam
Brute-force attempt banned
2020-01-13 18:26:34
223.206.222.147 attackbots
Honeypot attack, port: 445, PTR: mx-ll-223.206.222-147.dynamic.3bb.in.th.
2020-01-13 18:05:35
111.161.74.100 attackspam
Unauthorized connection attempt detected from IP address 111.161.74.100 to port 2220 [J]
2020-01-13 17:59:23
101.64.40.185 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-13 18:31:43
113.87.161.180 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 17:58:57
49.88.160.174 attackbots
Brute force SMTP login attempts.
2020-01-13 18:06:32
89.111.238.188 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 18:01:47
100.33.80.80 attackbots
Unauthorized connection attempt detected from IP address 100.33.80.80 to port 5555 [J]
2020-01-13 18:06:15
45.171.124.30 attack
Unauthorized connection attempt detected from IP address 45.171.124.30 to port 23
2020-01-13 17:52:40
183.6.162.202 attackbots
Unauthorized connection attempt detected from IP address 183.6.162.202 to port 22 [T]
2020-01-13 17:57:44
142.4.209.40 attack
wordpress exploit scan
2020-01-13 17:59:37
178.207.9.210 attack
Unauthorised access (Jan 13) SRC=178.207.9.210 LEN=44 TTL=243 ID=37557 TCP DPT=139 WINDOW=1024 SYN
2020-01-13 18:18:33
222.86.159.208 attackbots
Unauthorized connection attempt detected from IP address 222.86.159.208 to port 2220 [J]
2020-01-13 17:54:45
54.36.182.244 attack
Unauthorized connection attempt detected from IP address 54.36.182.244 to port 2220 [J]
2020-01-13 18:10:03
67.205.138.198 attackbotsspam
Unauthorized connection attempt detected from IP address 67.205.138.198 to port 2220 [J]
2020-01-13 17:55:47

Recently Reported IPs

117.205.110.231 52.113.202.241 45.120.16.245 93.67.135.62
186.33.78.12 27.116.16.179 114.119.146.158 154.201.34.176
194.104.10.175 36.99.136.136 175.15.240.243 60.254.22.147
125.40.112.224 193.202.87.19 171.242.24.98 13.82.239.207
178.91.244.32 3.38.201.48 103.36.35.134 91.109.149.97