Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.48.42.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.48.42.142.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:41:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 142.42.48.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 142.42.48.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
183.6.107.68 attackbots
Jan 25 15:08:03 pkdns2 sshd\[10414\]: Invalid user git from 183.6.107.68Jan 25 15:08:05 pkdns2 sshd\[10414\]: Failed password for invalid user git from 183.6.107.68 port 53390 ssh2Jan 25 15:11:43 pkdns2 sshd\[10618\]: Invalid user lxm from 183.6.107.68Jan 25 15:11:46 pkdns2 sshd\[10618\]: Failed password for invalid user lxm from 183.6.107.68 port 50358 ssh2Jan 25 15:15:42 pkdns2 sshd\[10843\]: Invalid user rapa from 183.6.107.68Jan 25 15:15:44 pkdns2 sshd\[10843\]: Failed password for invalid user rapa from 183.6.107.68 port 47506 ssh2
...
2020-01-25 21:36:43
112.85.42.188 attackbotsspam
01/25/2020-08:46:03.830681 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-25 21:47:51
117.102.64.98 attackspambots
20/1/25@08:15:22: FAIL: Alarm-Network address from=117.102.64.98
20/1/25@08:15:23: FAIL: Alarm-Network address from=117.102.64.98
...
2020-01-25 22:09:25
46.38.144.179 attackbotsspam
Jan 25 14:03:45 blackbee postfix/smtpd\[7676\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: authentication failure
Jan 25 14:04:16 blackbee postfix/smtpd\[7678\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: authentication failure
Jan 25 14:04:53 blackbee postfix/smtpd\[7676\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: authentication failure
Jan 25 14:05:27 blackbee postfix/smtpd\[7571\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: authentication failure
Jan 25 14:06:01 blackbee postfix/smtpd\[7676\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: authentication failure
...
2020-01-25 22:13:21
124.109.33.146 attack
Honeypot attack, port: 445, PTR: mbl-109-33-146.dsl.net.pk.
2020-01-25 21:40:36
31.129.80.248 attackbots
Honeypot attack, port: 5555, PTR: ip-31-80-248.dnepro.net.
2020-01-25 22:05:58
220.124.100.90 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-25 22:14:14
195.154.38.177 attack
Jan 25 16:15:18 hosting sshd[23231]: Invalid user min from 195.154.38.177 port 44988
...
2020-01-25 22:15:38
91.214.223.247 attackbots
Unauthorized connection attempt from IP address 91.214.223.247 on Port 445(SMB)
2020-01-25 21:48:09
103.52.254.43 attackbots
Unauthorized connection attempt from IP address 103.52.254.43 on Port 445(SMB)
2020-01-25 21:41:55
177.157.52.13 attackbotsspam
Honeypot attack, port: 445, PTR: 177.157.52.13.dynamic.adsl.gvt.net.br.
2020-01-25 22:08:24
61.227.207.17 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-01-2020 13:15:17.
2020-01-25 22:17:02
68.183.236.29 attackbotsspam
Jan 25 14:25:17 meumeu sshd[25978]: Failed password for root from 68.183.236.29 port 47432 ssh2
Jan 25 14:27:34 meumeu sshd[26292]: Failed password for git from 68.183.236.29 port 39848 ssh2
...
2020-01-25 21:35:09
196.235.85.232 attackspambots
Unauthorized connection attempt from IP address 196.235.85.232 on Port 445(SMB)
2020-01-25 22:04:08
66.162.2.6 attackspambots
Unauthorized connection attempt from IP address 66.162.2.6 on Port 445(SMB)
2020-01-25 22:15:10

Recently Reported IPs

177.190.201.116 163.204.210.130 104.201.19.26 189.207.20.143
105.73.80.249 45.116.114.23 180.121.143.104 165.0.20.2
2.225.20.46 185.189.112.133 187.176.6.215 114.218.52.90
179.171.72.178 92.60.179.211 205.185.118.129 79.10.27.34
41.40.74.71 103.62.233.206 88.255.140.130 202.137.115.76