Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.141.42.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.141.42.12.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:49:08 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 12.42.141.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.42.141.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.178.63.100 attackbotsspam
Unauthorized connection attempt from IP address 41.178.63.100 on Port 445(SMB)
2019-12-07 04:13:56
60.168.75.82 attackspam
Seq 2995002506
2019-12-07 03:48:46
192.34.61.49 attackspambots
ssh intrusion attempt
2019-12-07 03:57:59
197.159.12.198 attack
Unauthorized connection attempt from IP address 197.159.12.198 on Port 445(SMB)
2019-12-07 04:08:08
94.253.55.159 attackbotsspam
Automatic report - Port Scan Attack
2019-12-07 04:09:55
104.236.192.6 attackspam
Dec  6 10:00:53 server sshd\[3508\]: Failed password for invalid user edvardsson from 104.236.192.6 port 50984 ssh2
Dec  6 19:23:09 server sshd\[28897\]: Invalid user derrol from 104.236.192.6
Dec  6 19:23:09 server sshd\[28897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.192.6 
Dec  6 19:23:11 server sshd\[28897\]: Failed password for invalid user derrol from 104.236.192.6 port 37704 ssh2
Dec  6 19:29:59 server sshd\[30734\]: Invalid user ftpadmin from 104.236.192.6
...
2019-12-07 03:50:04
58.152.159.231 attackbots
Fail2Ban Ban Triggered
2019-12-07 03:38:10
114.33.143.68 attackspambots
Seq 2995002506
2019-12-07 03:45:58
58.17.112.238 attackspambots
Seq 2995002506
2019-12-07 03:38:47
49.88.112.75 attackspambots
Dec  6 20:56:35 vps666546 sshd\[22339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
Dec  6 20:56:36 vps666546 sshd\[22339\]: Failed password for root from 49.88.112.75 port 36040 ssh2
Dec  6 20:56:39 vps666546 sshd\[22339\]: Failed password for root from 49.88.112.75 port 36040 ssh2
Dec  6 20:56:41 vps666546 sshd\[22339\]: Failed password for root from 49.88.112.75 port 36040 ssh2
Dec  6 20:57:36 vps666546 sshd\[22404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
...
2019-12-07 03:59:54
52.142.216.102 attack
Dec  6 20:37:59 MK-Soft-Root2 sshd[19491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.216.102 
Dec  6 20:38:01 MK-Soft-Root2 sshd[19491]: Failed password for invalid user a9b8c7d6 from 52.142.216.102 port 44086 ssh2
...
2019-12-07 04:13:23
5.88.221.71 attackbotsspam
Automatic report - Port Scan Attack
2019-12-07 04:00:14
159.203.197.25 attackspambots
" "
2019-12-07 03:58:55
115.75.1.196 attack
Unauthorized connection attempt from IP address 115.75.1.196 on Port 445(SMB)
2019-12-07 04:05:55
106.59.243.212 attackspambots
Seq 2995002506
2019-12-07 03:47:10

Recently Reported IPs

113.141.46.7 113.142.103.196 113.141.35.97 113.141.252.63
113.140.42.83 113.141.26.133 113.141.45.174 113.142.178.155
113.142.30.71 113.142.41.71 113.140.44.107 113.142.180.105
113.142.5.7 113.141.197.155 113.142.185.168 113.142.199.69
113.141.184.0 113.142.36.217 113.143.133.2 113.142.23.59