Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Quanzhou

Region: Fujian

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.42.194.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.42.194.12.			IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022082601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 27 11:09:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.194.42.120.in-addr.arpa domain name pointer 12.194.42.120.broad.qz.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.194.42.120.in-addr.arpa	name = 12.194.42.120.broad.qz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.101.140.227 attackspam
Oct 29 10:58:49 server sshd\[13791\]: Invalid user ulia from 5.101.140.227
Oct 29 10:58:49 server sshd\[13791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.140.227 
Oct 29 10:58:51 server sshd\[13791\]: Failed password for invalid user ulia from 5.101.140.227 port 39792 ssh2
Oct 29 11:18:17 server sshd\[18388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.140.227  user=root
Oct 29 11:18:19 server sshd\[18388\]: Failed password for root from 5.101.140.227 port 54100 ssh2
...
2019-10-29 16:23:16
178.62.9.122 attackbots
Automatic report - Banned IP Access
2019-10-29 16:32:52
148.72.23.181 attackbotsspam
C1,WP GET /suche/wp-login.php
2019-10-29 16:11:05
67.55.92.89 attack
Oct 29 08:26:55 dev0-dcde-rnet sshd[6450]: Failed password for root from 67.55.92.89 port 43092 ssh2
Oct 29 08:30:48 dev0-dcde-rnet sshd[6464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
Oct 29 08:30:50 dev0-dcde-rnet sshd[6464]: Failed password for invalid user com from 67.55.92.89 port 54020 ssh2
2019-10-29 16:37:45
217.68.209.233 attack
slow and persistent scanner
2019-10-29 16:32:40
87.21.28.48 attackspam
Port scan
2019-10-29 16:35:59
43.246.143.70 attackbots
SMB Server BruteForce Attack
2019-10-29 16:40:33
132.232.54.102 attackbots
2019-10-29T06:26:58.204447abusebot-5.cloudsearch.cf sshd\[29328\]: Invalid user hky from 132.232.54.102 port 32920
2019-10-29 16:30:21
91.188.194.236 attackspambots
slow and persistent scanner
2019-10-29 16:13:34
203.230.6.175 attackbotsspam
Oct 29 07:16:04 vps01 sshd[1079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175
Oct 29 07:16:06 vps01 sshd[1079]: Failed password for invalid user essen from 203.230.6.175 port 35132 ssh2
2019-10-29 16:40:02
52.46.35.86 attackspam
Automatic report generated by Wazuh
2019-10-29 16:22:23
94.176.77.55 attackbots
(Oct 29)  LEN=40 TTL=244 ID=63334 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 29)  LEN=40 TTL=244 ID=33735 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 29)  LEN=40 TTL=244 ID=52919 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 29)  LEN=40 TTL=244 ID=6760 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 29)  LEN=40 TTL=244 ID=51866 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 29)  LEN=40 TTL=244 ID=27864 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=44863 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=29462 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=47286 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=28108 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=60590 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=39542 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=9768 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=35268 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 28)  LEN=40 TTL=244 ID=64302 DF TCP DPT=23 WINDOW=14600 SY...
2019-10-29 16:23:52
188.166.117.213 attackspam
Oct 29 08:46:06 fr01 sshd[8406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213  user=root
Oct 29 08:46:08 fr01 sshd[8406]: Failed password for root from 188.166.117.213 port 38170 ssh2
Oct 29 08:49:48 fr01 sshd[9040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213  user=root
Oct 29 08:49:50 fr01 sshd[9040]: Failed password for root from 188.166.117.213 port 49248 ssh2
...
2019-10-29 16:24:24
138.197.221.114 attackspambots
Oct 29 06:56:39 ns41 sshd[19643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.221.114
2019-10-29 16:26:04
70.125.42.101 attack
Oct 29 05:01:32 ovpn sshd\[17823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101  user=root
Oct 29 05:01:35 ovpn sshd\[17823\]: Failed password for root from 70.125.42.101 port 53297 ssh2
Oct 29 05:12:06 ovpn sshd\[19846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101  user=root
Oct 29 05:12:08 ovpn sshd\[19846\]: Failed password for root from 70.125.42.101 port 45827 ssh2
Oct 29 05:22:10 ovpn sshd\[21884\]: Invalid user vridc from 70.125.42.101
Oct 29 05:22:10 ovpn sshd\[21884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101
2019-10-29 16:33:39

Recently Reported IPs

120.42.194.23 121.155.99.153 97.9.229.188 174.127.195.150
174.127.195.190 235.68.144.220 114.122.106.33 200.88.235.18
82.131.226.24 246.243.33.148 44.211.173.66 104.245.97.14
185.212.57.206 139.59.108.118 79.193.93.239 109.42.242.226
56.192.36.47 185.222.93.202 51.83.72.118 174.127.195.106