Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.9.47.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.9.47.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:32:18 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 42.47.9.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.47.9.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.70.130.155 attackbotsspam
Apr 13 08:57:09 XXX sshd[41015]: Invalid user test from 66.70.130.155 port 57108
2020-04-13 21:42:11
167.172.145.231 attack
Apr 13 11:49:25 host01 sshd[6427]: Failed password for root from 167.172.145.231 port 33028 ssh2
Apr 13 11:53:44 host01 sshd[7309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.145.231 
Apr 13 11:53:46 host01 sshd[7309]: Failed password for invalid user droste from 167.172.145.231 port 40802 ssh2
...
2020-04-13 21:41:02
184.105.247.232 attackbots
389/tcp 445/tcp 50070/tcp...
[2020-02-12/04-12]38pkt,14pt.(tcp),1pt.(udp)
2020-04-13 22:04:52
167.172.152.143 attackspam
Report Port Scan: Events[1] countPorts[1]: 12448 ..
2020-04-13 22:06:17
114.143.136.18 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 22:17:20
119.160.66.221 attackbots
Honeypot attack, port: 445, PTR: host-221-net-66-160-119.mobilinkinfinity.net.pk.
2020-04-13 21:47:05
46.101.33.198 attackbots
Report Port Scan: Events[1] countPorts[1]: 11008 ..
2020-04-13 21:38:31
90.68.103.36 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 22:04:04
222.186.190.2 attackspambots
$f2bV_matches
2020-04-13 21:36:14
111.229.116.147 attackspam
Apr 13 00:49:24 web1 sshd\[31665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.116.147  user=root
Apr 13 00:49:26 web1 sshd\[31665\]: Failed password for root from 111.229.116.147 port 60610 ssh2
Apr 13 00:52:45 web1 sshd\[31984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.116.147  user=root
Apr 13 00:52:47 web1 sshd\[31984\]: Failed password for root from 111.229.116.147 port 49818 ssh2
Apr 13 00:56:12 web1 sshd\[32355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.116.147  user=root
2020-04-13 21:43:24
222.186.30.35 attackspambots
Apr 13 05:16:49 debian sshd[12728]: Unable to negotiate with 222.186.30.35 port 10445: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Apr 13 09:48:16 debian sshd[26641]: Unable to negotiate with 222.186.30.35 port 45999: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-04-13 21:52:03
167.99.233.123 attackspam
Childish website spammer IDIOT!~
Coward acts tough because he hides like a child
Hopefully this programmer finds coronavirus soon...LOL!
2020-04-13 22:06:47
179.110.222.46 attack
Apr 13 04:05:06 cumulus sshd[17990]: Invalid user huawei from 179.110.222.46 port 60241
Apr 13 04:05:06 cumulus sshd[17990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.110.222.46
Apr 13 04:05:08 cumulus sshd[17990]: Failed password for invalid user huawei from 179.110.222.46 port 60241 ssh2
Apr 13 04:05:08 cumulus sshd[17990]: Received disconnect from 179.110.222.46 port 60241:11: Bye Bye [preauth]
Apr 13 04:05:08 cumulus sshd[17990]: Disconnected from 179.110.222.46 port 60241 [preauth]
Apr 13 04:25:42 cumulus sshd[19168]: Invalid user user from 179.110.222.46 port 47464
Apr 13 04:25:42 cumulus sshd[19168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.110.222.46
Apr 13 04:25:44 cumulus sshd[19168]: Failed password for invalid user user from 179.110.222.46 port 47464 ssh2
Apr 13 04:25:44 cumulus sshd[19168]: Received disconnect from 179.110.222.46 port 47464:11: Bye Bye [prea........
-------------------------------
2020-04-13 21:43:08
45.61.169.200 attackspam
Malicious Traffic/Form Submission
2020-04-13 21:57:48
185.220.101.40 attack
Apr 13 10:36:33 risk sshd[16056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.40  user=r.r
Apr 13 10:36:35 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:37 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:39 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:41 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:43 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:45 risk sshd[16056]: Failed password for r.r from 185.220.101.40 port 3888 ssh2
Apr 13 10:36:45 risk sshd[16056]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.40  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.220.101.40
2020-04-13 22:03:39

Recently Reported IPs

101.178.12.10 5.70.249.177 156.62.171.157 209.212.211.168
14.86.189.45 99.44.6.73 204.232.162.197 163.128.103.87
196.227.127.101 142.255.2.231 50.209.177.21 222.220.193.79
85.97.156.255 194.100.105.62 69.14.104.47 251.243.249.94
122.252.97.40 58.115.117.105 170.77.244.162 195.201.52.53