Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.60.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.2.60.200.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062603 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 09:23:56 CST 2025
;; MSG SIZE  rcvd: 104
Host info
200.60.2.42.in-addr.arpa domain name pointer 42-2-60-200.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
200.60.2.42.in-addr.arpa	name = 42-2-60-200.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.117.12.196 attack
Jul  6 23:03:15 debian-2gb-nbg1-2 kernel: \[16328002.085917\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.117.12.196 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=33053 PROTO=TCP SPT=50070 DPT=22195 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-07 05:15:23
189.68.96.25 attack
Unauthorized connection attempt detected from IP address 189.68.96.25 to port 23
2020-07-07 04:42:09
183.176.160.175 attackspam
Port Scan detected!
...
2020-07-07 05:12:11
14.18.236.69 attack
Unauthorized connection attempt detected from IP address 14.18.236.69 to port 445
2020-07-07 05:00:55
36.111.182.126 attackbotsspam
TCP ports : 3866 / 5181 / 11496 / 31141
2020-07-07 04:59:48
197.48.221.219 attackbots
Unauthorized connection attempt detected from IP address 197.48.221.219 to port 445
2020-07-07 05:04:02
175.6.35.46 attackspambots
$f2bV_matches
2020-07-07 05:10:53
2.183.97.160 attackbotsspam
Unauthorized connection attempt detected from IP address 2.183.97.160 to port 80
2020-07-07 05:01:18
92.63.194.66 attack
Unauthorized connection attempt detected from IP address 92.63.194.66 to port 3372
2020-07-07 04:54:14
18.224.153.214 attack
mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php()
2020-07-07 05:14:30
145.239.82.192 attackbots
Jul  6 22:58:15 ovpn sshd\[690\]: Invalid user gx from 145.239.82.192
Jul  6 22:58:15 ovpn sshd\[690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
Jul  6 22:58:18 ovpn sshd\[690\]: Failed password for invalid user gx from 145.239.82.192 port 55788 ssh2
Jul  6 23:03:17 ovpn sshd\[1878\]: Invalid user bob from 145.239.82.192
Jul  6 23:03:17 ovpn sshd\[1878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
2020-07-07 05:13:21
170.106.37.110 attack
Unauthorized connection attempt detected from IP address 170.106.37.110 to port 6667
2020-07-07 04:46:50
106.54.182.137 attackbotsspam
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-07 04:50:49
27.74.117.56 attackspam
Unauthorized connection attempt detected from IP address 27.74.117.56 to port 88
2020-07-07 05:00:44
74.68.133.81 attackbots
Honeypot attack, port: 5555, PTR: cpe-74-68-133-81.nyc.res.rr.com.
2020-07-07 04:56:24

Recently Reported IPs

49.7.69.220 66.176.77.182 80.29.36.174 70.95.223.63
203.64.89.232 220.128.112.156 220.128.109.162 128.199.232.140
20.171.207.121 4.227.36.62 1.242.199.115 1.64.125.202
1.36.118.116 1.220.231.125 1.238.70.15 1.36.234.93
1.34.37.19 118.160.151.49 61.230.133.31 206.168.34.62