Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Henan

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: CHINA UNICOM China169 Backbone

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.239.142.89 attackspambots
Automatic report - Port Scan Attack
2020-02-07 05:39:07
42.239.144.43 attack
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-17 14:53:02
42.239.141.186 attack
Port Scan: TCP/22
2019-09-14 11:53:31
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.239.14.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26138
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.239.14.10.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 10 00:02:06 +08 2019
;; MSG SIZE  rcvd: 116

Host info
10.14.239.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
10.14.239.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
101.36.150.59 attackspambots
bruteforce detected
2020-04-13 06:47:14
51.158.65.150 attack
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-04-13 07:09:38
66.161.137.115 attack
445/tcp 445/tcp 445/tcp
[2020-03-04/04-12]3pkt
2020-04-13 06:47:56
185.200.118.82 attackbotsspam
1723/tcp 1194/udp 3128/tcp...
[2020-02-19/04-12]28pkt,4pt.(tcp),1pt.(udp)
2020-04-13 07:19:27
85.186.38.228 attackspambots
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-13 07:22:01
49.232.173.147 attackbotsspam
Apr 13 00:48:28 markkoudstaal sshd[16721]: Failed password for root from 49.232.173.147 port 9053 ssh2
Apr 13 00:52:54 markkoudstaal sshd[17424]: Failed password for root from 49.232.173.147 port 1476 ssh2
2020-04-13 07:17:40
58.222.107.253 attackbots
Apr 13 02:13:23 gw1 sshd[24989]: Failed password for root from 58.222.107.253 port 31579 ssh2
...
2020-04-13 06:46:13
167.172.17.124 attackspam
47808/udp 5060/udp 30120/udp...
[2020-03-22/04-12]18pkt,7pt.(udp)
2020-04-13 07:20:56
175.126.176.21 attack
DATE:2020-04-12 22:40:03, IP:175.126.176.21, PORT:ssh SSH brute force auth (docker-dc)
2020-04-13 06:58:17
139.59.169.103 attack
Apr 13 01:03:42 host01 sshd[27330]: Failed password for root from 139.59.169.103 port 34488 ssh2
Apr 13 01:06:58 host01 sshd[27947]: Failed password for root from 139.59.169.103 port 41430 ssh2
...
2020-04-13 07:21:09
159.89.119.1 attackbots
Port probing on unauthorized port 30875
2020-04-13 07:06:20
150.109.231.90 attackbotsspam
6779/tcp 5801/tcp 32764/udp...
[2020-03-28/04-12]5pkt,4pt.(tcp),1pt.(udp)
2020-04-13 07:16:00
151.127.0.151 attackspambots
Invalid user pi from 151.127.0.151 port 60736
2020-04-13 07:15:40
80.99.128.222 attackspambots
88/tcp 8080/tcp
[2020-02-20/04-12]2pkt
2020-04-13 07:08:59
103.253.146.142 attack
firewall-block, port(s): 12702/tcp
2020-04-13 06:43:53

Recently Reported IPs

5.189.128.73 142.44.203.24 68.224.103.241 101.99.14.47
204.44.77.132 188.163.52.113 104.160.29.56 162.243.165.95
104.223.67.218 107.172.246.195 142.93.111.171 58.242.82.13
209.85.222.199 110.136.170.142 140.143.134.86 37.187.64.220
156.220.188.202 45.32.101.209 118.71.134.180 58.100.64.134