Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Qujing

Region: Yunnan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.242.115.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.242.115.8.			IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062901 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 30 08:29:34 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 8.115.242.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.115.242.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.89.147.85 attack
Invalid user git from 101.89.147.85 port 36822
2020-03-27 08:05:20
170.130.187.6 attack
Unauthorized connection attempt detected from IP address 170.130.187.6 to port 2048
2020-03-27 07:58:42
113.209.194.202 attack
Mar 26 23:49:39 ns392434 sshd[12144]: Invalid user qfm from 113.209.194.202 port 60068
Mar 26 23:49:39 ns392434 sshd[12144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
Mar 26 23:49:39 ns392434 sshd[12144]: Invalid user qfm from 113.209.194.202 port 60068
Mar 26 23:49:41 ns392434 sshd[12144]: Failed password for invalid user qfm from 113.209.194.202 port 60068 ssh2
Mar 26 23:54:23 ns392434 sshd[12310]: Invalid user mbe from 113.209.194.202 port 52148
Mar 26 23:54:23 ns392434 sshd[12310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
Mar 26 23:54:23 ns392434 sshd[12310]: Invalid user mbe from 113.209.194.202 port 52148
Mar 26 23:54:25 ns392434 sshd[12310]: Failed password for invalid user mbe from 113.209.194.202 port 52148 ssh2
Mar 26 23:55:46 ns392434 sshd[12333]: Invalid user burke from 113.209.194.202 port 42392
2020-03-27 07:56:47
180.96.28.87 attackbotsspam
Mar 26 09:15:14 XXX sshd[45722]: Invalid user qg from 180.96.28.87 port 22595
2020-03-27 08:11:26
134.175.130.52 attackspambots
Invalid user asta from 134.175.130.52 port 54528
2020-03-27 07:48:37
186.155.113.91 attack
20/3/26@17:17:58: FAIL: Alarm-Network address from=186.155.113.91
...
2020-03-27 07:47:47
119.96.189.97 attackspambots
bruteforce detected
2020-03-27 08:06:05
163.172.191.141 attackspambots
Invalid user yan from 163.172.191.141 port 52054
2020-03-27 08:15:34
217.107.106.18 attackspambots
1585257451 - 03/26/2020 22:17:31 Host: 217.107.106.18/217.107.106.18 Port: 445 TCP Blocked
2020-03-27 08:06:34
218.94.144.101 attackbots
(mod_security) mod_security (id:230011) triggered by 218.94.144.101 (CN/China/-): 5 in the last 3600 secs
2020-03-27 07:52:08
185.220.100.244 attackbots
Invalid user Administrator from 185.220.100.244 port 31862
2020-03-27 07:48:16
180.76.167.9 attackbots
Invalid user kr from 180.76.167.9 port 42514
2020-03-27 08:03:02
178.33.12.237 attack
Invalid user cyd from 178.33.12.237 port 54550
2020-03-27 07:39:13
163.172.87.232 attackspambots
Invalid user shaun from 163.172.87.232 port 55801
2020-03-27 07:55:46
162.243.130.175 attack
Mar 26 21:16:33 src: 162.243.130.175 signature match: "MISC VNC communication attempt" (sid: 100202) tcp port: 5900
2020-03-27 07:45:04

Recently Reported IPs

91.49.183.119 162.254.181.104 110.127.52.191 26.154.105.209
88.167.165.128 30.177.82.32 50.17.27.244 77.247.226.42
217.41.177.28 19.119.234.219 28.220.104.55 163.230.175.202
75.111.171.61 248.116.174.195 59.154.232.79 45.143.17.197
105.201.219.22 11.97.106.113 37.228.6.150 223.176.13.33