Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kunming

Region: Yunnan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.243.71.121 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 14:15:53
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.242.0.0 - 42.243.255.255'

% Abuse contact for '42.242.0.0 - 42.243.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        42.242.0.0 - 42.243.255.255
netname:        CHINANET-YN
descr:          CHINANET YunNan PROVINCE NETWORK
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        ZL48-AP
tech-c:         ZL48-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-YN
mnt-routes:     MAINT-CHINANET-YN
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:04:59Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         zhiyong liu
nic-hdl:        ZL48-AP
e-mail:         ynipmail@163.com
address:        136 beijin roadkunmingchina
phone:          +86-871-68226585
fax-no:         +86-871-8221536
country:        CN
mnt-by:         MAINT-CHINANET-YN
last-modified:  2018-12-27T01:58:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.243.71.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18011
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.243.71.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 11:52:20 CST 2026
;; MSG SIZE  rcvd: 105
Host info
b'Host 39.71.243.42.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 42.243.71.39.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
126.117.69.142 attackbots
Invalid user paSSWORD from 126.117.69.142 port 39772
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142
Failed password for invalid user paSSWORD from 126.117.69.142 port 39772 ssh2
Invalid user xX123456789 from 126.117.69.142 port 36464
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142
2019-07-28 03:49:38
177.73.248.35 attackspam
Invalid user joanne from 177.73.248.35 port 53641
2019-07-28 04:09:10
188.131.211.154 attackspam
Invalid user gz from 188.131.211.154 port 50880
2019-07-28 04:05:45
106.13.43.242 attackbotsspam
Invalid user admin from 106.13.43.242 port 48416
2019-07-28 04:18:56
139.59.59.90 attackbotsspam
Jul 27 20:58:25 ncomp sshd[6003]: Invalid user test from 139.59.59.90
Jul 27 20:58:25 ncomp sshd[6003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.90
Jul 27 20:58:25 ncomp sshd[6003]: Invalid user test from 139.59.59.90
Jul 27 20:58:26 ncomp sshd[6003]: Failed password for invalid user test from 139.59.59.90 port 38196 ssh2
2019-07-28 03:46:49
94.62.161.170 attackbotsspam
Invalid user oscar from 94.62.161.170 port 49790
2019-07-28 04:19:49
159.89.115.126 attack
Invalid user tPsa from 159.89.115.126 port 46386
2019-07-28 03:43:41
120.92.20.197 attackbotsspam
Invalid user humanity from 120.92.20.197 port 39443
2019-07-28 03:51:17
156.212.108.81 attackbotsspam
Invalid user admin from 156.212.108.81 port 47474
2019-07-28 03:44:44
88.20.21.27 attack
Invalid user su from 88.20.21.27 port 38912
2019-07-28 04:21:33
101.251.237.229 attack
Invalid user 123 from 101.251.237.229 port 15787
2019-07-28 03:55:38
180.253.177.25 attackbotsspam
Invalid user ubnt from 180.253.177.25 port 55717
2019-07-28 03:42:16
129.204.254.4 attackbots
Invalid user sensu from 129.204.254.4 port 42388
2019-07-28 04:13:56
144.217.164.104 attackbotsspam
Jul 27 20:11:47 vtv3 sshd\[6654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.164.104  user=root
Jul 27 20:11:49 vtv3 sshd\[6654\]: Failed password for root from 144.217.164.104 port 60678 ssh2
Jul 27 20:11:52 vtv3 sshd\[6654\]: Failed password for root from 144.217.164.104 port 60678 ssh2
Jul 27 20:11:54 vtv3 sshd\[6654\]: Failed password for root from 144.217.164.104 port 60678 ssh2
Jul 27 20:11:57 vtv3 sshd\[6654\]: Failed password for root from 144.217.164.104 port 60678 ssh2
2019-07-28 03:45:41
88.247.82.202 attackspambots
Jul 27 22:15:17 [munged] sshd[14998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.82.202
2019-07-28 04:21:05

Recently Reported IPs

106.75.47.91 120.82.85.93 2606:4700:10::6814:8007 2606:4700:10::6814:5784
2606:4700:10::6816:4594 2606:4700:10::6814:7210 72.245.143.219 216.7.44.135
198.168.0.183 178.16.55.142 183.103.226.23 158.132.192.233
128.124.41.16 185.132.53.112 182.32.250.254 124.165.103.179
109.162.246.61 2606:4700:10::6816:3521 2606:4700:10::6816:3423 2606:4700:10::6816:3703