Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Huludao

Region: Liaoning

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: CHINA UNICOM China169 Backbone

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.55.150.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2554
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.55.150.226.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 28 23:28:35 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 226.150.55.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 226.150.55.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.170.150.254 attackspambots
Jun 21 23:20:03 pornomens sshd\[32514\]: Invalid user wwAdmin from 139.170.150.254 port 1643
Jun 21 23:20:03 pornomens sshd\[32514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.254
Jun 21 23:20:05 pornomens sshd\[32514\]: Failed password for invalid user wwAdmin from 139.170.150.254 port 1643 ssh2
...
2020-06-22 05:33:36
77.42.82.36 attack
Unauthorized connection attempt detected from IP address 77.42.82.36 to port 23
2020-06-22 05:44:48
103.52.217.100 attackbotsspam
32769/udp 6881/tcp 7272/tcp...
[2020-04-23/06-21]5pkt,4pt.(tcp),1pt.(udp)
2020-06-22 05:43:10
186.88.77.171 attackbotsspam
Unauthorized connection attempt detected from IP address 186.88.77.171 to port 5900
2020-06-22 05:54:41
200.55.53.17 attack
Unauthorized connection attempt detected from IP address 200.55.53.17 to port 23
2020-06-22 05:49:42
51.195.53.7 attack
Failed password for invalid user from 51.195.53.7 port 36026 ssh2
2020-06-22 05:27:32
106.13.82.49 attack
Jun 21 23:27:39 server sshd[37589]: Failed password for root from 106.13.82.49 port 40098 ssh2
Jun 21 23:30:51 server sshd[40031]: Failed password for invalid user wpa from 106.13.82.49 port 60508 ssh2
Jun 21 23:34:06 server sshd[42421]: Failed password for invalid user guest from 106.13.82.49 port 52680 ssh2
2020-06-22 05:35:17
202.138.234.18 attackbotsspam
Unauthorized connection attempt detected from IP address 202.138.234.18 to port 445
2020-06-22 05:36:25
180.117.100.34 attackspam
Unauthorized connection attempt detected from IP address 180.117.100.34 to port 23
2020-06-22 05:41:05
2.42.136.186 attack
Unauthorized connection attempt detected from IP address 2.42.136.186 to port 2323
2020-06-22 05:48:11
73.209.204.207 attackbots
Unauthorized connection attempt detected from IP address 73.209.204.207 to port 23
2020-06-22 06:02:15
37.6.25.84 attackspam
Unauthorized connection attempt detected from IP address 37.6.25.84 to port 23
2020-06-22 06:05:11
193.169.252.217 attackbots
Unauthorized connection attempt detected from IP address 193.169.252.217 to port 3389
2020-06-22 05:52:06
77.42.75.121 attack
Unauthorized connection attempt detected from IP address 77.42.75.121 to port 80
2020-06-22 06:01:56
49.51.12.60 attackbots
Unauthorized connection attempt detected from IP address 49.51.12.60 to port 1040
2020-06-22 05:45:33

Recently Reported IPs

158.255.107.6 27.241.103.95 186.193.5.58 217.147.209.249
116.238.17.35 92.245.200.181 37.97.103.162 189.89.212.25
145.194.4.212 80.184.148.128 44.94.39.30 41.203.73.42
144.24.2.170 185.10.68.53 90.144.187.158 158.136.124.156
82.130.240.226 218.175.28.106 133.142.211.211 52.125.148.6