Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Unicom Liaoning Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Unauthorised access (Aug 27) SRC=42.6.85.134 LEN=40 TTL=46 ID=54621 TCP DPT=8080 WINDOW=35241 SYN 
Unauthorised access (Aug 26) SRC=42.6.85.134 LEN=40 TTL=46 ID=51162 TCP DPT=8080 WINDOW=35241 SYN
2020-08-28 02:34:51
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.6.85.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.6.85.134.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082702 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 28 02:37:41 CST 2020
;; MSG SIZE  rcvd: 115

Host info
Host 134.85.6.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.85.6.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.6.169.250 attackbotsspam
Found on   CINS badguys     / proto=6  .  srcport=14917  .  dstport=666  .     (3165)
2020-09-28 03:59:32
113.233.126.93 attack
 TCP (SYN) 113.233.126.93:45158 -> port 23, len 44
2020-09-28 03:37:29
118.24.11.226 attackspam
Sep 27 20:35:02 prod4 sshd\[30529\]: Invalid user user1 from 118.24.11.226
Sep 27 20:35:05 prod4 sshd\[30529\]: Failed password for invalid user user1 from 118.24.11.226 port 54906 ssh2
Sep 27 20:40:23 prod4 sshd\[984\]: Invalid user km from 118.24.11.226
...
2020-09-28 03:43:47
208.186.112.30 attack
2020-09-26 15:31:43.685860-0500  localhost smtpd[72842]: NOQUEUE: reject: RCPT from unknown[208.186.112.30]: 554 5.7.1 Service unavailable; Client host [208.186.112.30] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-09-28 03:58:43
65.52.11.113 attackbotsspam
Invalid user obki from 65.52.11.113 port 22786
2020-09-28 03:43:15
192.35.168.249 attackbots
Unauthorized connection attempt from IP address 192.35.168.249 on Port 3306(MYSQL)
2020-09-28 03:56:42
106.53.234.72 attackbots
$f2bV_matches
2020-09-28 04:12:26
217.112.142.227 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-09-28 04:02:01
52.255.144.191 attackbots
Invalid user 175 from 52.255.144.191 port 50437
2020-09-28 03:51:02
114.7.124.134 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-28 03:51:50
62.234.110.91 attack
Sep 27 19:38:47 game-panel sshd[7582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.110.91
Sep 27 19:38:49 game-panel sshd[7582]: Failed password for invalid user marjorie from 62.234.110.91 port 35918 ssh2
Sep 27 19:47:06 game-panel sshd[8183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.110.91
2020-09-28 04:07:27
157.245.135.156 attack
Invalid user albert from 157.245.135.156 port 54708
2020-09-28 03:42:42
49.234.52.166 attackspambots
k+ssh-bruteforce
2020-09-28 03:54:52
192.35.169.20 attackbotsspam
 TCP (SYN) 192.35.169.20:64085 -> port 110, len 44
2020-09-28 04:08:20
106.75.10.4 attackbots
Sep 27 16:47:46 vps46666688 sshd[23149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.10.4
Sep 27 16:47:48 vps46666688 sshd[23149]: Failed password for invalid user gmodserver from 106.75.10.4 port 59776 ssh2
...
2020-09-28 03:49:01

Recently Reported IPs

37.48.120.196 138.99.10.135 93.99.104.106 14.232.121.49
154.83.15.91 47.206.84.143 124.161.215.107 109.100.27.35
111.229.26.217 162.142.125.56 85.207.11.67 119.8.10.180
82.185.60.182 118.6.39.11 106.12.187.250 254.15.21.159
211.0.121.180 15.211.210.47 145.27.142.137 190.14.251.127