Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.102.42.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.102.42.2.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 28 11:39:56 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 2.42.102.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.42.102.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.31.231.241 attack
Web App Attack
2019-06-25 18:28:38
47.196.41.159 attackspam
Invalid user admin from 47.196.41.159 port 55998
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.196.41.159
Failed password for invalid user admin from 47.196.41.159 port 55998 ssh2
Invalid user pul from 47.196.41.159 port 45394
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.196.41.159
2019-06-25 18:07:24
218.92.0.133 attackspam
2019-06-25T09:44:20.031033abusebot-4.cloudsearch.cf sshd\[8861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2019-06-25 17:51:26
206.189.197.48 attackspam
Jun 25 10:27:34 andromeda sshd\[10670\]: Invalid user noah from 206.189.197.48 port 49716
Jun 25 10:27:34 andromeda sshd\[10669\]: Invalid user noah from 206.189.197.48 port 54432
Jun 25 10:27:34 andromeda sshd\[10670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.197.48
Jun 25 10:27:34 andromeda sshd\[10669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.197.48
2019-06-25 18:10:26
34.77.68.176 attackbots
3389BruteforceFW21
2019-06-25 18:10:58
36.89.119.92 attackbotsspam
Jun 25 09:25:56 mail sshd\[29873\]: Invalid user ts from 36.89.119.92 port 33460
Jun 25 09:25:56 mail sshd\[29873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.119.92
Jun 25 09:25:58 mail sshd\[29873\]: Failed password for invalid user ts from 36.89.119.92 port 33460 ssh2
Jun 25 09:28:21 mail sshd\[30175\]: Invalid user hen from 36.89.119.92 port 48806
Jun 25 09:28:21 mail sshd\[30175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.119.92
2019-06-25 18:02:36
103.101.233.162 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-25 08:59:43]
2019-06-25 18:33:15
81.152.79.136 attack
port scan and connect, tcp 23 (telnet)
2019-06-25 17:36:57
223.196.77.74 attackspam
Unauthorized connection attempt from IP address 223.196.77.74 on Port 445(SMB)
2019-06-25 18:15:51
218.92.0.138 attackspam
Jun 25 09:01:37 62-210-73-4 sshd\[15079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Jun 25 09:01:39 62-210-73-4 sshd\[15079\]: Failed password for root from 218.92.0.138 port 46044 ssh2
...
2019-06-25 17:37:16
149.202.164.82 attackspambots
Jun 25 09:31:49 host sshd\[45021\]: Invalid user vnc from 149.202.164.82 port 47470
Jun 25 09:31:49 host sshd\[45021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
...
2019-06-25 18:26:38
77.70.8.8 attack
Port scan and direct access per IP instead of hostname
2019-06-25 18:27:40
86.42.91.227 attackspam
Jun 25 11:12:02 nginx sshd[37128]: Invalid user admin from 86.42.91.227
Jun 25 11:12:02 nginx sshd[37128]: Connection closed by 86.42.91.227 port 35777 [preauth]
2019-06-25 18:41:17
37.139.13.105 attack
2019-06-25T11:39:16.0028701240 sshd\[24192\]: Invalid user cyrus from 37.139.13.105 port 60146
2019-06-25T11:39:16.0071411240 sshd\[24192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105
2019-06-25T11:39:17.4889611240 sshd\[24192\]: Failed password for invalid user cyrus from 37.139.13.105 port 60146 ssh2
...
2019-06-25 18:43:08
113.173.160.79 attackspam
IP attempted unauthorised action
2019-06-25 17:35:22

Recently Reported IPs

139.224.252.169 47.116.52.6 54.39.75.159 25.88.64.59
57.22.90.32 186.71.114.87 121.58.211.228 182.162.90.116
111.225.153.58 8.211.14.75 188.138.235.56 81.48.180.5
1.33.218.171 4.69.147.81 103.52.208.125 56.61.131.149
199.44.209.211 18.18.248.40 88.204.162.124 116.11.36.9