Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.34.0.0 - 58.34.255.255'

% Abuse contact for '58.34.0.0 - 58.34.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        58.34.0.0 - 58.34.255.255
netname:        CHINANET-SH
descr:          CHINANET Shanghai province network
descr:          Shanghai Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         XI5-AP
mnt-by:         MAINT-CHINANET-SH
status:         allocated non-portable
last-modified:  2008-09-04T07:03:54Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         Wu Xiao Li
address:        Room 805,61 North Si Chuan Road,Shanghai,200085,PRC
country:        CN
phone:          +86-21-63630562
fax-no:         +86-21-63630566
e-mail:         ipms@shtel.com.cn
nic-hdl:        XI5-AP
mnt-by:         MAINT-CHINANET-SH
abuse-mailbox:  ip-admin@mail.online.sh.cn
last-modified:  2014-02-27T08:51:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.34.148.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.34.148.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 11:24:21 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 42.148.34.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.148.34.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.202.137.50 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 21:04:15
5.89.59.163 attack
Honeypot attack, port: 5555, PTR: net-5-89-59-163.cust.vodafonedsl.it.
2020-02-14 20:23:40
128.199.239.8 attackspambots
Unauthorized connection attempt from IP address 128.199.239.8 on Port 445(SMB)
2020-02-14 20:36:25
27.123.240.220 attack
20/2/14@00:37:10: FAIL: Alarm-Network address from=27.123.240.220
20/2/14@00:37:10: FAIL: Alarm-Network address from=27.123.240.220
...
2020-02-14 20:40:00
175.213.111.76 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:57:50
119.202.16.215 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:51:00
119.202.171.135 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:48:28
5.160.232.231 attack
Feb 14 09:06:14 silence02 sshd[18395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.232.231
Feb 14 09:06:16 silence02 sshd[18395]: Failed password for invalid user 123 from 5.160.232.231 port 59508 ssh2
Feb 14 09:09:20 silence02 sshd[18584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.232.231
2020-02-14 20:20:55
190.6.255.217 attackspam
SSH/22 MH Probe, BF, Hack -
2020-02-14 20:21:24
88.248.118.190 attackspam
Automatic report - Banned IP Access
2020-02-14 20:26:18
222.186.42.136 attackbotsspam
Feb 14 09:48:31 firewall sshd[25850]: Failed password for root from 222.186.42.136 port 39452 ssh2
Feb 14 09:48:33 firewall sshd[25850]: Failed password for root from 222.186.42.136 port 39452 ssh2
Feb 14 09:48:36 firewall sshd[25850]: Failed password for root from 222.186.42.136 port 39452 ssh2
...
2020-02-14 20:59:41
89.106.198.51 attackspam
Honeypot attack, port: 445, PTR: 89-106-198-51.dynamic.issr.ru.
2020-02-14 20:54:32
181.30.101.162 attackspambots
Invalid user name from 181.30.101.162 port 58248
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.101.162
Failed password for invalid user name from 181.30.101.162 port 58248 ssh2
Invalid user shop1 from 181.30.101.162 port 44016
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.101.162
2020-02-14 21:02:45
185.157.185.186 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-14 20:25:09
118.70.113.1 attackspambots
" "
2020-02-14 20:37:37

Recently Reported IPs

110.77.248.7 44.220.185.82 121.234.219.85 2606:4700:10::6814:6472
2606:4700:10::6814:7446 2606:4700:10::6814:6410 2606:4700:10::6816:4032 2606:4700:10::6814:8499
2606:4700:10::6814:9847 2606:4700:10::6816:1180 14.207.194.142 37.120.150.131
10.4.7.254 66.132.172.218 113.112.51.110 143.208.125.95
2606:4700:10::6814:6858 2606:4700:10::6814:9833 2606:4700:10::6816:1086 2606:4700:10::6816:1169