Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.42.110.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;59.42.110.66.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 10 08:25:04 CST 2020
;; MSG SIZE  rcvd: 116
Host info
66.110.42.59.in-addr.arpa domain name pointer 66.110.42.59.broad.gz.gd.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.110.42.59.in-addr.arpa	name = 66.110.42.59.broad.gz.gd.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.82.34.246 attackbotsspam
Aug 19 14:29:15 minden010 sshd[22700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.34.246
Aug 19 14:29:16 minden010 sshd[22700]: Failed password for invalid user user1 from 183.82.34.246 port 41176 ssh2
Aug 19 14:33:34 minden010 sshd[23990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.34.246
...
2020-08-19 23:51:16
159.89.47.115 attackspambots
firewall-block, port(s): 17914/tcp
2020-08-19 23:46:30
171.247.139.234 attackspambots
Unauthorized connection attempt from IP address 171.247.139.234 on Port 445(SMB)
2020-08-19 23:42:40
27.59.179.245 attackspambots
Unauthorized connection attempt from IP address 27.59.179.245 on Port 445(SMB)
2020-08-19 23:26:08
121.244.94.1 attack
Unauthorized connection attempt from IP address 121.244.94.1 on Port 445(SMB)
2020-08-19 23:34:17
49.146.49.32 attackbots
Unauthorized connection attempt from IP address 49.146.49.32 on Port 445(SMB)
2020-08-19 23:28:42
49.233.180.38 attackspambots
Bruteforce detected by fail2ban
2020-08-19 23:36:03
175.180.140.60 attackbotsspam
firewall-block, port(s): 23/tcp
2020-08-19 23:32:19
190.206.30.44 attackspam
Unauthorized connection attempt from IP address 190.206.30.44 on Port 445(SMB)
2020-08-19 23:29:13
103.130.214.135 attackspam
2020-08-19T18:04:44.879589lavrinenko.info sshd[18631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.214.135
2020-08-19T18:04:44.872603lavrinenko.info sshd[18631]: Invalid user splunk from 103.130.214.135 port 47302
2020-08-19T18:04:46.813810lavrinenko.info sshd[18631]: Failed password for invalid user splunk from 103.130.214.135 port 47302 ssh2
2020-08-19T18:08:57.663769lavrinenko.info sshd[18922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.214.135  user=root
2020-08-19T18:08:59.663278lavrinenko.info sshd[18922]: Failed password for root from 103.130.214.135 port 36650 ssh2
...
2020-08-19 23:16:32
121.132.168.184 attackbotsspam
Aug 19 19:43:27 gw1 sshd[25449]: Failed password for root from 121.132.168.184 port 42118 ssh2
...
2020-08-19 23:44:03
138.68.95.204 attackspambots
2020-08-19T09:59:10.531622server.mjenks.net sshd[3465855]: Failed password for invalid user stavis from 138.68.95.204 port 57424 ssh2
2020-08-19T10:03:01.799692server.mjenks.net sshd[3466250]: Invalid user pedro from 138.68.95.204 port 38894
2020-08-19T10:03:01.805303server.mjenks.net sshd[3466250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.95.204
2020-08-19T10:03:01.799692server.mjenks.net sshd[3466250]: Invalid user pedro from 138.68.95.204 port 38894
2020-08-19T10:03:03.598991server.mjenks.net sshd[3466250]: Failed password for invalid user pedro from 138.68.95.204 port 38894 ssh2
...
2020-08-19 23:55:13
140.238.253.177 attack
$f2bV_matches
2020-08-19 23:14:25
37.5.244.233 attackbotsspam
IP: 37.5.244.233
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS3209 Vodafone GmbH
   Germany (DE)
   CIDR 37.4.0.0/15
Log Date: 19/08/2020 12:00:38 PM UTC
2020-08-19 23:41:48
197.15.33.168 attackspam
Brute force attempt
2020-08-19 23:07:53

Recently Reported IPs

176.49.28.200 14.162.3.125 122.70.87.207 201.234.227.142
216.180.83.92 36.200.52.227 105.135.207.65 157.245.117.187
243.138.197.30 117.216.162.7 14.8.23.21 126.104.110.247
169.0.193.54 98.1.10.176 194.56.13.45 39.213.20.144
196.250.128.131 120.231.122.153 114.249.252.231 23.26.56.110