Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '59.32.0.0 - 59.42.255.255'

% Abuse contact for '59.32.0.0 - 59.42.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        59.32.0.0 - 59.42.255.255
netname:        CHINANET-GD
descr:          CHINANET Guangdong province network
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-GD
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:06:09Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2025-11-18T00:26:23Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         abuse_gdicnoc@163.com
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:          +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdicnoc@163.com
abuse-mailbox:  abuse_gdicnoc@163.com
last-modified:  2021-05-12T09:06:58Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.42.121.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.42.121.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 15:14:26 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 71.121.42.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.121.42.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.23.80.113 attackbotsspam
Unauthorized connection attempt detected from IP address 185.23.80.113 to port 23 [J]
2020-01-27 16:57:41
116.110.179.0 attackbots
Unauthorized connection attempt detected from IP address 116.110.179.0 to port 5555 [J]
2020-01-27 17:07:49
95.77.119.17 attack
Unauthorized connection attempt detected from IP address 95.77.119.17 to port 88 [J]
2020-01-27 16:42:13
170.106.81.231 attackbots
Unauthorized connection attempt detected from IP address 170.106.81.231 to port 8890 [J]
2020-01-27 17:00:40
118.89.192.39 attack
Unauthorized connection attempt detected from IP address 118.89.192.39 to port 2220 [J]
2020-01-27 17:06:42
54.219.177.24 attack
Unauthorized connection attempt detected from IP address 54.219.177.24 to port 88 [J]
2020-01-27 16:47:29
116.252.0.123 attackbots
Unauthorized connection attempt detected from IP address 116.252.0.123 to port 8118 [J]
2020-01-27 16:38:07
123.160.234.38 attackbotsspam
Unauthorized connection attempt detected from IP address 123.160.234.38 to port 8000 [J]
2020-01-27 17:04:44
179.107.158.6 attack
Unauthorized connection attempt detected from IP address 179.107.158.6 to port 1433 [J]
2020-01-27 16:30:41
177.102.107.141 attack
Unauthorized connection attempt detected from IP address 177.102.107.141 to port 8080 [J]
2020-01-27 16:31:43
190.157.13.80 attackspambots
Unauthorized connection attempt detected from IP address 190.157.13.80 to port 81 [J]
2020-01-27 16:55:26
201.49.233.15 attack
Unauthorized connection attempt detected from IP address 201.49.233.15 to port 80 [J]
2020-01-27 16:54:03
62.234.31.201 attackspambots
Unauthorized connection attempt detected from IP address 62.234.31.201 to port 2220 [J]
2020-01-27 16:45:55
178.129.136.127 attackspambots
Unauthorized connection attempt detected from IP address 178.129.136.127 to port 88 [J]
2020-01-27 16:58:55
179.184.59.121 attackbots
Jan 27 05:20:51 wh01 sshd[30673]: Connection closed by 179.184.59.121 port 59868 [preauth]
Jan 27 05:21:27 wh01 sshd[30675]: Invalid user jonas from 179.184.59.121 port 63386
Jan 27 05:21:27 wh01 sshd[30675]: Failed password for invalid user jonas from 179.184.59.121 port 63386 ssh2
Jan 27 05:21:27 wh01 sshd[30675]: Received disconnect from 179.184.59.121 port 63386:11: Bye Bye [preauth]
Jan 27 05:21:27 wh01 sshd[30675]: Disconnected from 179.184.59.121 port 63386 [preauth]
Jan 27 06:02:49 wh01 sshd[1460]: Connection closed by 179.184.59.121 port 48143 [preauth]
Jan 27 06:06:33 wh01 sshd[1753]: Connection closed by 179.184.59.121 port 48708 [preauth]
Jan 27 06:10:16 wh01 sshd[2056]: Connection closed by 179.184.59.121 port 12713 [preauth]
Jan 27 06:14:11 wh01 sshd[2370]: Connection closed by 179.184.59.121 port 17708 [preauth]
Jan 27 06:18:35 wh01 sshd[2757]: Connection closed by 179.184.59.121 port 28342 [preauth]
Jan 27 06:22:51 wh01 sshd[3041]: Connection closed by 179.184.59.121 po
2020-01-27 16:58:28

Recently Reported IPs

64.226.91.200 116.132.81.70 192.36.172.171 192.121.146.24
115.45.41.190 119.249.100.241 119.249.100.107 68.183.118.128
180.153.236.22 47.128.99.171 203.86.124.25 118.232.255.12
137.184.125.127 59.42.121.7 113.95.138.238 178.128.32.228
194.187.177.100 143.198.47.246 143.110.255.76