Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.118.42.0 - 103.118.42.255'

% Abuse contact for '103.118.42.0 - 103.118.42.255' is 'abuse@netpilot.cc'

inetnum:        103.118.42.0 - 103.118.42.255
netname:        NETPILOT-HK
descr:          NetPilot Limited
country:        HK
admin-c:        NA1065-AP
tech-c:         NA1065-AP
abuse-c:        AN3163-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-NETPILOT-HK
mnt-irt:        IRT-NETPILOT-HK
last-modified:  2025-12-19T14:02:36Z
source:         APNIC

irt:            IRT-NETPILOT-HK
address:        Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
e-mail:         abuse@netpilot.cc
abuse-mailbox:  abuse@netpilot.cc
admin-c:        NA1065-AP
tech-c:         NA1065-AP
auth:           # Filtered
remarks:        abuse@netpilot.cc was validated on 2025-08-25
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2025-11-18T00:37:04Z
source:         APNIC

role:           ABUSE NETPILOTHK
country:        ZZ
address:        Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
phone:          +000000000
e-mail:         abuse@netpilot.cc
admin-c:        NA1065-AP
tech-c:         NA1065-AP
nic-hdl:        AN3163-AP
remarks:        Generated from irt object IRT-NETPILOT-HK
remarks:        abuse@netpilot.cc was validated on 2025-08-25
abuse-mailbox:  abuse@netpilot.cc
mnt-by:         APNIC-ABUSE
last-modified:  2025-08-25T04:42:35Z
source:         APNIC

role:           NetPilot administrator
address:        Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
country:        HK
phone:          +852-53969321
e-mail:         abuse@netpilot.cc
admin-c:        NA1065-AP
tech-c:         NA1065-AP
nic-hdl:        NA1065-AP
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2026-01-10T16:53:36Z
source:         APNIC

% Information related to '103.118.42.0/24AS134176'

route:          103.118.42.0/24
origin:         AS134176
descr:          NetPilot Limited
                Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2024-12-12T13:06:25Z
source:         APNIC

% Information related to '103.118.42.0/24AS7586'

route:          103.118.42.0/24
origin:         AS7586
descr:          NetPilot Limited
                Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2024-02-09T03:20:59Z
source:         APNIC

% Information related to '103.118.42.0/24AS9400'

route:          103.118.42.0/24
origin:         AS9400
descr:          NetPilot Limited
                Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2024-12-10T17:51:02Z
source:         APNIC

% Information related to '103.118.42.0/24AS976'

route:          103.118.42.0/24
origin:         AS976
descr:          NetPilot Limited
                Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by:         MAINT-NETPILOT-HK
last-modified:  2024-03-29T13:47:09Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.118.42.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.118.42.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 17:17:40 CST 2026
;; MSG SIZE  rcvd: 106
Host info
58.42.118.103.in-addr.arpa domain name pointer 103.118.42.58.dynamic.user.isp.local.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
58.42.118.103.in-addr.arpa	name = 103.118.42.58.dynamic.user.isp.local.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
165.22.218.144 attackspam
2019-10-08T10:55:19.432100mta02.zg01.4s-zg.intra x@x
2019-10-08T10:55:24.421856mta02.zg01.4s-zg.intra x@x
2019-10-08T10:56:15.621224mta02.zg01.4s-zg.intra x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22.218.144
2019-10-10 03:35:02
117.200.55.124 attackspambots
Unauthorized connection attempt from IP address 117.200.55.124 on Port 445(SMB)
2019-10-10 03:10:59
185.53.88.35 attackbots
\[2019-10-09 13:15:22\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:15:22.424-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442038075093",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/52985",ACLName="no_extension_match"
\[2019-10-09 13:16:24\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:16:24.243-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442038075093",SessionID="0x7fc3acc3d768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/50062",ACLName="no_extension_match"
\[2019-10-09 13:17:27\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:17:27.616-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9442038075093",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/63788",ACLName="no_extensi
2019-10-10 03:29:32
67.207.162.163 spam
From: Steve [mailto:steve@kwikmat.com] 
Sent: Wednesday, October 9, 2019 11:33
To: *****
Subject: Logo Mat - USA

May I send you our new Logo-Doormats Price-List?

Thank you,
Steve Watson | Sales Manager
Custom-Logo-Mats
2019-10-10 03:04:53
160.177.137.68 attack
Looking for resource vulnerabilities
2019-10-10 03:32:39
179.125.172.210 attackspam
proto=tcp  .  spt=55695  .  dpt=25  .     (Found on   Dark List de Oct 09)     (693)
2019-10-10 03:23:57
80.20.218.110 attackbotsspam
$f2bV_matches
2019-10-10 03:07:33
218.92.0.188 attackbotsspam
Oct  9 20:13:18 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2
Oct  9 20:13:21 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2
Oct  9 20:13:23 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2
Oct  9 20:13:26 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2
...
2019-10-10 03:07:22
159.224.243.185 attackspambots
proto=tcp  .  spt=54170  .  dpt=25  .     (Listed on    dnsbl-sorbs plus abuseat-org and barracuda)     (691)
2019-10-10 03:28:32
192.99.32.86 attackbots
SSHScan
2019-10-10 03:10:42
66.110.216.191 attackbotsspam
Brute force attempt
2019-10-10 03:15:08
192.241.249.226 attackspambots
Oct  9 13:58:33 hcbbdb sshd\[7551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226  user=root
Oct  9 13:58:35 hcbbdb sshd\[7551\]: Failed password for root from 192.241.249.226 port 53734 ssh2
Oct  9 14:02:43 hcbbdb sshd\[8023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226  user=root
Oct  9 14:02:45 hcbbdb sshd\[8023\]: Failed password for root from 192.241.249.226 port 37562 ssh2
Oct  9 14:06:55 hcbbdb sshd\[8486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226  user=root
2019-10-10 03:31:46
85.141.78.171 attackbotsspam
Unauthorized connection attempt from IP address 85.141.78.171 on Port 445(SMB)
2019-10-10 03:08:43
109.75.36.93 attackspambots
proto=tcp  .  spt=42258  .  dpt=25  .     (Listed on    unsubscore also rbldns-ru and manitu-net)     (694)
2019-10-10 03:14:25
80.17.61.219 attack
$f2bV_matches
2019-10-10 03:31:27

Recently Reported IPs

2606:4700:10::6814:5722 94.231.206.156 83.142.209.48 34.79.181.63
216.36.121.76 20.104.233.159 20.104.233.28 64.62.156.224
121.234.219.91 2606:4700:10::6814:9407 2606:4700:10::6814:7922 2606:4700:10::6814:8325
2606:4700:10::6816:1139 2606:4700:10::6814:4858 2606:4700:10::6814:8026 85.11.183.27
192.168.88.250 122.193.247.99 2606:4700:10::6814:6481 2606:4700:10::6814:7621