City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.118.42.0 - 103.118.42.255'
% Abuse contact for '103.118.42.0 - 103.118.42.255' is 'abuse@netpilot.cc'
inetnum: 103.118.42.0 - 103.118.42.255
netname: NETPILOT-HK
descr: NetPilot Limited
country: HK
admin-c: NA1065-AP
tech-c: NA1065-AP
abuse-c: AN3163-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-NETPILOT-HK
mnt-irt: IRT-NETPILOT-HK
last-modified: 2025-12-19T14:02:36Z
source: APNIC
irt: IRT-NETPILOT-HK
address: Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
e-mail: abuse@netpilot.cc
abuse-mailbox: abuse@netpilot.cc
admin-c: NA1065-AP
tech-c: NA1065-AP
auth: # Filtered
remarks: abuse@netpilot.cc was validated on 2025-08-25
mnt-by: MAINT-NETPILOT-HK
last-modified: 2025-11-18T00:37:04Z
source: APNIC
role: ABUSE NETPILOTHK
country: ZZ
address: Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
phone: +000000000
e-mail: abuse@netpilot.cc
admin-c: NA1065-AP
tech-c: NA1065-AP
nic-hdl: AN3163-AP
remarks: Generated from irt object IRT-NETPILOT-HK
remarks: abuse@netpilot.cc was validated on 2025-08-25
abuse-mailbox: abuse@netpilot.cc
mnt-by: APNIC-ABUSE
last-modified: 2025-08-25T04:42:35Z
source: APNIC
role: NetPilot administrator
address: Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street, Kowloon Sanpokong 999077
country: HK
phone: +852-53969321
e-mail: abuse@netpilot.cc
admin-c: NA1065-AP
tech-c: NA1065-AP
nic-hdl: NA1065-AP
mnt-by: MAINT-NETPILOT-HK
last-modified: 2026-01-10T16:53:36Z
source: APNIC
% Information related to '103.118.42.0/24AS134176'
route: 103.118.42.0/24
origin: AS134176
descr: NetPilot Limited
Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by: MAINT-NETPILOT-HK
last-modified: 2024-12-12T13:06:25Z
source: APNIC
% Information related to '103.118.42.0/24AS7586'
route: 103.118.42.0/24
origin: AS7586
descr: NetPilot Limited
Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by: MAINT-NETPILOT-HK
last-modified: 2024-02-09T03:20:59Z
source: APNIC
% Information related to '103.118.42.0/24AS9400'
route: 103.118.42.0/24
origin: AS9400
descr: NetPilot Limited
Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by: MAINT-NETPILOT-HK
last-modified: 2024-12-10T17:51:02Z
source: APNIC
% Information related to '103.118.42.0/24AS976'
route: 103.118.42.0/24
origin: AS976
descr: NetPilot Limited
Rm D07,8/F,Kai Tak Fty Building,No. 99 King Fuk Street
mnt-by: MAINT-NETPILOT-HK
last-modified: 2024-03-29T13:47:09Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.118.42.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.118.42.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030300 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 17:17:40 CST 2026
;; MSG SIZE rcvd: 106
58.42.118.103.in-addr.arpa domain name pointer 103.118.42.58.dynamic.user.isp.local.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
58.42.118.103.in-addr.arpa name = 103.118.42.58.dynamic.user.isp.local.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 165.22.218.144 | attackspam | 2019-10-08T10:55:19.432100mta02.zg01.4s-zg.intra x@x 2019-10-08T10:55:24.421856mta02.zg01.4s-zg.intra x@x 2019-10-08T10:56:15.621224mta02.zg01.4s-zg.intra x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=165.22.218.144 |
2019-10-10 03:35:02 |
| 117.200.55.124 | attackspambots | Unauthorized connection attempt from IP address 117.200.55.124 on Port 445(SMB) |
2019-10-10 03:10:59 |
| 185.53.88.35 | attackbots | \[2019-10-09 13:15:22\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:15:22.424-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442038075093",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/52985",ACLName="no_extension_match" \[2019-10-09 13:16:24\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:16:24.243-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442038075093",SessionID="0x7fc3acc3d768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/50062",ACLName="no_extension_match" \[2019-10-09 13:17:27\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-09T13:17:27.616-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9442038075093",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.35/63788",ACLName="no_extensi |
2019-10-10 03:29:32 |
| 67.207.162.163 | spam | From: Steve [mailto:steve@kwikmat.com] Sent: Wednesday, October 9, 2019 11:33 To: ***** Subject: Logo Mat - USA May I send you our new Logo-Doormats Price-List? Thank you, Steve Watson | Sales Manager Custom-Logo-Mats |
2019-10-10 03:04:53 |
| 160.177.137.68 | attack | Looking for resource vulnerabilities |
2019-10-10 03:32:39 |
| 179.125.172.210 | attackspam | proto=tcp . spt=55695 . dpt=25 . (Found on Dark List de Oct 09) (693) |
2019-10-10 03:23:57 |
| 80.20.218.110 | attackbotsspam | $f2bV_matches |
2019-10-10 03:07:33 |
| 218.92.0.188 | attackbotsspam | Oct 9 20:13:18 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2 Oct 9 20:13:21 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2 Oct 9 20:13:23 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2 Oct 9 20:13:26 piServer sshd[26703]: Failed password for root from 218.92.0.188 port 55589 ssh2 ... |
2019-10-10 03:07:22 |
| 159.224.243.185 | attackspambots | proto=tcp . spt=54170 . dpt=25 . (Listed on dnsbl-sorbs plus abuseat-org and barracuda) (691) |
2019-10-10 03:28:32 |
| 192.99.32.86 | attackbots | SSHScan |
2019-10-10 03:10:42 |
| 66.110.216.191 | attackbotsspam | Brute force attempt |
2019-10-10 03:15:08 |
| 192.241.249.226 | attackspambots | Oct 9 13:58:33 hcbbdb sshd\[7551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226 user=root Oct 9 13:58:35 hcbbdb sshd\[7551\]: Failed password for root from 192.241.249.226 port 53734 ssh2 Oct 9 14:02:43 hcbbdb sshd\[8023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226 user=root Oct 9 14:02:45 hcbbdb sshd\[8023\]: Failed password for root from 192.241.249.226 port 37562 ssh2 Oct 9 14:06:55 hcbbdb sshd\[8486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.226 user=root |
2019-10-10 03:31:46 |
| 85.141.78.171 | attackbotsspam | Unauthorized connection attempt from IP address 85.141.78.171 on Port 445(SMB) |
2019-10-10 03:08:43 |
| 109.75.36.93 | attackspambots | proto=tcp . spt=42258 . dpt=25 . (Listed on unsubscore also rbldns-ru and manitu-net) (694) |
2019-10-10 03:14:25 |
| 80.17.61.219 | attack | $f2bV_matches |
2019-10-10 03:31:27 |