Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.157.42.0 - 103.157.43.255'

% Abuse contact for '103.157.42.0 - 103.157.43.255' is 'noc@pni.com.tw'

inetnum:        103.157.42.0 - 103.157.43.255
netname:        PNI-NET
descr:          Pittqiao Network Information Co.,Ltd.
descr:          Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
descr:          Taipei City 11085, Taiwan.
country:        TW
admin-c:        TT950-AP
tech-c:         TT950-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-lower:      MAINT-TW-TWNIC
mnt-irt:        IRT-PNI-TW
last-modified:  2025-10-21T01:48:49Z
source:         APNIC

irt:            IRT-PNI-TW
address:        Pittqiao Network Information Co.,Ltd.
address:        Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
address:        Taipei City 11085, Taiwan.
e-mail:         noc@pni.com.tw
abuse-mailbox:  noc@pni.com.tw
admin-c:        TT950-AP
tech-c:         TT950-AP
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:45:50Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Teson Tsai
address:        Pittqiao Network Information Co.,Ltd.
address:        Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
address:        Taipei City 11085, Taiwan.
country:        TW
phone:          +886-2-2728-3689
e-mail:         noc@pni.com.tw
nic-hdl:        TT950-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-08-28T08:26:48Z
source:         APNIC
remarks:        (hid:0905-S-TW-FX0)

% Information related to '103.157.42.0/24AS131642'

route:          103.157.42.0/24
origin:         AS131642
descr:          Taiwan Network Information Center
                3F., No. 123, Sec. 4, Bade Rd., Songshan Dist.
mnt-by:         MAINT-TW-TWNIC
last-modified:  2020-10-13T09:05:37Z
source:         APNIC

% Information related to '103.157.42.0/24AS64271'

route:          103.157.42.0/24
origin:         AS64271
descr:          Taiwan Network Information Center
                3F., No. 123, Sec. 4, Bade Rd., Songshan Dist.
mnt-by:         MAINT-TW-TWNIC
last-modified:  2020-10-13T09:04:23Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.157.42.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.157.42.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120903 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 10:08:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
16.42.157.103.in-addr.arpa domain name pointer 103-157-42-16.baimakj.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.42.157.103.in-addr.arpa	name = 103-157-42-16.baimakj.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.50.63.241 attackspambots
Invalid user test from 117.50.63.241 port 37584
2020-07-01 05:04:31
185.143.72.34 attackbots
2001 times SMTP brute-force
2020-07-01 04:21:48
201.122.212.15 attack
$f2bV_matches
2020-07-01 04:18:12
185.51.66.127 attackspambots
Automatic report - XMLRPC Attack
2020-07-01 04:23:10
121.14.12.106 attack
Jun 30 14:07:40 datenbank sshd[83473]: Failed password for invalid user jesse from 121.14.12.106 port 59506 ssh2
Jun 30 14:25:02 datenbank sshd[83549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.12.106  user=root
Jun 30 14:25:04 datenbank sshd[83549]: Failed password for root from 121.14.12.106 port 57912 ssh2
...
2020-07-01 05:01:15
42.201.144.178 attackspambots
Port probing on unauthorized port 445
2020-07-01 05:07:15
124.156.105.251 attack
Jun 30 18:22:35 meumeu sshd[166586]: Invalid user ftpuser from 124.156.105.251 port 56312
Jun 30 18:22:35 meumeu sshd[166586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.105.251 
Jun 30 18:22:35 meumeu sshd[166586]: Invalid user ftpuser from 124.156.105.251 port 56312
Jun 30 18:22:37 meumeu sshd[166586]: Failed password for invalid user ftpuser from 124.156.105.251 port 56312 ssh2
Jun 30 18:25:03 meumeu sshd[166739]: Invalid user elk from 124.156.105.251 port 56394
Jun 30 18:25:03 meumeu sshd[166739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.105.251 
Jun 30 18:25:03 meumeu sshd[166739]: Invalid user elk from 124.156.105.251 port 56394
Jun 30 18:25:05 meumeu sshd[166739]: Failed password for invalid user elk from 124.156.105.251 port 56394 ssh2
Jun 30 18:27:38 meumeu sshd[166895]: Invalid user planeacion from 124.156.105.251 port 56474
...
2020-07-01 04:14:15
201.31.167.50 attack
2020-06-30T16:06:38.730846ionos.janbro.de sshd[60022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50
2020-06-30T16:06:38.635149ionos.janbro.de sshd[60022]: Invalid user nexus from 201.31.167.50 port 34687
2020-06-30T16:06:40.106470ionos.janbro.de sshd[60022]: Failed password for invalid user nexus from 201.31.167.50 port 34687 ssh2
2020-06-30T16:09:20.777867ionos.janbro.de sshd[60041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50  user=root
2020-06-30T16:09:22.724425ionos.janbro.de sshd[60041]: Failed password for root from 201.31.167.50 port 54512 ssh2
2020-06-30T16:12:04.594012ionos.janbro.de sshd[60049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50  user=root
2020-06-30T16:12:06.442900ionos.janbro.de sshd[60049]: Failed password for root from 201.31.167.50 port 46103 ssh2
2020-06-30T16:15:06.204767ionos.janbro.de ss
...
2020-07-01 04:24:35
106.13.36.10 attackbotsspam
Jun 30 19:59:59 dhoomketu sshd[1159389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.10 
Jun 30 19:59:59 dhoomketu sshd[1159389]: Invalid user oracle from 106.13.36.10 port 47810
Jun 30 20:00:01 dhoomketu sshd[1159389]: Failed password for invalid user oracle from 106.13.36.10 port 47810 ssh2
Jun 30 20:03:30 dhoomketu sshd[1159450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.10  user=root
Jun 30 20:03:32 dhoomketu sshd[1159450]: Failed password for root from 106.13.36.10 port 58882 ssh2
...
2020-07-01 05:02:17
175.24.18.134 attackspam
SSH brute-force attempt
2020-07-01 04:33:22
183.6.159.141 attackspambots
Invalid user tos from 183.6.159.141 port 34516
2020-07-01 04:29:23
66.117.6.250 attackspambots
Jun 30 17:34:04 web1 sshd\[4797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.117.6.250  user=root
Jun 30 17:34:05 web1 sshd\[4797\]: Failed password for root from 66.117.6.250 port 60332 ssh2
Jun 30 17:38:16 web1 sshd\[5019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.117.6.250  user=root
Jun 30 17:38:18 web1 sshd\[5019\]: Failed password for root from 66.117.6.250 port 33868 ssh2
Jun 30 17:42:34 web1 sshd\[5298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.117.6.250  user=root
2020-07-01 04:49:14
89.248.168.244 attackbots
 TCP (SYN) 89.248.168.244:59215 -> port 6900, len 44
2020-07-01 04:16:03
193.112.185.159 attackspambots
Jun 30 13:46:44 ns382633 sshd\[8040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.185.159  user=root
Jun 30 13:46:46 ns382633 sshd\[8040\]: Failed password for root from 193.112.185.159 port 51364 ssh2
Jun 30 14:13:24 ns382633 sshd\[12967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.185.159  user=root
Jun 30 14:13:26 ns382633 sshd\[12967\]: Failed password for root from 193.112.185.159 port 38854 ssh2
Jun 30 14:17:10 ns382633 sshd\[13792\]: Invalid user ben from 193.112.185.159 port 38332
Jun 30 14:17:10 ns382633 sshd\[13792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.185.159
2020-07-01 04:54:29
138.197.175.236 attack
Jun 30 18:09:28 santamaria sshd\[15510\]: Invalid user download from 138.197.175.236
Jun 30 18:09:28 santamaria sshd\[15510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236
Jun 30 18:09:30 santamaria sshd\[15510\]: Failed password for invalid user download from 138.197.175.236 port 51308 ssh2
...
2020-07-01 04:43:53

Recently Reported IPs

3.253.246.7 147.185.133.179 10.2.41.59 20.38.42.22
185.191.118.188 177.124.88.18 3.255.207.122 74.7.175.170
121.159.126.126 38.213.168.248 119.45.253.42 113.110.143.143
60.7.56.30 68.190.42.180 176.65.132.67 122.10.220.1
51.159.15.84 139.28.232.166 43.248.141.101 119.62.85.1