Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.157.42.0 - 103.157.43.255'

% Abuse contact for '103.157.42.0 - 103.157.43.255' is 'noc@pni.com.tw'

inetnum:        103.157.42.0 - 103.157.43.255
netname:        PNI-NET
descr:          Pittqiao Network Information Co.,Ltd.
descr:          Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
descr:          Taipei City 11085, Taiwan.
country:        TW
admin-c:        TT950-AP
tech-c:         TT950-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-lower:      MAINT-TW-TWNIC
mnt-irt:        IRT-PNI-TW
last-modified:  2025-10-21T01:48:49Z
source:         APNIC

irt:            IRT-PNI-TW
address:        Pittqiao Network Information Co.,Ltd.
address:        Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
address:        Taipei City 11085, Taiwan.
e-mail:         noc@pni.com.tw
abuse-mailbox:  noc@pni.com.tw
admin-c:        TT950-AP
tech-c:         TT950-AP
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:45:50Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Teson Tsai
address:        Pittqiao Network Information Co.,Ltd.
address:        Rm. 5, 5F., No.171, Songde Rd., Xinyi Dist.,
address:        Taipei City 11085, Taiwan.
country:        TW
phone:          +886-2-2728-3689
e-mail:         noc@pni.com.tw
nic-hdl:        TT950-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-08-28T08:26:48Z
source:         APNIC
remarks:        (hid:0905-S-TW-FX0)

% Information related to '103.157.42.0/24AS131642'

route:          103.157.42.0/24
origin:         AS131642
descr:          Taiwan Network Information Center
                3F., No. 123, Sec. 4, Bade Rd., Songshan Dist.
mnt-by:         MAINT-TW-TWNIC
last-modified:  2020-10-13T09:05:37Z
source:         APNIC

% Information related to '103.157.42.0/24AS64271'

route:          103.157.42.0/24
origin:         AS64271
descr:          Taiwan Network Information Center
                3F., No. 123, Sec. 4, Bade Rd., Songshan Dist.
mnt-by:         MAINT-TW-TWNIC
last-modified:  2020-10-13T09:04:23Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.157.42.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.157.42.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120903 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 10:08:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
41.42.157.103.in-addr.arpa domain name pointer 103-157-42-41.baimakj.com.
Nslookup info:
b'41.42.157.103.in-addr.arpa	name = 103-157-42-41.baimakj.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
106.52.24.64 attackspam
Invalid user jasho from 106.52.24.64 port 49342
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.64
Failed password for invalid user jasho from 106.52.24.64 port 49342 ssh2
Invalid user forlenza from 106.52.24.64 port 56194
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.64
2019-12-09 17:27:19
197.5.145.99 attack
Dec  9 09:50:34 MK-Soft-VM7 sshd[32346]: Failed password for root from 197.5.145.99 port 8128 ssh2
...
2019-12-09 17:52:26
94.191.28.88 attackspambots
Dec  9 09:06:56 xxxxxxx0 sshd[28136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88  user=r.r
Dec  9 09:06:58 xxxxxxx0 sshd[28136]: Failed password for r.r from 94.191.28.88 port 42964 ssh2
Dec  9 09:17:53 xxxxxxx0 sshd[31359]: Invalid user ottsman from 94.191.28.88 port 46800
Dec  9 09:17:53 xxxxxxx0 sshd[31359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88
Dec  9 09:17:56 xxxxxxx0 sshd[31359]: Failed password for invalid user ottsman from 94.191.28.88 port 46800 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.191.28.88
2019-12-09 17:29:23
121.10.160.138 attack
Host Scan
2019-12-09 17:27:03
176.31.100.19 attack
Dec  8 23:32:43 sachi sshd\[20292\]: Invalid user uhn from 176.31.100.19
Dec  8 23:32:43 sachi sshd\[20292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388913.ip-176-31-100.eu
Dec  8 23:32:45 sachi sshd\[20292\]: Failed password for invalid user uhn from 176.31.100.19 port 40394 ssh2
Dec  8 23:37:52 sachi sshd\[20746\]: Invalid user xyz from 176.31.100.19
Dec  8 23:37:52 sachi sshd\[20746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388913.ip-176-31-100.eu
2019-12-09 17:49:35
189.28.144.8 attack
Dec  9 09:27:00 MK-Soft-VM7 sshd[31996]: Failed password for root from 189.28.144.8 port 43124 ssh2
...
2019-12-09 17:32:53
180.125.255.126 attackbotsspam
Email spam message
2019-12-09 17:54:00
129.211.14.39 attackbots
Dec  8 23:02:12 auw2 sshd\[23281\]: Invalid user qqqqqqqq from 129.211.14.39
Dec  8 23:02:12 auw2 sshd\[23281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.14.39
Dec  8 23:02:15 auw2 sshd\[23281\]: Failed password for invalid user qqqqqqqq from 129.211.14.39 port 43976 ssh2
Dec  8 23:07:27 auw2 sshd\[23811\]: Invalid user xstatik from 129.211.14.39
Dec  8 23:07:27 auw2 sshd\[23811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.14.39
2019-12-09 17:31:32
89.208.198.59 attackspam
Dec  9 08:09:11 server sshd\[17175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.198.59  user=root
Dec  9 08:09:14 server sshd\[17175\]: Failed password for root from 89.208.198.59 port 64711 ssh2
Dec  9 08:53:47 server sshd\[29787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.198.59  user=root
Dec  9 08:53:49 server sshd\[29787\]: Failed password for root from 89.208.198.59 port 50007 ssh2
Dec  9 09:29:09 server sshd\[7865\]: Invalid user user from 89.208.198.59
...
2019-12-09 17:47:33
171.251.59.209 attackspambots
Host Scan
2019-12-09 17:48:52
49.235.38.225 attackbots
Dec  8 20:23:31 auw2 sshd\[5208\]: Invalid user yamaguti from 49.235.38.225
Dec  8 20:23:31 auw2 sshd\[5208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.38.225
Dec  8 20:23:33 auw2 sshd\[5208\]: Failed password for invalid user yamaguti from 49.235.38.225 port 50184 ssh2
Dec  8 20:29:20 auw2 sshd\[5898\]: Invalid user Auftrag123 from 49.235.38.225
Dec  8 20:29:20 auw2 sshd\[5898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.38.225
2019-12-09 17:36:36
59.41.117.89 attackbots
$f2bV_matches
2019-12-09 17:55:40
62.234.99.172 attackbotsspam
Dec  9 09:03:26 pi sshd\[12116\]: Failed password for www-data from 62.234.99.172 port 46070 ssh2
Dec  9 09:11:21 pi sshd\[12628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172  user=root
Dec  9 09:11:23 pi sshd\[12628\]: Failed password for root from 62.234.99.172 port 46136 ssh2
Dec  9 09:19:17 pi sshd\[13132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172  user=root
Dec  9 09:19:20 pi sshd\[13132\]: Failed password for root from 62.234.99.172 port 46199 ssh2
...
2019-12-09 17:24:27
77.20.107.79 attackspambots
detected by Fail2Ban
2019-12-09 17:46:07
117.4.49.76 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-09 17:34:40

Recently Reported IPs

103.157.42.16 3.253.246.7 147.185.133.179 10.2.41.59
20.38.42.22 185.191.118.188 177.124.88.18 3.255.207.122
74.7.175.170 121.159.126.126 38.213.168.248 119.45.253.42
113.110.143.143 60.7.56.30 68.190.42.180 176.65.132.67
122.10.220.1 51.159.15.84 139.28.232.166 43.248.141.101