Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.169.169.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28115
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.169.169.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 02 03:19:01 CST 2019
;; MSG SIZE  rcvd: 118

Host info
42.169.169.118.in-addr.arpa domain name pointer 118-169-169-42.dynamic-ip.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
42.169.169.118.in-addr.arpa	name = 118-169-169-42.dynamic-ip.hinet.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
174.138.26.4 attack
SSH login attempts with user root.
2019-11-30 06:05:12
193.158.48.4 attackspam
SSH login attempts with user root.
2019-11-30 05:38:10
182.61.175.7 attackspam
SSH login attempts with user root.
2019-11-30 05:55:59
202.169.62.1 attackspambots
SSH login attempts with user root.
2019-11-30 05:27:03
191.54.228.251 attackbots
Automatic report - Port Scan Attack
2019-11-30 06:07:28
34.83.112.127 attackbots
Uses different bank notification for phishing
2019-11-30 05:31:10
5.18.163.58 attackspambots
port scan/probe/communication attempt
2019-11-30 06:03:23
94.52.138.205 attackbots
Port 1433 Scan
2019-11-30 05:50:18
94.231.182.45 attack
445/tcp 445/tcp
[2019-11-02/29]2pkt
2019-11-30 05:30:23
123.234.219.226 attackbotsspam
2019-11-29T17:49:45.060314abusebot-5.cloudsearch.cf sshd\[1623\]: Invalid user deployer from 123.234.219.226 port 20743
2019-11-30 05:36:45
180.76.112.1 attackspam
SSH login attempts with user root.
2019-11-30 05:57:07
185.153.199.1 attack
SSH login attempts with user root.
2019-11-30 05:51:58
14.185.141.136 attack
port scan/probe/communication attempt
2019-11-30 05:31:33
98.15.44.31 attackspam
5555/tcp 5555/tcp 5555/tcp...
[2019-11-06/29]4pkt,1pt.(tcp)
2019-11-30 05:53:31
203.167.192.1 attack
web Attack on Wordpress site
2019-11-30 05:26:13

Recently Reported IPs

94.25.228.21 91.33.208.222 95.142.94.190 58.57.253.120
82.175.192.233 62.218.171.61 221.118.84.125 181.191.48.254
185.245.15.4 93.19.125.179 38.138.238.122 151.17.229.11
42.201.182.57 53.244.228.220 61.179.232.213 39.75.46.56
135.3.110.68 160.80.24.233 31.132.176.166 83.190.131.88