Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chennai

Region: Tamil Nadu

Country: India

Internet Service Provider: Vi India

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.108.0.0 - 42.111.255.255'

% Abuse contact for '42.108.0.0 - 42.111.255.255' is 'vilapnicspoc@vodafoneidea.com'

inetnum:        42.108.0.0 - 42.111.255.255
netname:        VIL-IN
descr:          Vodafone Idea Ltd
country:        IN
org:            ORG-VIL2-AP
admin-c:        VAS1-AP
tech-c:         VAS1-AP
status:         ALLOCATED PORTABLE
abuse-c:        AV319-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-VIL-IN
mnt-routes:     MAINT-VIL-IN
mnt-irt:        IRT-VIL-IN
last-modified:  2023-03-22T04:44:16Z
source:         APNIC

irt:            IRT-VIL-IN
address:        Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone:          +919619218372
e-mail:         saji.samuel@vodafoneidea.com
abuse-mailbox:  vilapnicspoc@vodafoneidea.com
admin-c:        VAS1-AP
tech-c:         VAS1-AP
auth:           # Filtered
remarks:        saji.samuel@vodafoneidea.com
remarks:        saji.samuel@vodafoneidea.com
remarks:        saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks:        vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
mnt-by:         MAINT-VIL-IN
last-modified:  2026-01-21T10:29:12Z
source:         APNIC

organisation:   ORG-VIL2-AP
org-name:       Vodafone Idea Ltd. (VIL)
org-type:       LIR
country:        IN
address:        10th Flr,Birla Centurion,Pandurkar Bhudkar Marg,Prabhadevi
phone:          +91-9819-81-83-79
e-mail:         snoctx.helpdesk@vodafoneidea.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:17:42Z
source:         APNIC

role:           ABUSE VILIN
country:        ZZ
address:        Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone:          +919619218372
e-mail:         saji.samuel@vodafoneidea.com
admin-c:        VAS1-AP
tech-c:         VAS1-AP
nic-hdl:        AV319-AP
remarks:        Generated from irt object IRT-VIL-IN
remarks:        saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks:        vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
abuse-mailbox:  vilapnicspoc@vodafoneidea.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-21T10:41:35Z
source:         APNIC

person:         VIL APNIC SCOPE
address:        10th Flr,Birla Centurion,Pandurkar Bhudkar Marg,Prabhadevi, Mumbai Maharashtra 400030
country:        IN
phone:          +912071102509
e-mail:         vilapnicspoc@vodafoneidea.com
nic-hdl:        VAS1-AP
mnt-by:         MAINT-VIL-IN
last-modified:  2024-01-31T10:08:35Z
source:         APNIC

% Information related to '42.111.136.0/22AS38266'

route:          42.111.136.0/22
origin:         AS38266
descr:          Hutchison Max Telecom Limited
                Vodafone India Ltd.
                414/2, Sahas Building
                Off Veer Savarkar Marg,
                Prabhadevi,
mnt-by:         MAINT-VIL-IN
last-modified:  2023-03-22T05:27:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.111.136.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.111.136.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040802 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 08:36:09 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 71.136.111.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.136.111.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.142.120.89 attackspambots
2020-09-04 08:27:08 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=accounts@org.ua\)2020-09-04 08:27:40 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=purchase@org.ua\)2020-09-04 08:28:17 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=thumbs@org.ua\)
...
2020-09-04 13:32:08
49.235.147.233 attackspam
Sep  3 23:48:57 rancher-0 sshd[1429337]: Invalid user avinash from 49.235.147.233 port 45244
Sep  3 23:49:00 rancher-0 sshd[1429337]: Failed password for invalid user avinash from 49.235.147.233 port 45244 ssh2
...
2020-09-04 13:02:56
134.175.129.58 attack
Invalid user courses from 134.175.129.58 port 28565
2020-09-04 13:27:58
147.91.31.52 attack
As always with Serbia 
	 /Wp-login.php  	 /wp-admin.php
2020-09-04 13:17:53
112.85.42.94 attack
Sep  4 08:08:37 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep  4 08:08:39 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep  4 08:08:41 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep  4 08:11:23 pkdns2 sshd\[63606\]: Failed password for root from 112.85.42.94 port 44530 ssh2Sep  4 08:13:13 pkdns2 sshd\[63715\]: Failed password for root from 112.85.42.94 port 27455 ssh2Sep  4 08:14:09 pkdns2 sshd\[63771\]: Failed password for root from 112.85.42.94 port 54553 ssh2
...
2020-09-04 13:15:35
51.210.44.194 attack
Sep  3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194
Sep  3 21:32:59 h2646465 sshd[20786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194
Sep  3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194
Sep  3 21:33:01 h2646465 sshd[20786]: Failed password for invalid user test from 51.210.44.194 port 57892 ssh2
Sep  3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194
Sep  3 21:49:12 h2646465 sshd[22852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194
Sep  3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194
Sep  3 21:49:13 h2646465 sshd[22852]: Failed password for invalid user zhs from 51.210.44.194 port 59090 ssh2
Sep  3 21:53:57 h2646465 sshd[23463]: Invalid user praveen from 51.210.44.194
...
2020-09-04 12:59:25
112.116.155.205 attackbots
 TCP (SYN) 112.116.155.205:38811 -> port 5365, len 44
2020-09-04 12:53:00
177.102.239.107 attackbotsspam
Sep  3 18:49:39 mellenthin postfix/smtpd[20369]: NOQUEUE: reject: RCPT from unknown[177.102.239.107]: 554 5.7.1 Service unavailable; Client host [177.102.239.107] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/177.102.239.107; from= to= proto=ESMTP helo=<177-102-239-107.dsl.telesp.net.br>
2020-09-04 13:25:41
185.220.101.203 attackbots
$lgm
2020-09-04 13:11:50
164.132.44.218 attack
Invalid user magno from 164.132.44.218 port 46769
2020-09-04 13:08:08
117.211.192.70 attack
*Port Scan* detected from 117.211.192.70 (IN/India/Karnataka/Bengaluru/-). 4 hits in the last 140 seconds
2020-09-04 12:53:28
201.209.143.220 attackbots
1599151790 - 09/03/2020 18:49:50 Host: 201.209.143.220/201.209.143.220 Port: 445 TCP Blocked
2020-09-04 13:11:30
222.186.190.2 attackspambots
2020-09-04T07:13:23.717660ns386461 sshd\[19565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-09-04T07:13:25.506337ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2
2020-09-04T07:13:28.902061ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2
2020-09-04T07:13:33.378647ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2
2020-09-04T07:13:36.568508ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2
...
2020-09-04 13:19:57
106.13.165.247 attackspam
$f2bV_matches
2020-09-04 13:34:21
103.147.10.222 attackbots
103.147.10.222 - - [04/Sep/2020:02:35:51 +0200] "POST /wp-login.php HTTP/1.0" 200 4800 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-04 13:26:09

Recently Reported IPs

84.175.63.245 2606:4700:10::6816:69 2606:4700:10::6814:9087 2606:4700:10::6814:8374
2606:4700:10::6814:7495 216.150.29.236 120.232.161.206 66.132.224.80
198.235.24.215 47.239.114.226 2606:4700:10::ac43:2381 2606:4700:10::6814:9391
2606:4700:10::6814:6347 2606:4700:10::6816:606 2606:4700:10::6814:9028 2606:4700:10::6814:8148
2606:4700:10::6816:1229 110.78.158.173 2606:4700:10::6816:3507 36.163.116.55