Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.200.128.0 - 42.200.255.255'

% Abuse contact for '42.200.128.0 - 42.200.255.255' is 'noc@imsbiz.com'

inetnum:        42.200.128.0 - 42.200.255.255
netname:        HKT-BIA
descr:          Hong Kong Telecommunications (HKT) Limited Business Internet
country:        HK
admin-c:        TA66-AP
tech-c:         TA66-AP
abuse-c:        AP706-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-HK-PCCW-BIA-CS
mnt-irt:        IRT-PCCW-BIA-HK
last-modified:  2021-01-27T13:23:08Z
source:         APNIC

irt:            IRT-PCCW-BIA-HK
address:        PO Box 9896 GPO
e-mail:         noc@imsbiz.com
abuse-mailbox:  noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
auth:           # Filtered
remarks:        noc@imsbiz.com
remarks:        noc@imsbiz.com was validated on 2026-04-23
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2026-04-23T02:00:26Z
source:         APNIC

role:           ABUSE PCCWBIAHK
country:        ZZ
address:        PO Box 9896 GPO
phone:          +000000000
e-mail:         noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
nic-hdl:        AP706-AP
remarks:        Generated from irt object IRT-PCCW-BIA-HK
remarks:        noc@imsbiz.com was validated on 2026-04-23
abuse-mailbox:  noc@imsbiz.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-04-23T02:00:42Z
source:         APNIC

role:           TECHNICAL ADMINISTRATORS
address:        HKT Limited
address:        PO Box 9896 GPO
phone:          +852-2883-5151
country:        HK
e-mail:         noc@imsbiz.com
admin-c:        NOC18-AP
admin-c:        WC109-AP
tech-c:         NOC18-AP
tech-c:         WC109-AP
nic-hdl:        TA66-AP
notify:         noc@imsbiz.com
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2016-07-15T04:03:30Z
source:         APNIC

% Information related to '42.200.192.0/19AS4515'

route:          42.200.192.0/19
descr:          PCCW IMSBiz route object
origin:         AS4515
mnt-by:         MAINT-HK-PCCW-BIA
mnt-routes:     MAINT-HK-PCCW-BIA
last-modified:  2011-03-22T05:30:02Z
source:         APNIC

% Information related to '42.200.192.0/19AS4760'

route:          42.200.192.0/19
origin:         AS4760
descr:          PCCW IMS Ltd (PCCW Business Internet Access)
                26/F, PCCW TOWER
                TAIKOO PLACE
                979 KINGS ROAD
                QUARRY BAY, HONG KONG
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2020-06-12T06:21:46Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.193.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.200.193.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 06:00:27 CST 2026
;; MSG SIZE  rcvd: 106
Host info
83.193.200.42.in-addr.arpa domain name pointer 42-200-193-83.static.imsbiz.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.193.200.42.in-addr.arpa	name = 42-200-193-83.static.imsbiz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.238.55.11 attackbots
Sep  2 23:52:35 vps768472 sshd\[23958\]: Invalid user pi from 84.238.55.11 port 49343
Sep  2 23:52:35 vps768472 sshd\[23958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.238.55.11
Sep  2 23:52:37 vps768472 sshd\[23958\]: Failed password for invalid user pi from 84.238.55.11 port 49343 ssh2
...
2020-09-03 20:47:45
83.137.149.120 attackbotsspam
83.137.149.120 - - [03/Sep/2020:12:06:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1965 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.137.149.120 - - [03/Sep/2020:12:06:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.137.149.120 - - [03/Sep/2020:12:06:21 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-03 20:50:05
58.16.145.208 attack
$f2bV_matches
2020-09-03 21:14:33
27.54.54.64 attack
Automatic report - Port Scan Attack
2020-09-03 21:24:47
91.192.10.53 attackspambots
Sep  3 11:15:57 santamaria sshd\[28838\]: Invalid user nagios from 91.192.10.53
Sep  3 11:15:57 santamaria sshd\[28838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.10.53
Sep  3 11:15:59 santamaria sshd\[28838\]: Failed password for invalid user nagios from 91.192.10.53 port 42271 ssh2
...
2020-09-03 21:07:43
218.92.0.138 attackspam
Time:     Thu Sep  3 12:49:26 2020 +0000
IP:       218.92.0.138 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  3 12:49:09 ca-16-ede1 sshd[12859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Sep  3 12:49:11 ca-16-ede1 sshd[12859]: Failed password for root from 218.92.0.138 port 21234 ssh2
Sep  3 12:49:14 ca-16-ede1 sshd[12859]: Failed password for root from 218.92.0.138 port 21234 ssh2
Sep  3 12:49:18 ca-16-ede1 sshd[12859]: Failed password for root from 218.92.0.138 port 21234 ssh2
Sep  3 12:49:21 ca-16-ede1 sshd[12859]: Failed password for root from 218.92.0.138 port 21234 ssh2
2020-09-03 20:57:49
157.42.179.60 attackbotsspam
1599065335 - 09/02/2020 18:48:55 Host: 157.42.179.60/157.42.179.60 Port: 445 TCP Blocked
...
2020-09-03 21:12:01
31.202.216.191 attackbots
SSH bruteforce
2020-09-03 20:50:28
167.71.38.104 attack
 TCP (SYN) 167.71.38.104:53209 -> port 2039, len 44
2020-09-03 20:56:22
112.85.42.173 attack
Tried sshing with brute force.
2020-09-03 21:02:37
185.220.102.248 attackbots
(sshd) Failed SSH login from 185.220.102.248 (DE/Germany/tor-exit-relay-2.anonymizing-proxy.digitalcourage.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  3 13:15:16 amsweb01 sshd[17962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.248  user=root
Sep  3 13:15:19 amsweb01 sshd[17962]: Failed password for root from 185.220.102.248 port 29352 ssh2
Sep  3 13:15:21 amsweb01 sshd[17962]: Failed password for root from 185.220.102.248 port 29352 ssh2
Sep  3 13:15:24 amsweb01 sshd[17962]: Failed password for root from 185.220.102.248 port 29352 ssh2
Sep  3 13:15:26 amsweb01 sshd[17962]: Failed password for root from 185.220.102.248 port 29352 ssh2
2020-09-03 21:29:46
61.177.172.54 attack
Sep  3 14:50:22 ns382633 sshd\[7279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Sep  3 14:50:24 ns382633 sshd\[7279\]: Failed password for root from 61.177.172.54 port 4289 ssh2
Sep  3 14:50:27 ns382633 sshd\[7279\]: Failed password for root from 61.177.172.54 port 4289 ssh2
Sep  3 14:50:31 ns382633 sshd\[7279\]: Failed password for root from 61.177.172.54 port 4289 ssh2
Sep  3 14:50:34 ns382633 sshd\[7279\]: Failed password for root from 61.177.172.54 port 4289 ssh2
2020-09-03 20:55:31
165.22.32.60 attackbots
firewall-block, port(s): 53413/udp
2020-09-03 21:30:11
146.0.41.70 attackspambots
Sep  3 05:50:33 host sshd\[15630\]: Invalid user wmf from 146.0.41.70
Sep  3 05:50:33 host sshd\[15630\]: Failed password for invalid user wmf from 146.0.41.70 port 53104 ssh2
Sep  3 05:54:15 host sshd\[15746\]: Failed password for root from 146.0.41.70 port 58292 ssh2
...
2020-09-03 21:25:17
83.235.174.95 attackspam
Automatic report - Port Scan Attack
2020-09-03 21:25:47

Recently Reported IPs

64.179.162.164 148.96.94.85 2606:4700:10::6816:2815 43.160.240.216
63.34.145.48 157.230.123.151 14.212.68.42 146.103.41.75
54.91.45.104 2606:4700:10::6814:6558 2606:4700:10::6814:6199 52.6.113.215
50.16.169.122 170.106.75.142 2606:4700:10::6816:3995 2606:4700:10::ac43:2884
2606:4700:20::681a:200 66.132.186.206 45.142.193.24 45.230.66.123