Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kwai Chung

Region: Kwai Tsing New Territories

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.200.230.172 attackbots
Port 22 Scan, PTR: None
2020-08-19 06:52:32
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.200.128.0 - 42.200.255.255'

% Abuse contact for '42.200.128.0 - 42.200.255.255' is 'noc@imsbiz.com'

inetnum:        42.200.128.0 - 42.200.255.255
netname:        HKT-BIA
descr:          Hong Kong Telecommunications (HKT) Limited Business Internet
country:        HK
admin-c:        TA66-AP
tech-c:         TA66-AP
abuse-c:        AP706-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-HK-PCCW-BIA-CS
mnt-irt:        IRT-PCCW-BIA-HK
last-modified:  2021-01-27T13:23:08Z
source:         APNIC

irt:            IRT-PCCW-BIA-HK
address:        PO Box 9896 GPO
e-mail:         noc@imsbiz.com
abuse-mailbox:  noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
auth:           # Filtered
remarks:        noc@imsbiz.com
remarks:        noc@imsbiz.com was validated on 2026-04-23
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2026-04-23T02:00:26Z
source:         APNIC

role:           ABUSE PCCWBIAHK
country:        ZZ
address:        PO Box 9896 GPO
phone:          +000000000
e-mail:         noc@imsbiz.com
admin-c:        TA66-AP
tech-c:         TA66-AP
nic-hdl:        AP706-AP
remarks:        Generated from irt object IRT-PCCW-BIA-HK
remarks:        noc@imsbiz.com was validated on 2026-04-23
abuse-mailbox:  noc@imsbiz.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-04-23T02:00:42Z
source:         APNIC

role:           TECHNICAL ADMINISTRATORS
address:        HKT Limited
address:        PO Box 9896 GPO
phone:          +852-2883-5151
country:        HK
e-mail:         noc@imsbiz.com
admin-c:        NOC18-AP
admin-c:        WC109-AP
tech-c:         NOC18-AP
tech-c:         WC109-AP
nic-hdl:        TA66-AP
notify:         noc@imsbiz.com
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2016-07-15T04:03:30Z
source:         APNIC

% Information related to '42.200.224.0/19AS4515'

route:          42.200.224.0/19
descr:          PCCW IMSBiz route object
origin:         AS4515
mnt-by:         MAINT-HK-PCCW-BIA
mnt-routes:     MAINT-HK-PCCW-BIA
last-modified:  2011-03-22T05:30:03Z
source:         APNIC

% Information related to '42.200.224.0/19AS4760'

route:          42.200.224.0/19
origin:         AS4760
descr:          PCCW IMS Ltd (PCCW Business Internet Access)
                26/F, PCCW TOWER
                TAIKOO PLACE
                979 KINGS ROAD
                QUARRY BAY, HONG KONG
mnt-by:         MAINT-HK-PCCW-BIA
last-modified:  2020-06-12T06:22:25Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.230.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.200.230.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 19:41:20 CST 2026
;; MSG SIZE  rcvd: 107
Host info
143.230.200.42.in-addr.arpa domain name pointer 42-200-230-143.static.imsbiz.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.230.200.42.in-addr.arpa	name = 42-200-230-143.static.imsbiz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.144.159.163 attack
Automatic report - Port Scan Attack
2020-07-11 17:19:22
122.115.57.174 attackspambots
fail2ban -- 122.115.57.174
...
2020-07-11 17:12:31
222.186.180.41 attack
Jul 11 11:15:31 pve1 sshd[20802]: Failed password for root from 222.186.180.41 port 51266 ssh2
Jul 11 11:15:36 pve1 sshd[20802]: Failed password for root from 222.186.180.41 port 51266 ssh2
...
2020-07-11 17:23:29
35.238.235.88 attackspambots
Jul 11 11:47:00 itv-usvr-01 sshd[32177]: Invalid user lucinda from 35.238.235.88
Jul 11 11:47:00 itv-usvr-01 sshd[32177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.238.235.88
Jul 11 11:47:00 itv-usvr-01 sshd[32177]: Invalid user lucinda from 35.238.235.88
Jul 11 11:47:03 itv-usvr-01 sshd[32177]: Failed password for invalid user lucinda from 35.238.235.88 port 60052 ssh2
Jul 11 11:50:08 itv-usvr-01 sshd[32341]: Invalid user kathryn from 35.238.235.88
2020-07-11 17:42:55
61.133.232.253 attackspambots
sshd: Failed password for invalid user .... from 61.133.232.253 port 14745 ssh2 (4 attempts)
2020-07-11 17:41:19
185.210.218.206 attack
[2020-07-11 04:46:26] NOTICE[1150] chan_sip.c: Registration from '' failed for '185.210.218.206:63861' - Wrong password
[2020-07-11 04:46:26] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-11T04:46:26.569-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8128",SessionID="0x7fcb4c0dfe08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.210.218.206/63861",Challenge="4e16f725",ReceivedChallenge="4e16f725",ReceivedHash="cf4a7217578b8081633a4e7db177f0f6"
[2020-07-11 04:47:24] NOTICE[1150] chan_sip.c: Registration from '' failed for '185.210.218.206:56678' - Wrong password
[2020-07-11 04:47:24] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-11T04:47:24.725-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7861",SessionID="0x7fcb4c39d6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.210
...
2020-07-11 17:41:52
173.212.245.240 attackbots
20 attempts against mh-misbehave-ban on twig
2020-07-11 17:32:31
178.128.156.133 attackbotsspam
20 attempts against mh-ssh on wind
2020-07-11 17:19:50
2.229.92.42 attackbotsspam
Automatic report - Banned IP Access
2020-07-11 17:22:54
222.186.15.62 attackbotsspam
Jul 11 09:04:55 marvibiene sshd[54176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul 11 09:04:57 marvibiene sshd[54176]: Failed password for root from 222.186.15.62 port 22993 ssh2
Jul 11 09:04:59 marvibiene sshd[54176]: Failed password for root from 222.186.15.62 port 22993 ssh2
Jul 11 09:04:55 marvibiene sshd[54176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul 11 09:04:57 marvibiene sshd[54176]: Failed password for root from 222.186.15.62 port 22993 ssh2
Jul 11 09:04:59 marvibiene sshd[54176]: Failed password for root from 222.186.15.62 port 22993 ssh2
...
2020-07-11 17:18:57
202.137.134.96 attack
Last failed login: Thu Jul  9 20:56:59 EDT 2020 from 202.102.107.14 on ssh:notty
There were 26 failed login attempts since the last successful login.
2020-07-11 17:35:09
78.189.218.106 attackbotsspam
Icarus honeypot on github
2020-07-11 17:36:12
62.182.145.104 attackbots
failed_logins
2020-07-11 17:15:29
181.40.122.2 attackspambots
Jul 11 06:13:47 firewall sshd[10124]: Invalid user www from 181.40.122.2
Jul 11 06:13:48 firewall sshd[10124]: Failed password for invalid user www from 181.40.122.2 port 35454 ssh2
Jul 11 06:17:53 firewall sshd[10224]: Invalid user www from 181.40.122.2
...
2020-07-11 17:39:21
64.90.40.100 attack
Automatic report - Banned IP Access
2020-07-11 17:46:19

Recently Reported IPs

14.207.194.172 81.19.219.233 5.226.140.74 5.226.140.109
194.50.235.150 35.93.87.168 2606:4700:10::6814:5485 2606:4700:10::6814:4472
2606:4700:10::6814:5337 2606:4700:10::ac43:2335 20.169.106.62 183.206.96.146
62.162.113.34 198.98.56.217 142.248.80.190 170.9.16.186
112.137.143.130 146.70.194.246 2606:4700:10::6814:8566 2606:4700:10::6816:1605