Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western Hong Kong Island

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.200.80.42 attackspambots
Oct 8 17:30:53 *hidden* sshd[29297]: Failed password for *hidden* from 42.200.80.42 port 42834 ssh2 Oct 8 17:37:17 *hidden* sshd[32164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42 user=root Oct 8 17:37:19 *hidden* sshd[32164]: Failed password for *hidden* from 42.200.80.42 port 49668 ssh2
2020-10-11 01:56:29
42.200.80.42 attackbots
Aug 19 05:52:25 jumpserver sshd[211693]: Failed password for invalid user info from 42.200.80.42 port 56272 ssh2
Aug 19 05:55:30 jumpserver sshd[211724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42  user=root
Aug 19 05:55:31 jumpserver sshd[211724]: Failed password for root from 42.200.80.42 port 52272 ssh2
...
2020-08-19 19:10:12
42.200.80.42 attackspambots
Aug  1 00:55:43 vpn01 sshd[26690]: Failed password for root from 42.200.80.42 port 43476 ssh2
...
2020-08-01 08:18:48
42.200.80.42 attack
2020-07-30T01:43:03.958487lavrinenko.info sshd[16622]: Invalid user krishnaji from 42.200.80.42 port 39576
2020-07-30T01:43:03.963883lavrinenko.info sshd[16622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42
2020-07-30T01:43:03.958487lavrinenko.info sshd[16622]: Invalid user krishnaji from 42.200.80.42 port 39576
2020-07-30T01:43:05.846061lavrinenko.info sshd[16622]: Failed password for invalid user krishnaji from 42.200.80.42 port 39576 ssh2
2020-07-30T01:47:54.061363lavrinenko.info sshd[16825]: Invalid user fjy from 42.200.80.42 port 52094
...
2020-07-30 08:28:20
42.200.80.42 attackbotsspam
prod8
...
2020-07-28 13:37:57
42.200.80.42 attackspambots
Jul  9 13:22:15 XXX sshd[43801]: Invalid user sheba from 42.200.80.42 port 56184
2020-07-09 22:40:27
42.200.80.42 attackspambots
2020-06-24T14:02:55.014892amanda2.illicoweb.com sshd\[34043\]: Invalid user git from 42.200.80.42 port 47306
2020-06-24T14:02:55.017181amanda2.illicoweb.com sshd\[34043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-80-42.static.imsbiz.com
2020-06-24T14:02:56.953401amanda2.illicoweb.com sshd\[34043\]: Failed password for invalid user git from 42.200.80.42 port 47306 ssh2
2020-06-24T14:05:18.379206amanda2.illicoweb.com sshd\[34341\]: Invalid user mq from 42.200.80.42 port 52240
2020-06-24T14:05:18.382164amanda2.illicoweb.com sshd\[34341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-80-42.static.imsbiz.com
...
2020-06-25 00:55:33
42.200.80.42 attackbots
Jun 21 14:27:21 serwer sshd\[16105\]: Invalid user prox from 42.200.80.42 port 44702
Jun 21 14:27:21 serwer sshd\[16105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42
Jun 21 14:27:22 serwer sshd\[16105\]: Failed password for invalid user prox from 42.200.80.42 port 44702 ssh2
...
2020-06-22 00:28:24
42.200.80.42 attackspam
" "
2020-06-12 05:50:04
42.200.80.42 attack
Fail2Ban
2020-06-12 00:28:47
42.200.80.42 attack
(sshd) Failed SSH login from 42.200.80.42 (HK/Hong Kong/42-200-80-42.static.imsbiz.com): 5 in the last 3600 secs
2020-06-09 22:16:26
42.200.80.42 attackbots
Jun  3 23:22:53 server sshd[30544]: Failed password for root from 42.200.80.42 port 46440 ssh2
Jun  3 23:26:42 server sshd[1960]: Failed password for root from 42.200.80.42 port 45768 ssh2
Jun  3 23:30:29 server sshd[5833]: Failed password for root from 42.200.80.42 port 45076 ssh2
2020-06-04 05:32:25
42.200.80.42 attackbots
Wordpress malicious attack:[sshd]
2020-04-29 19:23:54
42.200.80.42 attack
Apr 18 10:22:44 ws12vmsma01 sshd[11634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-80-42.static.imsbiz.com 
Apr 18 10:22:44 ws12vmsma01 sshd[11634]: Invalid user kh from 42.200.80.42
Apr 18 10:22:46 ws12vmsma01 sshd[11634]: Failed password for invalid user kh from 42.200.80.42 port 51522 ssh2
...
2020-04-19 02:18:42
42.200.80.42 attackbotsspam
Apr  3 09:08:13 s158375 sshd[18740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42
2020-04-04 03:15:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.80.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.200.80.193.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100900 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 09 18:03:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
193.80.200.42.in-addr.arpa domain name pointer 42-200-80-193.static.imsbiz.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.80.200.42.in-addr.arpa	name = 42-200-80-193.static.imsbiz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.186.239.69 attackspambots
unauthorized connection attempt
2020-02-26 20:15:41
91.92.207.137 attack
unauthorized connection attempt
2020-02-26 20:20:58
223.15.219.170 attack
unauthorized connection attempt
2020-02-26 20:54:23
159.146.78.199 attackbotsspam
unauthorized connection attempt
2020-02-26 20:28:57
118.71.251.2 attackbots
unauthorized connection attempt
2020-02-26 20:47:17
121.148.179.226 attackbotsspam
firewall-block, port(s): 23/tcp
2020-02-26 20:45:51
27.78.46.208 attack
unauthorized connection attempt
2020-02-26 20:53:55
118.137.160.219 attack
unauthorized connection attempt
2020-02-26 20:31:10
220.175.150.157 attack
unauthorized connection attempt
2020-02-26 20:39:39
211.100.96.186 attackbotsspam
unauthorized connection attempt
2020-02-26 20:24:59
115.61.4.153 attack
unauthorized connection attempt
2020-02-26 20:31:24
36.71.150.80 attackspam
unauthorized connection attempt
2020-02-26 20:13:53
219.85.60.4 attackspam
unauthorized connection attempt
2020-02-26 20:55:17
217.58.8.182 attackspam
unauthorized connection attempt
2020-02-26 20:40:08
178.221.90.218 attackspam
unauthorized connection attempt
2020-02-26 20:55:49

Recently Reported IPs

47.68.66.75 67.51.211.25 47.105.107.242 47.138.207.20
88.84.112.125 134.69.16.110 205.57.22.164 233.175.32.253
200.66.77.107 1.156.136.74 241.0.234.248 135.218.138.232
129.183.84.217 14.164.14.214 255.157.145.19 195.30.227.34
187.193.111.4 190.159.72.114 134.94.198.164 21.117.105.211