Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tsuen Wan

Region: Tsuen Wan New Territories

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.164.58.0 - 102.164.58.255'

% No abuse contact registered for 102.164.58.0 - 102.164.58.255

inetnum:        102.164.58.0 - 102.164.58.255
netname:        YUNJIE_COMMUNICATION
descr:          Abuse contact:  abuse@larus.net
country:        HK
admin-c:        LA48-AFRINIC
tech-c:         LA48-AFRINIC
status:         ASSIGNED PA
mnt-by:         DSL5-MNT
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
parent:         102.164.56.0 - 102.164.59.255

person:         LARUS ADMIN
address:        Flat A3,11/F,TML Tower,Tsuen Wan,HK
phone:          tel:+852-2988-8918
abuse-mailbox:  abuse@larus.help
nic-hdl:        LA48-AFRINIC
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered

% Information related to '102.164.58.0/23AS328298'

route:          102.164.58.0/23
descr:          Duara Systems Ltd
origin:         AS328298
mnt-by:         DSL5-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.164.58.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.164.58.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 16:01:22 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 119.58.164.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.58.164.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.89.157.197 attackspam
Apr 20 09:31:29 server sshd[12007]: Failed password for invalid user postgres from 36.89.157.197 port 44974 ssh2
Apr 20 09:34:55 server sshd[12740]: Failed password for invalid user ftpuser from 36.89.157.197 port 47258 ssh2
Apr 20 09:37:08 server sshd[13154]: Failed password for invalid user ubuntu from 36.89.157.197 port 37000 ssh2
2020-04-20 16:22:51
106.75.169.207 attackspam
k+ssh-bruteforce
2020-04-20 16:16:50
61.216.2.79 attack
Apr 20 09:18:56 debian-2gb-nbg1-2 kernel: \[9626099.462210\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=61.216.2.79 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=41086 PROTO=TCP SPT=58063 DPT=24079 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-20 16:17:14
209.97.190.223 attackbots
Masscan Port Scanning Tool Detection
2020-04-20 16:19:05
218.78.105.98 attack
Apr 20 08:29:24 163-172-32-151 sshd[30925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.105.98  user=root
Apr 20 08:29:26 163-172-32-151 sshd[30925]: Failed password for root from 218.78.105.98 port 46822 ssh2
...
2020-04-20 15:59:53
163.204.222.255 attackspam
postfix (unknown user, SPF fail or relay access denied)
2020-04-20 15:58:45
64.225.60.164 attackspambots
trying to access non-authorized port
2020-04-20 16:18:48
159.89.171.121 attackbots
Invalid user cb from 159.89.171.121 port 41670
2020-04-20 16:18:08
114.119.160.18 attackbotsspam
21 attempts against mh-misbehave-ban on milky
2020-04-20 16:19:41
125.19.37.226 attack
2020-04-20T05:51:22.601748upcloud.m0sh1x2.com sshd[31772]: Invalid user testa from 125.19.37.226 port 55346
2020-04-20 15:57:10
167.172.57.75 attackspambots
SSH auth scanning - multiple failed logins
2020-04-20 16:39:59
163.172.49.56 attackbots
SSH Brute Force
2020-04-20 16:05:05
149.56.142.198 attack
Invalid user ri from 149.56.142.198 port 39574
2020-04-20 16:00:43
180.96.27.75 attackbotsspam
2020-04-20T01:54:11.566517linuxbox-skyline sshd[267922]: Invalid user toby from 180.96.27.75 port 27145
...
2020-04-20 16:27:34
51.178.52.185 attackspambots
Apr 20 09:06:17 OPSO sshd\[6731\]: Invalid user zv from 51.178.52.185 port 59353
Apr 20 09:06:17 OPSO sshd\[6731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.52.185
Apr 20 09:06:19 OPSO sshd\[6731\]: Failed password for invalid user zv from 51.178.52.185 port 59353 ssh2
Apr 20 09:10:31 OPSO sshd\[7770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.52.185  user=root
Apr 20 09:10:34 OPSO sshd\[7770\]: Failed password for root from 51.178.52.185 port 40183 ssh2
2020-04-20 16:05:56

Recently Reported IPs

35.203.211.14 152.32.204.21 120.220.178.121 103.170.53.200
177.70.2.220 137.184.161.241 176.65.139.12 47.237.7.154
47.84.97.157 36.74.229.17 251.1.146.131 157.73.41.229
251.0.147.119 61.130.103.90 92.217.69.209 92.217.69.12
10.111.255.1 54.38.243.56 185.247.137.155 34.206.74.121