Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.12.148.128 - 103.12.148.191'

% Abuse contact for '103.12.148.128 - 103.12.148.191' is 'PL-HK@worldmailhk.com'

inetnum:        103.12.148.128 - 103.12.148.191
netname:        PL-HK
descr:          Photon Link Data Center
country:        HK
admin-c:        IA173-AP
tech-c:         IA173-AP
abuse-c:        AP1120-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-PL-HK
mnt-irt:        IRT-PL-HK
last-modified:  2021-01-15T00:52:24Z
source:         APNIC

irt:            IRT-PL-HK
address:        G/F, 20 NG FONG ST, SAN PO KONG, KLN
e-mail:         PL-HK@worldmailhk.com
abuse-mailbox:  PL-HK@worldmailhk.com
admin-c:        PLLN1-AP
tech-c:         PLLN1-AP
auth:           # Filtered
remarks:        pl-hk@worldmailhk.com was validated on 2025-11-04
mnt-by:         MAINT-PL-HK
last-modified:  2025-11-18T00:27:39Z
source:         APNIC

role:           ABUSE PLHK
country:        ZZ
address:        G/F, 20 NG FONG ST, SAN PO KONG, KLN
phone:          +000000000
e-mail:         PL-HK@worldmailhk.com
admin-c:        PLLN1-AP
tech-c:         PLLN1-AP
nic-hdl:        AP1120-AP
remarks:        Generated from irt object IRT-PL-HK
remarks:        pl-hk@worldmailhk.com was validated on 2025-11-04
abuse-mailbox:  PL-HK@worldmailhk.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-04T14:09:30Z
source:         APNIC

person:         IP Administrator
address:        PHOTON LINK DATACENTER
country:        HK
phone:          +852 3586 3295
e-mail:         IDC@PHOTONLINK.COM
nic-hdl:        IA173-AP
mnt-by:         MAINT-HK-PL
last-modified:  2014-08-11T17:30:17Z
source:         APNIC

% Information related to '103.12.148.0/24AS13335'

route:          103.12.148.0/24
origin:         AS13335
descr:          Photon Link Limited
                Unit B, G/F
                20 Ng Fong St
                San Po Kong
mnt-by:         MAINT-PL-HK
last-modified:  2026-03-11T07:02:40Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.12.148.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.12.148.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 14:31:11 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 144.148.12.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.148.12.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.61.82 attackbots
Nov 24 20:26:12 mout sshd[8788]: Invalid user mark from 165.22.61.82 port 36450
2019-11-25 03:30:52
51.89.68.141 attack
Nov 19 03:49:57 *** sshd[3497]: Invalid user ernie3 from 51.89.68.141
Nov 19 03:49:59 *** sshd[3497]: Failed password for invalid user ernie3 from 51.89.68.141 port 39174 ssh2
Nov 19 03:49:59 *** sshd[3497]: Received disconnect from 51.89.68.141: 11: Bye Bye [preauth]
Nov 19 04:01:27 *** sshd[4445]: Invalid user ubnt from 51.89.68.141
Nov 19 04:01:29 *** sshd[4445]: Failed password for invalid user ubnt from 51.89.68.141 port 33626 ssh2
Nov 19 04:01:29 *** sshd[4445]: Received disconnect from 51.89.68.141: 11: Bye Bye [preauth]
Nov 19 04:04:48 *** sshd[4682]: Invalid user shirasaka from 51.89.68.141
Nov 19 04:04:50 *** sshd[4682]: Failed password for invalid user shirasaka from 51.89.68.141 port 42196 ssh2
Nov 19 04:04:50 *** sshd[4682]: Received disconnect from 51.89.68.141: 11: Bye Bye [preauth]
Nov 19 04:08:06 *** sshd[4878]: Invalid user w6bar from 51.89.68.141
Nov 19 04:08:08 *** sshd[4878]: Failed password for invalid user w6bar from 51.89.68.141 port 50798 ssh2
N........
-------------------------------
2019-11-25 03:32:20
180.76.96.125 attackbots
3x Failed Password
2019-11-25 04:05:22
178.128.226.2 attack
Nov 24 18:41:55 meumeu sshd[9616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 
Nov 24 18:41:57 meumeu sshd[9616]: Failed password for invalid user testing from 178.128.226.2 port 53823 ssh2
Nov 24 18:48:09 meumeu sshd[10546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 
...
2019-11-25 03:55:33
201.48.206.146 attackspambots
$f2bV_matches
2019-11-25 03:35:39
42.104.97.242 attackspambots
(sshd) Failed SSH login from 42.104.97.242 (-): 5 in the last 3600 secs
2019-11-25 03:39:25
177.137.89.17 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.137.89.17/ 
 
 BR - 1H : (109)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN53093 
 
 IP : 177.137.89.17 
 
 CIDR : 177.137.88.0/23 
 
 PREFIX COUNT : 20 
 
 UNIQUE IP COUNT : 10240 
 
 
 ATTACKS DETECTED ASN53093 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-24 17:40:04 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-25 04:01:05
206.189.45.199 attack
DNS
2019-11-25 03:29:54
140.246.124.36 attack
Nov 24 22:04:03 server sshd\[28413\]: Invalid user luisfernando from 140.246.124.36
Nov 24 22:04:03 server sshd\[28413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.124.36 
Nov 24 22:04:05 server sshd\[28413\]: Failed password for invalid user luisfernando from 140.246.124.36 port 43142 ssh2
Nov 24 22:21:48 server sshd\[503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.124.36  user=lp
Nov 24 22:21:51 server sshd\[503\]: Failed password for lp from 140.246.124.36 port 59140 ssh2
...
2019-11-25 04:03:01
167.71.195.235 attackspambots
DNS
2019-11-25 03:50:04
68.183.95.191 attackspambots
Invalid user ching from 68.183.95.191 port 60380
2019-11-25 03:55:03
62.234.131.141 attackspambots
Nov 24 09:41:10 wbs sshd\[625\]: Invalid user lisa from 62.234.131.141
Nov 24 09:41:10 wbs sshd\[625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141
Nov 24 09:41:12 wbs sshd\[625\]: Failed password for invalid user lisa from 62.234.131.141 port 56276 ssh2
Nov 24 09:47:37 wbs sshd\[1146\]: Invalid user bali from 62.234.131.141
Nov 24 09:47:37 wbs sshd\[1146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141
2019-11-25 04:06:39
185.176.27.126 attackspambots
4 attacks within less than 90 minutes
2019-11-25 03:34:31
23.254.203.51 attackbots
Nov 23 06:56:38 mail sshd[19761]: Invalid user enrichetta from 23.254.203.51
Nov 23 06:56:38 mail sshd[19761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.254.203.51
Nov 23 06:56:38 mail sshd[19761]: Invalid user enrichetta from 23.254.203.51
Nov 23 06:56:40 mail sshd[19761]: Failed password for invalid user enrichetta from 23.254.203.51 port 60476 ssh2
...
2019-11-25 03:50:37
103.240.135.62 attackbotsspam
Nov 24 20:39:43 web2 sshd[26883]: Failed password for root from 103.240.135.62 port 62214 ssh2
Nov 24 20:39:46 web2 sshd[26883]: Failed password for root from 103.240.135.62 port 62214 ssh2
2019-11-25 04:03:27

Recently Reported IPs

165.227.20.212 168.144.100.90 154.222.29.11 154.222.29.222
2606:4700:10::6816:986 2606:4700:10::ac43:1884 2606:4700:10::6816:2014 2606:4700:10::6816:2247
110.77.226.34 110.78.154.183 2606:4700:10::6814:5156 2606:4700:10::6814:5371
14.207.194.130 88.101.166.148 242.176.27.23 91.230.168.91
174.229.14.157 111.32.81.102 41.59.196.161 37.10.113.211