Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.121.92.0 - 103.121.95.255'

% Abuse contact for '103.121.92.0 - 103.121.95.255' is 'abuse@255.hk'

inetnum:        103.121.92.0 - 103.121.95.255
netname:        FTL-HK
descr:          FOJIP TECHNOLOGY LIMITED
country:        HK
org:            ORG-FTL5-AP
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
status:         ASSIGNED PORTABLE
abuse-c:        AF752-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-FTL-HK
mnt-irt:        IRT-FTL-HK
last-modified:  2025-05-01T02:45:09Z
source:         APNIC

irt:            IRT-FTL-HK
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
e-mail:         abuse@255.hk
abuse-mailbox:  abuse@255.hk
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
auth:           # Filtered
remarks:        abuse@255.hk was validated on 2025-10-15
mnt-by:         MAINT-FTL-HK
last-modified:  2025-11-18T00:36:00Z
source:         APNIC

organisation:   ORG-FTL5-AP
org-name:       FOJIP TECHNOLOGY LIMITED
org-type:       LIR
country:        HK
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
phone:          +852-9649-4010
e-mail:         fojip@fojip.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:50Z
source:         APNIC

role:           ABUSE FTLHK
country:        ZZ
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
phone:          +000000000
e-mail:         abuse@255.hk
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
nic-hdl:        AF752-AP
remarks:        Generated from irt object IRT-FTL-HK
remarks:        abuse@255.hk was validated on 2025-10-15
abuse-mailbox:  abuse@255.hk
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-15T01:20:32Z
source:         APNIC

role:           FOJIP TECHNOLOGY LIMITED administrator
address:        RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST, MONGKOK,KOWLOON HONG KONG 999077
country:        HK
phone:          +852-9649-4010
e-mail:         support@fojip.com
admin-c:        FTLA2-AP
tech-c:         FTLA2-AP
nic-hdl:        FTLA2-AP
mnt-by:         MAINT-FTL-HK
last-modified:  2022-04-27T06:31:08Z
source:         APNIC

% Information related to '103.121.95.0/24AS137899'

route:          103.121.95.0/24
origin:         AS137899
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:19Z
source:         APNIC

% Information related to '103.121.95.0/24AS142032'

route:          103.121.95.0/24
origin:         AS142032
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:26Z
source:         APNIC

% Information related to '103.121.95.0/24AS35876'

route:          103.121.95.0/24
origin:         AS35876
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:36Z
source:         APNIC

% Information related to '103.121.95.0/24AS36642'

route:          103.121.95.0/24
origin:         AS36642
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:42Z
source:         APNIC

% Information related to '103.121.95.0/24AS401696'

route:          103.121.95.0/24
origin:         AS401696
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-06-09T08:03:05Z
source:         APNIC

% Information related to '103.121.95.0/24AS401701'

route:          103.121.95.0/24
origin:         AS401701
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-06-09T08:03:10Z
source:         APNIC

% Information related to '103.121.95.0/24AS40779'

route:          103.121.95.0/24
origin:         AS40779
descr:          FOJIP TECHNOLOGY LIMITED
                RM4,16/F,HO KING COMM CTR,2-16 FAYUEN ST
mnt-by:         MAINT-FTL-HK
last-modified:  2025-05-15T11:59:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.121.95.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.121.95.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 17:16:07 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 193.95.121.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.95.121.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.142.120.38 attack
Oct  2 00:33:06 srv01 postfix/smtpd\[13963\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 00:33:14 srv01 postfix/smtpd\[20442\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 00:33:15 srv01 postfix/smtpd\[20426\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 00:33:18 srv01 postfix/smtpd\[13963\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 00:33:28 srv01 postfix/smtpd\[20486\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 00:33:28 srv01 postfix/smtpd\[20470\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-02 06:50:38
119.28.93.152 attackbotsspam
Oct  1 22:38:21 plex-server sshd[1862329]: Invalid user teamspeak from 119.28.93.152 port 34660
Oct  1 22:38:21 plex-server sshd[1862329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.93.152 
Oct  1 22:38:21 plex-server sshd[1862329]: Invalid user teamspeak from 119.28.93.152 port 34660
Oct  1 22:38:24 plex-server sshd[1862329]: Failed password for invalid user teamspeak from 119.28.93.152 port 34660 ssh2
Oct  1 22:40:52 plex-server sshd[1863330]: Invalid user frappe from 119.28.93.152 port 18410
...
2020-10-02 06:44:38
132.232.47.59 attack
Oct  1 22:50:19 scw-gallant-ride sshd[5582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.47.59
2020-10-02 07:05:20
134.17.94.132 attackspambots
SSH Invalid Login
2020-10-02 07:03:20
93.39.116.254 attackspambots
Oct  1 22:17:49 vlre-nyc-1 sshd\[17422\]: Invalid user uno85 from 93.39.116.254
Oct  1 22:17:49 vlre-nyc-1 sshd\[17422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.116.254
Oct  1 22:17:51 vlre-nyc-1 sshd\[17422\]: Failed password for invalid user uno85 from 93.39.116.254 port 59177 ssh2
Oct  1 22:21:14 vlre-nyc-1 sshd\[17498\]: Invalid user steam from 93.39.116.254
Oct  1 22:21:14 vlre-nyc-1 sshd\[17498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.116.254
...
2020-10-02 06:54:00
95.111.245.15 attackspambots
Invalid user spark from 95.111.245.15 port 34130
2020-10-02 07:03:52
195.54.160.180 attackbotsspam
2020-10-01T16:55:53.758574correo.[domain] sshd[36945]: Invalid user plex from 195.54.160.180 port 55638 2020-10-01T16:55:55.799400correo.[domain] sshd[36945]: Failed password for invalid user plex from 195.54.160.180 port 55638 ssh2 2020-10-01T16:55:56.457526correo.[domain] sshd[36947]: Invalid user qwe123 from 195.54.160.180 port 2725 ...
2020-10-02 07:00:16
178.128.61.101 attackspam
Invalid user alice from 178.128.61.101 port 43474
2020-10-02 06:53:40
139.199.123.152 attackbotsspam
Invalid user system from 139.199.123.152 port 48914
2020-10-02 06:47:50
180.250.108.130 attackbots
Invalid user tester from 180.250.108.130 port 59045
2020-10-02 07:19:53
167.99.78.164 attack
167.99.78.164 - - [02/Oct/2020:00:28:07 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.78.164 - - [02/Oct/2020:00:28:13 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.78.164 - - [02/Oct/2020:00:28:14 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-02 06:49:51
40.113.124.250 attack
40.113.124.250 - - [01/Oct/2020:23:57:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
40.113.124.250 - - [01/Oct/2020:23:57:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2234 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
40.113.124.250 - - [01/Oct/2020:23:57:21 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-02 07:14:53
51.178.53.233 attackbotsspam
$f2bV_matches
2020-10-02 07:14:21
92.62.131.106 attack
Oct  2 00:35:09 xeon sshd[37553]: Failed password for invalid user julia from 92.62.131.106 port 40951 ssh2
2020-10-02 07:13:28
64.202.187.246 attackbots
Oct  1 22:41:50 staging sshd[171387]: Invalid user finance from 64.202.187.246 port 39356
Oct  1 22:41:50 staging sshd[171387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.246 
Oct  1 22:41:50 staging sshd[171387]: Invalid user finance from 64.202.187.246 port 39356
Oct  1 22:41:52 staging sshd[171387]: Failed password for invalid user finance from 64.202.187.246 port 39356 ssh2
...
2020-10-02 06:51:42

Recently Reported IPs

88.101.166.185 125.78.75.248 35.209.185.59 162.216.150.206
191.79.218.214 2606:4700:10::ac43:1445 2606:4700:10::6816:4031 2606:4700:10::ac43:1249
2606:4700:10::6814:5276 2606:4700:10::ac43:856 2606:4700:10::6814:8088 164.155.74.84
139.177.194.152 108.157.0.0 34.78.67.0 103.153.183.126
94.231.206.105 100.115.230.38 213.222.235.132 2606:4700:10::ac43:2340