Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.143.11.0 - 103.143.11.255'

% Abuse contact for '103.143.11.0 - 103.143.11.255' is 'idc@yisu.com'

inetnum:        103.143.11.0 - 103.143.11.255
netname:        ACEMOB-HK
descr:          HONG KONG ACEMOB TECHNOLOGY CO., LIMITED
country:        US
admin-c:        HKAT1-AP
tech-c:         HKAT1-AP
abuse-c:        AA2304-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-ACEMOB-HK
mnt-irt:        IRT-ACEMOB-HK
last-modified:  2021-01-20T22:18:47Z
source:         APNIC

irt:            IRT-ACEMOB-HK
address:        Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
e-mail:         idc@yisu.com
abuse-mailbox:  idc@yisu.com
admin-c:        HKAT1-AP
tech-c:         HKAT1-AP
auth:           # Filtered
remarks:        idc@yisu.com is invalid
mnt-by:         MAINT-ACEMOB-HK
last-modified:  2025-11-18T00:33:16Z
source:         APNIC

role:           ABUSE ACEMOBHK
country:        ZZ
address:        Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
phone:          +000000000
e-mail:         idc@yisu.com
admin-c:        HKAT1-AP
tech-c:         HKAT1-AP
nic-hdl:        AA2304-AP
remarks:        Generated from irt object IRT-ACEMOB-HK
remarks:        idc@yisu.com is invalid
abuse-mailbox:  idc@yisu.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T21:29:05Z
source:         APNIC

role:           HONG KONG ACEMOB TECHNOLOGY COLIMITED administra
address:        Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
country:        HK
phone:          +852-5371-8051
e-mail:         info@keidim.net
admin-c:        HKAT1-AP
tech-c:         HKAT1-AP
nic-hdl:        HKAT1-AP
mnt-by:         MAINT-ACEMOB-HK
last-modified:  2019-09-10T11:50:35Z
source:         APNIC

% Information related to '103.143.11.0/24AS136933'

route:          103.143.11.0/24
origin:         AS136933
descr:          HONG KONG ACEMOB TECHNOLOGY CO., LIMITED
                Wah Fung Industrial Centre, 33 Kwai Fung Street
mnt-by:         MAINT-ACEMOB-HK
last-modified:  2019-10-30T03:12:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.143.11.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.143.11.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 08:30:48 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 229.11.143.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.11.143.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.95.28 attack
SSH brute-force: detected 15 distinct usernames within a 24-hour window.
2020-03-30 01:29:12
51.91.122.140 attackbotsspam
(sshd) Failed SSH login from 51.91.122.140 (FR/France/-/-/140.ip-51-91-122.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs
2020-03-30 01:04:07
132.232.1.155 attackspambots
5x Failed Password
2020-03-30 01:00:38
125.227.130.126 attackbots
Unauthorized connection attempt from IP address 125.227.130.126 on Port 3389(RDP)
2020-03-30 01:01:52
183.81.52.191 attack
Unauthorized connection attempt detected from IP address 183.81.52.191 to port 23 [T]
2020-03-30 01:25:38
111.67.193.92 attackspambots
SSH invalid-user multiple login attempts
2020-03-30 01:11:07
41.220.193.1 attackspam
Unauthorized connection attempt from IP address 41.220.193.1 on Port 445(SMB)
2020-03-30 00:45:04
186.4.242.37 attackspambots
SSH brute force attempt
2020-03-30 01:31:05
41.239.84.78 attackspambots
Attempted connection to port 23.
2020-03-30 01:23:22
187.8.123.158 attackbotsspam
Attempted connection to port 5555.
2020-03-30 00:59:50
2a00:1098:84::4 attackspam
Mar 29 18:08:46 l03 sshd[15364]: Invalid user znp from 2a00:1098:84::4 port 43582
...
2020-03-30 01:20:28
45.117.166.169 attackspambots
Unauthorized connection attempt from IP address 45.117.166.169 on Port 3389(RDP)
2020-03-30 01:27:04
86.88.104.115 attackspam
Unauthorized connection attempt from IP address 86.88.104.115 on Port 445(SMB)
2020-03-30 01:10:09
218.246.34.214 attackbots
SSH bruteforce (Triggered fail2ban)
2020-03-30 00:45:36
122.51.109.222 attack
5x Failed Password
2020-03-30 01:08:49

Recently Reported IPs

185.12.248.5 66.132.172.134 194.88.98.88 110.78.153.79
2606:4700:10::6814:4785 2606:4700:10::6816:3834 209.141.57.166 66.132.195.113
109.162.246.85 2606:4700:10::6814:7441 2606:4700:10::6816:89 110.77.226.185
2606:4700:10::ac43:1880 2606:4700:10::6814:6413 2606:4700:10::6816:4446 2606:4700:10::6814:9010
43.153.71.227 150.129.80.177 32.240.74.67 216.254.140.132