City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.143.11.0 - 103.143.11.255'
% Abuse contact for '103.143.11.0 - 103.143.11.255' is 'idc@yisu.com'
inetnum: 103.143.11.0 - 103.143.11.255
netname: ACEMOB-HK
descr: HONG KONG ACEMOB TECHNOLOGY CO., LIMITED
country: US
admin-c: HKAT1-AP
tech-c: HKAT1-AP
abuse-c: AA2304-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-ACEMOB-HK
mnt-irt: IRT-ACEMOB-HK
last-modified: 2021-01-20T22:18:47Z
source: APNIC
irt: IRT-ACEMOB-HK
address: Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
e-mail: idc@yisu.com
abuse-mailbox: idc@yisu.com
admin-c: HKAT1-AP
tech-c: HKAT1-AP
auth: # Filtered
remarks: idc@yisu.com is invalid
mnt-by: MAINT-ACEMOB-HK
last-modified: 2025-11-18T00:33:16Z
source: APNIC
role: ABUSE ACEMOBHK
country: ZZ
address: Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
phone: +000000000
e-mail: idc@yisu.com
admin-c: HKAT1-AP
tech-c: HKAT1-AP
nic-hdl: AA2304-AP
remarks: Generated from irt object IRT-ACEMOB-HK
remarks: idc@yisu.com is invalid
abuse-mailbox: idc@yisu.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-04T21:29:05Z
source: APNIC
role: HONG KONG ACEMOB TECHNOLOGY COLIMITED administra
address: Wah Fung Industrial Centre, 33 Kwai Fung Street, HONG KONG HONG KONG 00852
country: HK
phone: +852-5371-8051
e-mail: info@keidim.net
admin-c: HKAT1-AP
tech-c: HKAT1-AP
nic-hdl: HKAT1-AP
mnt-by: MAINT-ACEMOB-HK
last-modified: 2019-09-10T11:50:35Z
source: APNIC
% Information related to '103.143.11.0/24AS136933'
route: 103.143.11.0/24
origin: AS136933
descr: HONG KONG ACEMOB TECHNOLOGY CO., LIMITED
Wah Fung Industrial Centre, 33 Kwai Fung Street
mnt-by: MAINT-ACEMOB-HK
last-modified: 2019-10-30T03:12:27Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.143.11.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.143.11.229. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 08:30:48 CST 2026
;; MSG SIZE rcvd: 107
Host 229.11.143.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 229.11.143.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.54.95.28 | attack | SSH brute-force: detected 15 distinct usernames within a 24-hour window. |
2020-03-30 01:29:12 |
| 51.91.122.140 | attackbotsspam | (sshd) Failed SSH login from 51.91.122.140 (FR/France/-/-/140.ip-51-91-122.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs |
2020-03-30 01:04:07 |
| 132.232.1.155 | attackspambots | 5x Failed Password |
2020-03-30 01:00:38 |
| 125.227.130.126 | attackbots | Unauthorized connection attempt from IP address 125.227.130.126 on Port 3389(RDP) |
2020-03-30 01:01:52 |
| 183.81.52.191 | attack | Unauthorized connection attempt detected from IP address 183.81.52.191 to port 23 [T] |
2020-03-30 01:25:38 |
| 111.67.193.92 | attackspambots | SSH invalid-user multiple login attempts |
2020-03-30 01:11:07 |
| 41.220.193.1 | attackspam | Unauthorized connection attempt from IP address 41.220.193.1 on Port 445(SMB) |
2020-03-30 00:45:04 |
| 186.4.242.37 | attackspambots | SSH brute force attempt |
2020-03-30 01:31:05 |
| 41.239.84.78 | attackspambots | Attempted connection to port 23. |
2020-03-30 01:23:22 |
| 187.8.123.158 | attackbotsspam | Attempted connection to port 5555. |
2020-03-30 00:59:50 |
| 2a00:1098:84::4 | attackspam | Mar 29 18:08:46 l03 sshd[15364]: Invalid user znp from 2a00:1098:84::4 port 43582 ... |
2020-03-30 01:20:28 |
| 45.117.166.169 | attackspambots | Unauthorized connection attempt from IP address 45.117.166.169 on Port 3389(RDP) |
2020-03-30 01:27:04 |
| 86.88.104.115 | attackspam | Unauthorized connection attempt from IP address 86.88.104.115 on Port 445(SMB) |
2020-03-30 01:10:09 |
| 218.246.34.214 | attackbots | SSH bruteforce (Triggered fail2ban) |
2020-03-30 00:45:36 |
| 122.51.109.222 | attack | 5x Failed Password |
2020-03-30 01:08:49 |