Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.151.172.0 - 103.151.173.255'

% Abuse contact for '103.151.172.0 - 103.151.173.255' is 'allrun7788@protonmail.com'

inetnum:        103.151.172.0 - 103.151.173.255
netname:        KIDC2-HK
descr:          KIDC LIMITED
country:        HK
org:            ORG-KL20-AP
admin-c:        KLA10-AP
tech-c:         KLA10-AP
abuse-c:        AK1099-AP
status:         ASSIGNED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-KIDC2-HK
mnt-irt:        IRT-KIDC2-HK
last-modified:  2023-12-20T16:22:19Z
mnt-lower:      MAINT-KIDC2-HK
source:         APNIC

irt:            IRT-KIDC2-HK
address:        Fa Yuen Street, MongKok, Hong Kong Hong Kong
e-mail:         allrun7788@protonmail.com
abuse-mailbox:  allrun7788@protonmail.com
admin-c:        KLA10-AP
tech-c:         KLA10-AP
auth:           # Filtered
remarks:        allrun7788@protonmail.com was validated on 2025-12-04
mnt-by:         MAINT-KIDC2-HK
last-modified:  2025-12-04T23:31:32Z
source:         APNIC

organisation:   ORG-KL20-AP
org-name:       KIDC LIMITED
org-type:       LIR
country:        HK
address:        Fa Yuen Street, MongKok
phone:          +852-30696943
e-mail:         adm@allcloud.cc
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-05-07T01:39:04Z
source:         APNIC

role:           ABUSE KIDC2HK
country:        ZZ
address:        Fa Yuen Street, MongKok, Hong Kong Hong Kong
phone:          +000000000
e-mail:         allrun7788@protonmail.com
admin-c:        KLA10-AP
tech-c:         KLA10-AP
nic-hdl:        AK1099-AP
remarks:        Generated from irt object IRT-KIDC2-HK
remarks:        allrun7788@protonmail.com was validated on 2025-12-04
abuse-mailbox:  allrun7788@protonmail.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-04T23:32:10Z
source:         APNIC

role:           KIDC LIMITED administrator
address:        Fa Yuen Street, MongKok, Hong Kong Hong Kong
country:        HK
phone:          +852-30696943
e-mail:         adm@allcloud.cc
admin-c:        KLA10-AP
tech-c:         KLA10-AP
nic-hdl:        KLA10-AP
mnt-by:         MAINT-KIDC2-HK
last-modified:  2022-06-24T05:32:23Z
source:         APNIC

% Information related to '103.151.172.0/24AS134972'

route:          103.151.172.0/24
descr:          IP Transit
origin:         AS134972
mnt-by:         MAINT-KIDC2-HK
last-modified:  2026-01-06T08:58:36Z
source:         APNIC

% Information related to '103.151.172.0/24AS136038'

route:          103.151.172.0/24
origin:         AS136038
descr:          IP Transit
mnt-by:         MAINT-KIDC2-HK
last-modified:  2023-09-21T05:52:53Z
source:         APNIC

% Information related to '103.151.172.0/24AS136526'

route:          103.151.172.0/24
descr:          IP Transit
origin:         AS136526
mnt-by:         MAINT-KIDC2-HK
last-modified:  2025-12-05T00:10:38Z
source:         APNIC

% Information related to '103.151.172.0/24AS137427'

route:          103.151.172.0/24
descr:          IP Transit
origin:         AS137427
mnt-by:         MAINT-KIDC2-HK
last-modified:  2025-12-05T00:10:54Z
source:         APNIC

% Information related to '103.151.172.0/24AS205960'

route:          103.151.172.0/24
descr:          IP Transit
origin:         AS205960
mnt-by:         MAINT-KIDC2-HK
last-modified:  2025-12-05T00:10:42Z
source:         APNIC

% Information related to '103.151.172.0/24AS212921'

route:          103.151.172.0/24
descr:          IP Transit
origin:         AS212921
mnt-by:         MAINT-KIDC2-HK
last-modified:  2023-09-21T05:52:54Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.151.172.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.151.172.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050201 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 11:19:07 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 25.172.151.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 103.151.172.25.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
81.214.130.65 attack
9000/tcp 8000/tcp 8000/tcp
[2019-10-05/11-19]3pkt
2019-11-20 08:14:44
103.103.161.159 attack
firewall-block, port(s): 23/tcp
2019-11-20 08:43:00
194.152.206.93 attack
Nov 20 01:18:56 vpn01 sshd[6060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
Nov 20 01:18:58 vpn01 sshd[6060]: Failed password for invalid user wonhong from 194.152.206.93 port 43236 ssh2
...
2019-11-20 08:20:57
159.224.199.93 attackspambots
Nov 18 15:27:32 server2 sshd[28786]: reveeclipse mapping checking getaddrinfo for 93.199.224.159.triolan.net [159.224.199.93] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 18 15:27:32 server2 sshd[28786]: Invalid user server from 159.224.199.93
Nov 18 15:27:32 server2 sshd[28786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.199.93 
Nov 18 15:27:34 server2 sshd[28786]: Failed password for invalid user server from 159.224.199.93 port 35684 ssh2
Nov 18 15:27:34 server2 sshd[28786]: Received disconnect from 159.224.199.93: 11: Bye Bye [preauth]
Nov 18 15:44:13 server2 sshd[29993]: reveeclipse mapping checking getaddrinfo for 93.199.224.159.triolan.net [159.224.199.93] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 18 15:44:13 server2 sshd[29993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.199.93  user=r.r
Nov 18 15:44:15 server2 sshd[29993]: Failed password for r.r from 159.224.199.9........
-------------------------------
2019-11-20 08:32:15
89.122.138.47 attackbotsspam
Automatic report - Port Scan Attack
2019-11-20 08:39:45
200.98.143.163 attackbotsspam
1433/tcp 445/tcp...
[2019-09-19/11-19]8pkt,2pt.(tcp)
2019-11-20 08:23:24
200.2.190.129 attack
23/tcp 34567/tcp...
[2019-09-27/11-19]5pkt,2pt.(tcp)
2019-11-20 08:08:22
87.67.99.37 attack
Nov 19 22:10:26 ns381471 sshd[25466]: Failed password for backup from 87.67.99.37 port 49272 ssh2
2019-11-20 08:38:00
178.18.34.36 attackbotsspam
445/tcp 1433/tcp...
[2019-10-08/11-19]7pkt,2pt.(tcp)
2019-11-20 08:11:16
58.222.107.253 attack
2019-11-19T22:51:16.737960abusebot-6.cloudsearch.cf sshd\[24724\]: Invalid user dg554830 from 58.222.107.253 port 15502
2019-11-20 08:20:09
107.170.199.180 attackbots
Nov 20 00:10:33 legacy sshd[2326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.199.180
Nov 20 00:10:34 legacy sshd[2326]: Failed password for invalid user axel69 from 107.170.199.180 port 35066 ssh2
Nov 20 00:14:24 legacy sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.199.180
...
2019-11-20 08:15:58
47.52.63.66 attackspambots
Unauthorized admin access - /admin//admin/
2019-11-20 08:15:44
202.120.40.69 attackspambots
SSH-BruteForce
2019-11-20 08:26:51
138.68.242.220 attackbots
Nov 20 05:41:51 areeb-Workstation sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220
Nov 20 05:41:53 areeb-Workstation sshd[31448]: Failed password for invalid user kahlia from 138.68.242.220 port 39848 ssh2
...
2019-11-20 08:34:17
113.133.226.181 attackspam
firewall-block, port(s): 2323/tcp
2019-11-20 08:40:32

Recently Reported IPs

2606:4700:10::6816:425d 2606:4700:10::6816:3779 2606:4700:10::ac43:98e 34.62.34.142
190.194.63.43 110.78.154.189 2606:4700:10::6816:60 2606:4700:10::6814:6828
2606:4700:10::6816:693 124.115.116.158 185.248.184.164 185.248.184.161
47.250.37.210 121.230.89.151 194.190.90.87 65.2.40.168
29.168.185.111 182.172.236.101 121.41.167.221 2606:4700:10::6816:1279