Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.152.113.0 - 103.152.113.255'

% Abuse contact for '103.152.113.0 - 103.152.113.255' is 'abuse@apernet.io'

inetnum:        103.152.113.0 - 103.152.113.255
netname:        NATO-US-2
descr:          Black Mesa Corporation
country:        US
admin-c:        AA1721-AP
tech-c:         AA1721-AP
abuse-c:        AA1721-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-APERNET
mnt-irt:        IRT-APERNET
last-modified:  2021-09-27T18:56:44Z
source:         APNIC

irt:            IRT-APERNET
address:        Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
e-mail:         abuse@apernet.io
abuse-mailbox:  abuse@apernet.io
admin-c:        AA1721-AP
tech-c:         AA1721-AP
auth:           # Filtered
remarks:        abuse@apernet.io was validated on 2026-02-14
mnt-by:         MAINT-APERNET
last-modified:  2026-02-14T08:41:45Z
source:         APNIC

role:           AperNet Administrators
address:        Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
country:        HK
phone:          +852-5803-3891
phone:          +1 (315) 744-5708
e-mail:         noc@apernet.io
admin-c:        AA1721-AP
tech-c:         AA1721-AP
nic-hdl:        AA1721-AP
mnt-by:         MAINT-APERTURE-HK
last-modified:  2020-07-02T04:56:31Z
source:         APNIC

% Information related to '103.152.113.0/24AS46997'

route:          103.152.113.0/24
descr:          Nato Research Ltd.
country:        US
origin:         AS46997
mnt-by:         MAINT-CSRHF-CN
last-modified:  2021-01-25T17:49:37Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.152.113.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.152.113.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 06:46:22 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 33.113.152.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.152.113.33.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.173.235.34 attackbotsspam
Unauthorized connection attempt detected from IP address 222.173.235.34 to port 445 [T]
2020-01-09 05:17:16
189.224.160.107 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-09 05:09:23
222.186.31.144 attackspambots
Jan  8 22:09:09 vps691689 sshd[21250]: Failed password for root from 222.186.31.144 port 43938 ssh2
Jan  8 22:15:07 vps691689 sshd[21298]: Failed password for root from 222.186.31.144 port 17114 ssh2
...
2020-01-09 05:15:43
121.201.33.222 attack
Unauthorized connection attempt detected from IP address 121.201.33.222 to port 445 [T]
2020-01-09 05:24:38
80.82.78.100 attack
80.82.78.100 was recorded 12 times by 6 hosts attempting to connect to the following ports: 1045,1034,1051. Incident counter (4h, 24h, all-time): 12, 62, 15071
2020-01-09 05:36:50
219.80.0.35 attack
Unauthorized connection attempt detected from IP address 219.80.0.35 to port 445 [T]
2020-01-09 05:17:53
218.92.0.201 attackspambots
Unauthorized connection attempt detected from IP address 218.92.0.201 to port 22 [T]
2020-01-09 05:18:12
123.162.181.55 attack
Unauthorized connection attempt detected from IP address 123.162.181.55 to port 445 [T]
2020-01-09 05:24:00
51.15.6.36 attackspambots
Automatic report - SSH Brute-Force Attack
2020-01-09 05:37:17
200.105.169.77 attackspam
Unauthorized connection attempt from IP address 200.105.169.77 on Port 445(SMB)
2020-01-09 05:07:59
186.112.214.158 attack
ssh bruteforce or scan
...
2020-01-09 05:13:02
66.248.204.14 attackspam
Unauthorized connection attempt detected from IP address 66.248.204.14 to port 9046 [T]
2020-01-09 05:29:30
113.105.184.247 attackspambots
Unauthorized connection attempt detected from IP address 113.105.184.247 to port 1433 [T]
2020-01-09 05:26:59
210.252.174.126 attackbotsspam
20/1/8@08:03:16: FAIL: Alarm-Network address from=210.252.174.126
20/1/8@08:03:16: FAIL: Alarm-Network address from=210.252.174.126
...
2020-01-09 05:06:35
183.166.59.149 attackspam
Unauthorized connection attempt detected from IP address 183.166.59.149 to port 1433 [T]
2020-01-09 05:19:32

Recently Reported IPs

150.109.79.164 47.95.208.211 98.94.39.8 3.83.106.176
2606:4700:10::6814:6392 252.120.242.173 2606:4700:10::6814:5271 188.168.20.224
172.86.117.157 93.152.208.42 156.235.89.236 2606:4700:10::6814:6303
172.86.114.117 43.156.55.246 2606:4700:10::ac43:1805 2606:4700:10::6814:4396
2606:4700:10::ac43:1634 218.151.38.93 198.100.58.65 172.236.15.113