City: San Jose
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.152.113.0 - 103.152.113.255'
% Abuse contact for '103.152.113.0 - 103.152.113.255' is 'abuse@apernet.io'
inetnum: 103.152.113.0 - 103.152.113.255
netname: NATO-US-2
descr: Black Mesa Corporation
country: US
admin-c: AA1721-AP
tech-c: AA1721-AP
abuse-c: AA1721-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-APERNET
mnt-irt: IRT-APERNET
last-modified: 2021-09-27T18:56:44Z
source: APNIC
irt: IRT-APERNET
address: Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
e-mail: abuse@apernet.io
abuse-mailbox: abuse@apernet.io
admin-c: AA1721-AP
tech-c: AA1721-AP
auth: # Filtered
remarks: abuse@apernet.io was validated on 2026-02-14
mnt-by: MAINT-APERNET
last-modified: 2026-02-14T08:41:45Z
source: APNIC
role: AperNet Administrators
address: Unit 83, 3/F, Yau Lee Center, No. 45 Hoi Yuen Road Kwun Tong, Kowloon
country: HK
phone: +852-5803-3891
phone: +1 (315) 744-5708
e-mail: noc@apernet.io
admin-c: AA1721-AP
tech-c: AA1721-AP
nic-hdl: AA1721-AP
mnt-by: MAINT-APERTURE-HK
last-modified: 2020-07-02T04:56:31Z
source: APNIC
% Information related to '103.152.113.0/24AS46997'
route: 103.152.113.0/24
descr: Nato Research Ltd.
country: US
origin: AS46997
mnt-by: MAINT-CSRHF-CN
last-modified: 2021-01-25T17:49:37Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.152.113.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.152.113.33. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 06:46:22 CST 2026
;; MSG SIZE rcvd: 107
Host 33.113.152.103.in-addr.arpa not found: 2(SERVFAIL)
server can't find 103.152.113.33.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.173.235.34 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.173.235.34 to port 445 [T] |
2020-01-09 05:17:16 |
| 189.224.160.107 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2020-01-09 05:09:23 |
| 222.186.31.144 | attackspambots | Jan 8 22:09:09 vps691689 sshd[21250]: Failed password for root from 222.186.31.144 port 43938 ssh2 Jan 8 22:15:07 vps691689 sshd[21298]: Failed password for root from 222.186.31.144 port 17114 ssh2 ... |
2020-01-09 05:15:43 |
| 121.201.33.222 | attack | Unauthorized connection attempt detected from IP address 121.201.33.222 to port 445 [T] |
2020-01-09 05:24:38 |
| 80.82.78.100 | attack | 80.82.78.100 was recorded 12 times by 6 hosts attempting to connect to the following ports: 1045,1034,1051. Incident counter (4h, 24h, all-time): 12, 62, 15071 |
2020-01-09 05:36:50 |
| 219.80.0.35 | attack | Unauthorized connection attempt detected from IP address 219.80.0.35 to port 445 [T] |
2020-01-09 05:17:53 |
| 218.92.0.201 | attackspambots | Unauthorized connection attempt detected from IP address 218.92.0.201 to port 22 [T] |
2020-01-09 05:18:12 |
| 123.162.181.55 | attack | Unauthorized connection attempt detected from IP address 123.162.181.55 to port 445 [T] |
2020-01-09 05:24:00 |
| 51.15.6.36 | attackspambots | Automatic report - SSH Brute-Force Attack |
2020-01-09 05:37:17 |
| 200.105.169.77 | attackspam | Unauthorized connection attempt from IP address 200.105.169.77 on Port 445(SMB) |
2020-01-09 05:07:59 |
| 186.112.214.158 | attack | ssh bruteforce or scan ... |
2020-01-09 05:13:02 |
| 66.248.204.14 | attackspam | Unauthorized connection attempt detected from IP address 66.248.204.14 to port 9046 [T] |
2020-01-09 05:29:30 |
| 113.105.184.247 | attackspambots | Unauthorized connection attempt detected from IP address 113.105.184.247 to port 1433 [T] |
2020-01-09 05:26:59 |
| 210.252.174.126 | attackbotsspam | 20/1/8@08:03:16: FAIL: Alarm-Network address from=210.252.174.126 20/1/8@08:03:16: FAIL: Alarm-Network address from=210.252.174.126 ... |
2020-01-09 05:06:35 |
| 183.166.59.149 | attackspam | Unauthorized connection attempt detected from IP address 183.166.59.149 to port 1433 [T] |
2020-01-09 05:19:32 |