City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.167.134.0 - 103.167.135.255'
% Abuse contact for '103.167.134.0 - 103.167.135.255' is 'abuse+apnic@akari.hk'
inetnum: 103.167.134.0 - 103.167.135.255
netname: AGARTHATELEKOMLTD-AP
descr: AGARTHA TELEKOM LTD
country: GB
org: ORG-ATL15-AP
admin-c: ATA12-AP
tech-c: ATT1-AP
abuse-c: AA2405-AP
status: ASSIGNED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-AKARI-HK
mnt-routes: MAINT-AGARTHATELEKOMLTD-AP
mnt-irt: IRT-AKARI-HK
last-modified: 2025-02-21T00:20:09Z
source: APNIC
irt: IRT-AKARI-HK
address: Rm.1801 Easey Comm Bldg, 253-261 Hennessy Road, Wanchai Hong Kong HK
e-mail: noc+apnic@akari.hk
abuse-mailbox: abuse+apnic@akari.hk
admin-c: ANLA9-AP
tech-c: ANLA9-AP
auth: # Filtered
remarks: noc+apnic@akari.hk was validated on 2025-07-10
remarks: abuse+apnic@akari.hk was validated on 2025-07-10
mnt-by: MAINT-AKARI-HK
last-modified: 2025-11-18T00:34:45Z
source: APNIC
organisation: ORG-ATL15-AP
org-name: AGARTHA TELEKOM LTD
org-type: LIR
country: GB
address: 71-75 Shelton Street Covent Garden
phone: +44-7537175964
e-mail: noc@agatel.net
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:18:34Z
source: APNIC
role: ABUSE AKARIHK
country: ZZ
address: Rm.1801 Easey Comm Bldg, 253-261 Hennessy Road, Wanchai Hong Kong HK
phone: +000000000
e-mail: noc+apnic@akari.hk
admin-c: ANLA9-AP
tech-c: ANLA9-AP
nic-hdl: AA2405-AP
remarks: Generated from irt object IRT-AKARI-HK
remarks: noc+apnic@akari.hk was validated on 2025-07-10
remarks: abuse+apnic@akari.hk was validated on 2025-07-10
abuse-mailbox: abuse+apnic@akari.hk
mnt-by: APNIC-ABUSE
last-modified: 2025-07-10T16:09:18Z
source: APNIC
role: Agartha Telekom - Administrator
address: 71-75 Shelton Street, Covent Garden
address: London WC2H 9JQ
country: GB
phone: +44-7537175964
e-mail: noc@agatel.net
admin-c: ATA12-AP
tech-c: ATT1-AP
nic-hdl: ATA12-AP
mnt-by: MAINT-AGARTHATELEKOMLTD-AP
last-modified: 2021-05-26T20:54:28Z
source: APNIC
role: Agartha Telekom - Tech
address: 71-75 Shelton Street, Covent Garden
address: London WC2H 9JQ
country: GB
phone: +44-7537175964
e-mail: noc@agatel.net
admin-c: ATA12-AP
tech-c: ATT1-AP
nic-hdl: ATT1-AP
mnt-by: MAINT-AGARTHATELEKOMLTD-AP
last-modified: 2021-05-26T20:54:06Z
source: APNIC
% Information related to '103.167.135.0/24AS142290'
route: 103.167.135.0/24
origin: AS142290
descr: AGARTHA TELEKOM LTD
71-75 Shelton Street Covent Garden
mnt-by: MAINT-AGARTHATELEKOMLTD-AP
last-modified: 2021-11-05T15:59:15Z
source: APNIC
% Information related to '103.167.135.0/24AS38136'
route: 103.167.135.0/24
origin: AS38136
descr: AGARTHA TELEKOM LTD
71-75 Shelton Street Covent Garden
mnt-by: MAINT-AGARTHATELEKOMLTD-AP
last-modified: 2022-07-05T10:53:06Z
source: APNIC
% Information related to '103.167.135.0/24AS59436'
route: 103.167.135.0/24
origin: AS59436
descr: AGARTHA TELEKOM LTD
71-75 Shelton Street Covent Garden
mnt-by: MAINT-AGARTHATELEKOMLTD-AP
last-modified: 2022-07-15T16:50:15Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.167.135.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.167.135.121. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 23:57:24 CST 2026
;; MSG SIZE rcvd: 108
Host 121.135.167.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 121.135.167.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 78.188.110.144 | attackspam | Honeypot attack, port: 81, PTR: 78.188.110.144.static.ttnet.com.tr. |
2020-02-26 06:51:30 |
| 52.14.158.254 | attackspambots | Name: Larrysip Email: haadirahul8@gmail.com Phone: 89752543845 Street: Garhoud City: Garhoud Zip: 112445 Message: Online sports betting ,Online casino slots news at Jackpot Bet Online. All Word favorite Sportsbook, Racebook, and online Casino slots. Jackpot Bet Online - We have got your casino games, Bonuses, fast payouts, sports betting odds online. NFL Football betting, horse race wagering, online casino slots bets and more. Top uk online casino sites review Bet365 Bingo Gala Bingo Bet365 Casino 888sports Betting |
2020-02-26 06:33:29 |
| 181.123.177.204 | attack | Feb 25 21:19:19 hcbbdb sshd\[5887\]: Invalid user ajay from 181.123.177.204 Feb 25 21:19:19 hcbbdb sshd\[5887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 Feb 25 21:19:21 hcbbdb sshd\[5887\]: Failed password for invalid user ajay from 181.123.177.204 port 42320 ssh2 Feb 25 21:23:03 hcbbdb sshd\[6275\]: Invalid user mikel from 181.123.177.204 Feb 25 21:23:03 hcbbdb sshd\[6275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 |
2020-02-26 06:53:29 |
| 1.169.129.43 | attack | Honeypot attack, port: 445, PTR: 1-169-129-43.dynamic-ip.hinet.net. |
2020-02-26 06:49:49 |
| 192.227.153.234 | attack | [2020-02-25 16:03:28] NOTICE[1148][C-0000bf7a] chan_sip.c: Call from '' (192.227.153.234:53409) to extension '30046812111443' rejected because extension not found in context 'public'. [2020-02-25 16:03:28] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-25T16:03:28.652-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="30046812111443",SessionID="0x7fd82c3c9898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/192.227.153.234/53409",ACLName="no_extension_match" [2020-02-25 16:09:26] NOTICE[1148][C-0000bf81] chan_sip.c: Call from '' (192.227.153.234:56042) to extension '20046812111443' rejected because extension not found in context 'public'. [2020-02-25 16:09:26] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-25T16:09:26.233-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="20046812111443",SessionID="0x7fd82c538db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD ... |
2020-02-26 06:54:55 |
| 109.238.230.42 | attackbots | suspicious action Tue, 25 Feb 2020 13:33:22 -0300 |
2020-02-26 06:53:49 |
| 129.30.41.31 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-26 07:01:13 |
| 222.186.42.75 | attackspambots | $f2bV_matches |
2020-02-26 06:28:52 |
| 178.128.21.38 | attackbots | Feb 25 20:19:46 server sshd\[31266\]: Invalid user test1 from 178.128.21.38 Feb 25 20:19:46 server sshd\[31266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=emr.teravibe.com Feb 25 20:19:49 server sshd\[31266\]: Failed password for invalid user test1 from 178.128.21.38 port 51352 ssh2 Feb 25 20:22:22 server sshd\[31935\]: Invalid user test1 from 178.128.21.38 Feb 25 20:22:22 server sshd\[31935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=emr.teravibe.com ... |
2020-02-26 06:49:15 |
| 71.200.234.56 | attackbots | Honeypot attack, port: 5555, PTR: c-71-200-234-56.hsd1.fl.comcast.net. |
2020-02-26 06:59:06 |
| 185.118.76.134 | attackbots | Port probing on unauthorized port 5555 |
2020-02-26 06:42:19 |
| 143.0.178.142 | attack | 2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= |
2020-02-26 06:57:13 |
| 211.21.48.73 | attackspambots | Honeypot attack, port: 445, PTR: 211-21-48-73.HINET-IP.hinet.net. |
2020-02-26 06:21:30 |
| 222.186.31.83 | attackspambots | Feb 25 23:42:30 dcd-gentoo sshd[18913]: User root from 222.186.31.83 not allowed because none of user's groups are listed in AllowGroups Feb 25 23:42:32 dcd-gentoo sshd[18913]: error: PAM: Authentication failure for illegal user root from 222.186.31.83 Feb 25 23:42:30 dcd-gentoo sshd[18913]: User root from 222.186.31.83 not allowed because none of user's groups are listed in AllowGroups Feb 25 23:42:32 dcd-gentoo sshd[18913]: error: PAM: Authentication failure for illegal user root from 222.186.31.83 Feb 25 23:42:30 dcd-gentoo sshd[18913]: User root from 222.186.31.83 not allowed because none of user's groups are listed in AllowGroups Feb 25 23:42:32 dcd-gentoo sshd[18913]: error: PAM: Authentication failure for illegal user root from 222.186.31.83 Feb 25 23:42:32 dcd-gentoo sshd[18913]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.83 port 19363 ssh2 ... |
2020-02-26 06:56:11 |
| 185.175.93.18 | attack | ET DROP Dshield Block Listed Source group 1 - port: 12755 proto: TCP cat: Misc Attack |
2020-02-26 06:48:47 |