Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.181.164.0 - 103.181.165.255'

% Abuse contact for '103.181.164.0 - 103.181.165.255' is 'abouse@syhots.com'

inetnum:        103.181.164.0 - 103.181.165.255
netname:        SLNTCL-CN
descr:          Shenzhen lesuyun Network Technology Co., Ltd
country:        CN
org:            ORG-AA198-AP
admin-c:        SL3902-AP
tech-c:         SL3902-AP
abuse-c:        AS3297-AP
status:         ASSIGNED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-SLNTCL-CN
mnt-irt:        IRT-SLNTCL-CN
last-modified:  2024-01-10T22:16:24Z
geoloc:         22.362146 114.134409
language:       en
geofeed:        https://iplocal.s3.us-west-1.amazonaws.com/geofeeds.csv
source:         APNIC

irt:            IRT-SLNTCL-CN
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
e-mail:         abouse@syhots.com
abuse-mailbox:  abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
auth:           # Filtered
remarks:        abouse@syhots.com was validated on 2026-03-10
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2026-03-10T08:27:53Z
source:         APNIC

organisation:   ORG-AA198-AP
org-name:       Shenzhen lesuyun Network Technology Co., Ltd
org-type:       LIR
country:        CN
address:        Flat B, 2/F, Cheung Wing Industrial Building 109-115 Wo Yi H
phone:          +85264829930
e-mail:         wwl@syhots.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:46Z
source:         APNIC

role:           ABUSE SLNTCLCN
country:        ZZ
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
phone:          +000000000
e-mail:         abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
nic-hdl:        AS3297-AP
remarks:        Generated from irt object IRT-SLNTCL-CN
remarks:        abouse@syhots.com was validated on 2026-03-10
abuse-mailbox:  abouse@syhots.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-10T08:28:36Z
source:         APNIC

role:           SPEEDCLOUD LIMITED
address:        Cheung Wing Industrial Building 109-115 Wo Yi Hop Road Kwai Chung, New Territories Hong Kong
country:        HK
phone:          +13365607539
e-mail:         abouse@syhots.com
admin-c:        SL3902-AP
tech-c:         SL3902-AP
nic-hdl:        SL3902-AP
notify:         abouse@syhots.com
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2023-08-11T19:44:35Z
source:         APNIC

% Information related to '103.181.164.0/24AS149513'

route:          103.181.164.0/24
country:        HK
origin:         AS149513
descr:          Shenzhen lesuyun Network Technology Co., Ltd
                Flat B, 2/F, Cheung Wing Industrial Building 109-115 Wo Yi H
mnt-by:         MAINT-SLNTCL-CN
last-modified:  2024-04-25T19:32:10Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.181.164.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.181.164.237.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 21:31:33 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 237.164.181.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 237.164.181.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.209.0.101 attack
Jul 25 17:16:32 vps8769 sshd[13720]: Failed password for root from 85.209.0.101 port 28888 ssh2
...
2020-07-25 23:18:14
222.169.251.245 attackbots
Jul 25 17:16:25 debian-2gb-nbg1-2 kernel: \[17948699.738423\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.169.251.245 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=49 ID=64426 PROTO=TCP SPT=43880 DPT=23 WINDOW=21167 RES=0x00 SYN URGP=0
2020-07-25 23:29:21
43.252.72.202 attack
Unauthorized connection attempt detected from IP address 43.252.72.202 to port 8080
2020-07-25 23:07:35
14.178.124.253 attackbotsspam
Unauthorized connection attempt detected from IP address 14.178.124.253 to port 23
2020-07-25 23:08:27
45.83.67.73 attackspambots
 TCP (SYN) 45.83.67.73:9376 -> port 110, len 44
2020-07-25 23:06:59
106.13.103.1 attackspam
Jul 25 20:44:08 dhoomketu sshd[1868820]: Failed password for invalid user postgres from 106.13.103.1 port 47876 ssh2
Jul 25 20:46:30 dhoomketu sshd[1868894]: Invalid user xp from 106.13.103.1 port 44876
Jul 25 20:46:30 dhoomketu sshd[1868894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.1 
Jul 25 20:46:30 dhoomketu sshd[1868894]: Invalid user xp from 106.13.103.1 port 44876
Jul 25 20:46:32 dhoomketu sshd[1868894]: Failed password for invalid user xp from 106.13.103.1 port 44876 ssh2
...
2020-07-25 23:17:12
73.46.112.45 attackbots
Unauthorized connection attempt detected from IP address 73.46.112.45 to port 23
2020-07-25 23:03:12
210.187.188.30 attack
Unauthorized connection attempt detected from IP address 210.187.188.30 to port 88
2020-07-25 23:14:44
49.234.39.212 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-07-25 23:06:09
189.152.165.105 attack
" "
2020-07-25 23:38:49
188.128.83.202 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-25 23:27:10
142.44.242.38 attackspam
Exploited Host.
2020-07-25 23:24:20
142.93.109.76 attackspam
Exploited Host.
2020-07-25 23:20:11
180.242.87.153 attack
Unauthorized connection attempt from IP address 180.242.87.153 on Port 445(SMB)
2020-07-25 23:19:46
58.219.136.64 attackspambots
Unauthorized connection attempt detected from IP address 58.219.136.64 to port 22
2020-07-25 23:05:47

Recently Reported IPs

125.42.96.246 40.5.110.209 80.94.92.10 39.100.80.150
216.154.72.216 101.133.131.45 43.165.3.25 114.66.54.183
36.113.115.150 20.46.225.117 1.234.96.192 69.92.141.241
54.146.119.88 85.217.149.56 162.243.71.18 228.180.101.202
74.222.3.251 172.234.217.129 63.140.1.176 63.146.1.176