City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.203.48.0 - 103.203.48.255'
% Abuse contact for '103.203.48.0 - 103.203.48.255' is 'support@cyberwill.com.hk'
inetnum: 103.203.48.0 - 103.203.48.255
netname: Netsec
descr: Netsec
country: HK
admin-c: NN541-AP
tech-c: NN541-AP
abuse-c: NN541-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-CYBERWILLLIMITED-HK
mnt-irt: IRT-CYBERWILLLIMITED-HK
last-modified: 2025-05-17T09:43:07Z
source: APNIC
irt: IRT-CYBERWILLLIMITED-HK
address: Flat 2016, 20/F, New Tech Plaza,, 34 Tai Yau Street,, San Po Kong, Kowloon,, Hong Kong., Hong Kong K
e-mail: support@cyberwill.com.hk
abuse-mailbox: support@cyberwill.com.hk
admin-c: CWLA1-AP
tech-c: CWLA1-AP
auth: # Filtered
remarks: support@cyberwill.com.hk was validated on 2025-09-17
mnt-by: MAINT-CYBERWILLLIMITED-HK
last-modified: 2025-09-17T07:36:06Z
source: APNIC
role: NETSEC NOC
address: Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country: HK
phone: +85227511100
e-mail: noc@netsec.com
admin-c: NN541-AP
tech-c: NN541-AP
nic-hdl: NN541-AP
mnt-by: MAINT-NETSEC-HK
last-modified: 2025-03-14T05:55:40Z
source: APNIC
% Information related to '103.203.48.0/24AS45753'
route: 103.203.48.0/24
origin: AS45753
descr: Cyber Will Limited
Unit2607, Billion Plaza,
8 Cheung Yue Street,
Cheung Sha Wan, Kowloon,, Hong Kong.
mnt-by: MAINT-CYBERWILLLIMITED-HK
last-modified: 2021-10-19T09:47:26Z
source: APNIC
% Information related to '103.203.48.0/24AS963'
route: 103.203.48.0/24
origin: AS963
descr: Cyber Will Limited
Unit2607, Billion Plaza,
8 Cheung Yue Street,
Cheung Sha Wan, Kowloon,, Hong Kong.
mnt-by: MAINT-CYBERWILLLIMITED-HK
last-modified: 2025-03-13T06:46:04Z
source: APNIC
% Information related to '103.203.48.0/24AS9744'
route: 103.203.48.0/24
origin: AS9744
descr: Cyber Will Limited
Unit2607, Billion Plaza,
8 Cheung Yue Street,
Cheung Sha Wan, Kowloon,, Hong Kong.
mnt-by: MAINT-CYBERWILLLIMITED-HK
last-modified: 2021-11-16T08:43:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.203.48.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.203.48.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 07 18:01:49 CST 2025
;; MSG SIZE rcvd: 107
Host 146.48.203.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 146.48.203.103.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
178.46.208.97 | attack | 23/tcp 23/tcp 23/tcp... [2020-01-24]10pkt,1pt.(tcp) |
2020-01-24 23:25:16 |
185.176.27.54 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 49339 proto: TCP cat: Misc Attack |
2020-01-24 23:18:51 |
158.140.174.157 | attackspambots | 37215/tcp [2020-01-24]1pkt |
2020-01-24 23:14:24 |
89.248.168.51 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-24 23:31:32 |
222.186.173.142 | attackbots | Jan 24 12:26:54 firewall sshd[16333]: Failed password for root from 222.186.173.142 port 22312 ssh2 Jan 24 12:27:07 firewall sshd[16333]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 22312 ssh2 [preauth] Jan 24 12:27:07 firewall sshd[16333]: Disconnecting: Too many authentication failures [preauth] ... |
2020-01-24 23:33:39 |
80.237.111.164 | attack | Unauthorized connection attempt from IP address 80.237.111.164 on Port 445(SMB) |
2020-01-24 23:17:19 |
150.95.217.109 | attackspam | Unauthorized connection attempt detected from IP address 150.95.217.109 to port 2220 [J] |
2020-01-24 23:07:46 |
125.140.152.169 | attack | 23/tcp [2020-01-24]1pkt |
2020-01-24 23:44:16 |
192.3.120.102 | attackspam | firewall-block, port(s): 445/tcp |
2020-01-24 23:02:12 |
203.229.183.227 | attack | Unauthorized connection attempt detected from IP address 203.229.183.227 to port 2220 [J] |
2020-01-24 23:36:35 |
217.182.77.186 | attackbots | 4x Failed Password |
2020-01-24 23:34:24 |
118.98.96.184 | attack | Unauthorized connection attempt detected from IP address 118.98.96.184 to port 2220 [J] |
2020-01-24 23:25:34 |
58.182.169.252 | attackbots | SIP/5060 Probe, BF, Hack - |
2020-01-24 23:12:51 |
58.215.44.25 | attackspam | SIP/5060 Probe, BF, Hack - |
2020-01-24 23:08:13 |
69.229.6.42 | attackspam | Jan 24 15:22:48 OPSO sshd\[15750\]: Invalid user cuc from 69.229.6.42 port 56662 Jan 24 15:22:48 OPSO sshd\[15750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.42 Jan 24 15:22:50 OPSO sshd\[15750\]: Failed password for invalid user cuc from 69.229.6.42 port 56662 ssh2 Jan 24 15:26:32 OPSO sshd\[16634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.42 user=root Jan 24 15:26:35 OPSO sshd\[16634\]: Failed password for root from 69.229.6.42 port 51668 ssh2 |
2020-01-24 23:27:45 |