Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       108.165.0.0 - 108.165.255.255
CIDR:           108.165.0.0/16
NetName:        ACE-NETWORK-7
NetHandle:      NET-108-165-0-0-1
Parent:         NET108 (NET-108-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Ace Data Centers, Inc. (ADC-96)
RegDate:        2011-11-14
Updated:        2024-04-22
Comment:        https://www.acedatacenter.com/
Comment:        Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/108.165.0.0


OrgName:        Ace Data Centers, Inc.
OrgId:          ADC-96
Address:        727 North 1550 East
Address:        Ste 400
City:           Orem
StateProv:      UT
PostalCode:     84097
Country:        US
RegDate:        2010-11-02
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/entity/ADC-96


OrgTechHandle: ACEAD-ARIN
OrgTechName:   ACE ADMIN
OrgTechPhone:  +1-801-900-5673 
OrgTechEmail:  admin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ACEAD-ARIN

OrgTechHandle: LOWRY55-ARIN
OrgTechName:   Lowry, Justin 
OrgTechPhone:  +1-801-735-5256 
OrgTechEmail:  justin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWRY55-ARIN

OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-801-851-5540 
OrgAbuseEmail:  ipabuse@acedatacenter.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

# end


# start

NetRange:       108.165.147.0 - 108.165.147.255
CIDR:           108.165.147.0/24
NetName:        EVOXT
NetHandle:      NET-108-165-147-0-1
Parent:         ACE-NETWORK-7 (NET-108-165-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Evoxt (HK) (ESB-42)
RegDate:        2025-08-05
Updated:        2025-08-05
Comment:        Geofeed :https://raw.githubusercontent.com/evoxt/geofeed/main/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/108.165.147.0


OrgName:        Evoxt (HK)
OrgId:          ESB-42
Address:        17/F Kerry Warehouse, 3 Shing Yiu St
City:           Kwai Chung
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2023-08-05
Updated:        2023-08-15
Ref:            https://rdap.arin.net/registry/entity/ESB-42


OrgTechHandle: ACHE-ARIN
OrgTechName:   Abuse Contact HK Evoxt
OrgTechPhone:  +601158988860 
OrgTechEmail:  abuse@evoxt.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ACHE-ARIN

OrgAbuseHandle: ACHE-ARIN
OrgAbuseName:   Abuse Contact HK Evoxt
OrgAbusePhone:  +601158988860 
OrgAbuseEmail:  abuse@evoxt.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ACHE-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.165.147.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.165.147.240.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 23:15:02 CST 2026
;; MSG SIZE  rcvd: 108
Host info
240.147.165.108.in-addr.arpa domain name pointer 108-165-147-240.ips.acedatacenter.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
240.147.165.108.in-addr.arpa	name = 108-165-147-240.ips.acedatacenter.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
189.214.24.108 attackbotsspam
Automatic report - Port Scan Attack
2020-03-31 00:52:02
223.240.84.130 attack
Brute force SMTP login attempted.
...
2020-03-31 01:04:50
80.210.19.156 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-31 00:45:43
223.4.70.106 attackspam
Brute force SMTP login attempted.
...
2020-03-31 00:28:40
3.92.224.101 attackspambots
port
2020-03-31 00:21:03
223.66.215.80 attackbots
Brute force SMTP login attempted.
...
2020-03-31 00:25:13
46.243.221.28 attackspam
(From noreply@arteseo.co) 
hi there
Here is your quotation regarding the Articles web2 posting project.

https://www.arteseo.co/quotation/
2020-03-31 01:04:17
192.241.166.199 attackbots
Mar 30 15:55:54 debian-2gb-nbg1-2 kernel: \[7835611.709828\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.241.166.199 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=TCP SPT=22 DPT=7932 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 00:36:20
223.255.127.90 attackspambots
Brute force SMTP login attempted.
...
2020-03-31 00:37:04
223.247.223.39 attack
Brute force SMTP login attempted.
...
2020-03-31 00:46:14
180.76.171.53 attackspambots
SSH brute force attempt
2020-03-31 00:50:15
116.106.145.56 attackbotsspam
Honeypot attack, port: 81, PTR: dynamic-ip-adsl.viettel.vn.
2020-03-31 00:21:54
159.65.111.89 attack
2020-03-30T13:32:18.776815  sshd[18764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89  user=root
2020-03-30T13:32:20.349465  sshd[18764]: Failed password for root from 159.65.111.89 port 40536 ssh2
2020-03-30T13:44:09.490291  sshd[18916]: Invalid user oe from 159.65.111.89 port 38390
2020-03-30T13:44:09.502919  sshd[18916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.111.89
2020-03-30T13:44:09.490291  sshd[18916]: Invalid user oe from 159.65.111.89 port 38390
2020-03-30T13:44:11.351496  sshd[18916]: Failed password for invalid user oe from 159.65.111.89 port 38390 ssh2
...
2020-03-31 00:36:43
196.43.231.123 attackbots
fail2ban
2020-03-31 01:05:29
223.223.200.14 attack
Brute force SMTP login attempted.
...
2020-03-31 01:13:10

Recently Reported IPs

175.119.202.28 167.172.184.251 159.223.45.109 207.154.236.153
164.92.175.202 104.248.23.98 64.225.100.217 121.40.172.117
100.22.3.244 10.3.215.29 10.61.133.228 10.121.70.194
10.250.11.197 104.224.15.112 2606:4700:10::6816:3237 2606:4700:10::6816:121
2606:4700:10::6814:5770 2606:4700:10::6816:582 2606:4700:10::6814:8018 2606:4700:10::6814:7483