City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.121.160.0 - 112.121.191.255'
% Abuse contact for '112.121.160.0 - 112.121.191.255' is 'abuse@netsec.com'
inetnum: 112.121.160.0 - 112.121.191.255
netname: NETSEC-HK
descr: Netsec Limited
country: HK
org: ORG-NASS1-AP
admin-c: NN541-AP
tech-c: NN541-AP
status: ALLOCATED PORTABLE
abuse-c: AH1002-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-NETSEC-HK
mnt-routes: MAINT-NETSEC-HK
mnt-irt: IRT-HK-NETSEC
last-modified: 2025-03-14T06:45:21Z
source: APNIC
irt: IRT-HK-NETSEC
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
e-mail: noc@netsec.com
abuse-mailbox: abuse@netsec.com
admin-c: NN411-AP
tech-c: NN411-AP
auth: # Filtered
remarks: noc@netsec.com was validated on 2025-11-25
remarks: abuse@netsec.com was validated on 2026-03-25
mnt-by: MAINT-HK-NETSEC
last-modified: 2026-03-25T03:18:33Z
source: APNIC
organisation: ORG-NASS1-AP
org-name: Netsec Limited
org-type: LIR
country: HK
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
phone: +852-27511100
fax-no: +852-27511199
e-mail: noc@netsec.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:31Z
source: APNIC
role: ABUSE HKNETSEC
country: ZZ
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
phone: +000000000
e-mail: noc@netsec.com
admin-c: NN411-AP
tech-c: NN411-AP
nic-hdl: AH1002-AP
remarks: Generated from irt object IRT-HK-NETSEC
remarks: noc@netsec.com was validated on 2025-11-25
remarks: abuse@netsec.com was validated on 2026-03-25
abuse-mailbox: abuse@netsec.com
mnt-by: APNIC-ABUSE
last-modified: 2026-03-25T03:18:46Z
source: APNIC
role: NETSEC NOC
address: Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country: HK
phone: +85227511100
e-mail: noc@netsec.com
admin-c: NN541-AP
tech-c: NN541-AP
nic-hdl: NN541-AP
mnt-by: MAINT-NETSEC-HK
last-modified: 2025-03-14T05:55:40Z
source: APNIC
% Information related to '112.121.183.0/24AS45753'
route: 112.121.183.0/24
origin: AS45753
descr: Netsec Limited
RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by: MAINT-NETSEC-HK
last-modified: 2021-11-29T08:43:25Z
source: APNIC
% Information related to '112.121.183.0/24AS9744'
route: 112.121.183.0/24
origin: AS9744
descr: Netsec Limited
RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by: MAINT-NETSEC-HK
last-modified: 2021-11-29T08:32:24Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.121.183.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.121.183.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040703 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 05:00:09 CST 2026
;; MSG SIZE rcvd: 108
Host 162.183.121.112.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 162.183.121.112.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.142.247 | attack | Sep 11 11:03:31 hcbb sshd\[30566\]: Invalid user sftpuser from 106.13.142.247 Sep 11 11:03:31 hcbb sshd\[30566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.142.247 Sep 11 11:03:33 hcbb sshd\[30566\]: Failed password for invalid user sftpuser from 106.13.142.247 port 42254 ssh2 Sep 11 11:06:46 hcbb sshd\[30845\]: Invalid user www-upload from 106.13.142.247 Sep 11 11:06:46 hcbb sshd\[30845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.142.247 |
2019-09-12 05:14:57 |
| 142.93.47.125 | attackbots | 2019-09-11T20:38:18.299227abusebot-2.cloudsearch.cf sshd\[29081\]: Invalid user pass1 from 142.93.47.125 port 36700 |
2019-09-12 05:09:01 |
| 123.231.44.71 | attackbots | Sep 11 22:29:27 mout sshd[22674]: Invalid user ftp1 from 123.231.44.71 port 44842 |
2019-09-12 05:26:33 |
| 188.27.112.195 | attackspambots | Automatic report - Port Scan Attack |
2019-09-12 05:38:33 |
| 167.99.72.83 | attackbots | smtp port scan |
2019-09-12 05:30:34 |
| 95.85.70.123 | attack | B: Magento admin pass test (wrong country) |
2019-09-12 05:09:43 |
| 8.28.16.254 | attackbots | Port Scan: TCP/53 |
2019-09-12 05:43:08 |
| 175.205.113.249 | attackbotsspam | Sep 11 20:11:28 Ubuntu-1404-trusty-64-minimal sshd\[863\]: Invalid user stacee from 175.205.113.249 Sep 11 20:11:28 Ubuntu-1404-trusty-64-minimal sshd\[863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.113.249 Sep 11 20:11:29 Ubuntu-1404-trusty-64-minimal sshd\[863\]: Failed password for invalid user stacee from 175.205.113.249 port 50828 ssh2 Sep 11 20:56:32 Ubuntu-1404-trusty-64-minimal sshd\[13263\]: Invalid user test from 175.205.113.249 Sep 11 20:56:32 Ubuntu-1404-trusty-64-minimal sshd\[13263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.113.249 |
2019-09-12 05:40:08 |
| 45.118.144.31 | attackbots | 2019-09-11T21:07:06.772634abusebot-4.cloudsearch.cf sshd\[25286\]: Invalid user steamcmd from 45.118.144.31 port 58836 |
2019-09-12 05:27:30 |
| 103.76.252.10 | attack | WordPress brute force |
2019-09-12 05:26:56 |
| 202.162.211.46 | attackspambots | Automatic report - Banned IP Access |
2019-09-12 05:46:23 |
| 218.24.167.204 | attackspambots | Sep 11 23:05:03 rpi sshd[6325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.24.167.204 Sep 11 23:05:05 rpi sshd[6325]: Failed password for invalid user test123 from 218.24.167.204 port 60866 ssh2 |
2019-09-12 05:36:34 |
| 59.149.237.145 | attackbotsspam | Sep 11 23:20:51 markkoudstaal sshd[28727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.149.237.145 Sep 11 23:20:53 markkoudstaal sshd[28727]: Failed password for invalid user git from 59.149.237.145 port 36410 ssh2 Sep 11 23:29:25 markkoudstaal sshd[29459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.149.237.145 |
2019-09-12 05:33:29 |
| 49.88.112.115 | attackbots | Sep 11 11:00:53 web1 sshd\[20398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root Sep 11 11:00:55 web1 sshd\[20398\]: Failed password for root from 49.88.112.115 port 61103 ssh2 Sep 11 11:00:57 web1 sshd\[20398\]: Failed password for root from 49.88.112.115 port 61103 ssh2 Sep 11 11:00:59 web1 sshd\[20398\]: Failed password for root from 49.88.112.115 port 61103 ssh2 Sep 11 11:03:33 web1 sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root |
2019-09-12 05:13:16 |
| 201.174.46.234 | attackbots | Sep 11 22:20:47 lnxweb62 sshd[28083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234 |
2019-09-12 05:06:34 |