City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.121.160.0 - 112.121.191.255'
% Abuse contact for '112.121.160.0 - 112.121.191.255' is 'abuse@netsec.com'
inetnum: 112.121.160.0 - 112.121.191.255
netname: NETSEC-HK
descr: Netsec Limited
country: HK
org: ORG-NASS1-AP
admin-c: NN541-AP
tech-c: NN541-AP
status: ALLOCATED PORTABLE
abuse-c: AH1002-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-NETSEC-HK
mnt-routes: MAINT-NETSEC-HK
mnt-irt: IRT-HK-NETSEC
last-modified: 2025-03-14T06:45:21Z
source: APNIC
irt: IRT-HK-NETSEC
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
e-mail: noc@netsec.com
abuse-mailbox: abuse@netsec.com
admin-c: NN411-AP
tech-c: NN411-AP
auth: # Filtered
remarks: abuse@netsec.com was validated on 2025-09-18
remarks: noc@netsec.com was validated on 2025-11-25
mnt-by: MAINT-HK-NETSEC
last-modified: 2025-11-25T06:20:12Z
source: APNIC
organisation: ORG-NASS1-AP
org-name: Netsec Limited
org-type: LIR
country: HK
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
phone: +852-27511100
fax-no: +852-27511199
e-mail: noc@netsec.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:31Z
source: APNIC
role: ABUSE HKNETSEC
country: ZZ
address: RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
phone: +000000000
e-mail: noc@netsec.com
admin-c: NN411-AP
tech-c: NN411-AP
nic-hdl: AH1002-AP
remarks: Generated from irt object IRT-HK-NETSEC
remarks: abuse@netsec.com was validated on 2025-09-18
remarks: noc@netsec.com was validated on 2025-11-25
abuse-mailbox: abuse@netsec.com
mnt-by: APNIC-ABUSE
last-modified: 2025-11-25T06:20:44Z
source: APNIC
role: NETSEC NOC
address: Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country: HK
phone: +85227511100
e-mail: noc@netsec.com
admin-c: NN541-AP
tech-c: NN541-AP
nic-hdl: NN541-AP
mnt-by: MAINT-NETSEC-HK
last-modified: 2025-03-14T05:55:40Z
source: APNIC
% Information related to '112.121.183.0/24AS45753'
route: 112.121.183.0/24
origin: AS45753
descr: Netsec Limited
RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by: MAINT-NETSEC-HK
last-modified: 2021-11-29T08:43:25Z
source: APNIC
% Information related to '112.121.183.0/24AS9744'
route: 112.121.183.0/24
origin: AS9744
descr: Netsec Limited
RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by: MAINT-NETSEC-HK
last-modified: 2021-11-29T08:32:24Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.121.183.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.121.183.78. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025113000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 30 21:30:54 CST 2025
;; MSG SIZE rcvd: 107
Host 78.183.121.112.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 78.183.121.112.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.51.183.47 | attackspam | fail2ban -- 122.51.183.47 ... |
2020-06-13 00:13:24 |
| 157.55.39.47 | attack | Automatic report - Banned IP Access |
2020-06-12 23:59:24 |
| 180.235.4.131 | attackspambots | 1591963525 - 06/12/2020 14:05:25 Host: 180.235.4.131/180.235.4.131 Port: 445 TCP Blocked |
2020-06-13 00:05:57 |
| 123.206.51.192 | attackbots | Jun 12 14:17:17 meumeu sshd[325638]: Invalid user uw from 123.206.51.192 port 58720 Jun 12 14:17:17 meumeu sshd[325638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192 Jun 12 14:17:17 meumeu sshd[325638]: Invalid user uw from 123.206.51.192 port 58720 Jun 12 14:17:20 meumeu sshd[325638]: Failed password for invalid user uw from 123.206.51.192 port 58720 ssh2 Jun 12 14:19:41 meumeu sshd[325787]: Invalid user leo from 123.206.51.192 port 57254 Jun 12 14:19:41 meumeu sshd[325787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192 Jun 12 14:19:41 meumeu sshd[325787]: Invalid user leo from 123.206.51.192 port 57254 Jun 12 14:19:43 meumeu sshd[325787]: Failed password for invalid user leo from 123.206.51.192 port 57254 ssh2 Jun 12 14:22:01 meumeu sshd[325917]: Invalid user tes from 123.206.51.192 port 55788 ... |
2020-06-13 00:10:50 |
| 49.49.195.145 | attackbots | LAMP,DEF GET /shell?/bin/busybox+ABCD |
2020-06-12 23:36:12 |
| 24.230.34.148 | attackbots | Jun 12 17:20:14 prox sshd[28120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.230.34.148 |
2020-06-12 23:53:48 |
| 77.23.10.115 | attack | Jun 12 07:39:53 mockhub sshd[4190]: Failed password for root from 77.23.10.115 port 47014 ssh2 ... |
2020-06-12 23:51:39 |
| 78.246.36.42 | attack | (sshd) Failed SSH login from 78.246.36.42 (FR/France/mat14-1-78-246-36-42.fbx.proxad.net): 5 in the last 3600 secs |
2020-06-13 00:24:45 |
| 111.40.214.20 | attackbots | Jun 12 05:05:41 propaganda sshd[12715]: Connection from 111.40.214.20 port 57894 on 10.0.0.160 port 22 rdomain "" Jun 12 05:05:45 propaganda sshd[12715]: Connection closed by 111.40.214.20 port 57894 [preauth] |
2020-06-12 23:46:49 |
| 185.244.39.106 | attackbots | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-06-12 23:46:20 |
| 45.55.184.78 | attackbots | (sshd) Failed SSH login from 45.55.184.78 (US/United States/-): 5 in the last 3600 secs |
2020-06-13 00:18:37 |
| 92.118.160.1 | attack | Nov 19 16:09:26 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=92.118.160.1 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=UDP SPT=58776 DPT=123 LEN=56 ... |
2020-06-13 00:15:50 |
| 46.161.27.75 | attackbotsspam |
|
2020-06-13 00:10:02 |
| 134.175.228.215 | attack | 2020-06-12T14:59:11.315635ionos.janbro.de sshd[103079]: Invalid user administrator from 134.175.228.215 port 34788 2020-06-12T14:59:13.677617ionos.janbro.de sshd[103079]: Failed password for invalid user administrator from 134.175.228.215 port 34788 ssh2 2020-06-12T15:04:32.780946ionos.janbro.de sshd[103122]: Invalid user irlande from 134.175.228.215 port 34822 2020-06-12T15:04:32.818514ionos.janbro.de sshd[103122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.228.215 2020-06-12T15:04:32.780946ionos.janbro.de sshd[103122]: Invalid user irlande from 134.175.228.215 port 34822 2020-06-12T15:04:34.138929ionos.janbro.de sshd[103122]: Failed password for invalid user irlande from 134.175.228.215 port 34822 ssh2 2020-06-12T15:10:04.555331ionos.janbro.de sshd[103135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.228.215 user=root 2020-06-12T15:10:07.128488ionos.janbro.de sshd[103135]: Failed ... |
2020-06-13 00:09:37 |
| 62.234.27.166 | attackspambots | Brute force SMTP login attempted. ... |
2020-06-13 00:00:40 |