Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.121.160.0 - 112.121.191.255'

% Abuse contact for '112.121.160.0 - 112.121.191.255' is 'abuse@netsec.com'

inetnum:        112.121.160.0 - 112.121.191.255
netname:        NETSEC-HK
descr:          Netsec Limited
country:        HK
org:            ORG-NASS1-AP
admin-c:        NN541-AP
tech-c:         NN541-AP
status:         ALLOCATED PORTABLE
abuse-c:        AH1002-AP
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NETSEC-HK
mnt-routes:     MAINT-NETSEC-HK
mnt-irt:        IRT-HK-NETSEC
last-modified:  2025-03-14T06:45:21Z
source:         APNIC

irt:            IRT-HK-NETSEC
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
e-mail:         noc@netsec.com
abuse-mailbox:  abuse@netsec.com
admin-c:        NN411-AP
tech-c:         NN411-AP
auth:           # Filtered
remarks:        abuse@netsec.com was validated on 2025-09-18
remarks:        noc@netsec.com was validated on 2025-11-25
mnt-by:         MAINT-HK-NETSEC
last-modified:  2025-11-25T06:20:12Z
source:         APNIC

organisation:   ORG-NASS1-AP
org-name:       Netsec Limited
org-type:       LIR
country:        HK
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
phone:          +852-27511100
fax-no:         +852-27511199
e-mail:         noc@netsec.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:31Z
source:         APNIC

role:           ABUSE HKNETSEC
country:        ZZ
address:        RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha Wan, Kowloon, Hong Kong
phone:          +000000000
e-mail:         noc@netsec.com
admin-c:        NN411-AP
tech-c:         NN411-AP
nic-hdl:        AH1002-AP
remarks:        Generated from irt object IRT-HK-NETSEC
remarks:        abuse@netsec.com was validated on 2025-09-18
remarks:        noc@netsec.com was validated on 2025-11-25
abuse-mailbox:  abuse@netsec.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-25T06:20:44Z
source:         APNIC

role:           NETSEC NOC
address:        Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country:        HK
phone:          +85227511100
e-mail:         noc@netsec.com
admin-c:        NN541-AP
tech-c:         NN541-AP
nic-hdl:        NN541-AP
mnt-by:         MAINT-NETSEC-HK
last-modified:  2025-03-14T05:55:40Z
source:         APNIC

% Information related to '112.121.183.0/24AS45753'

route:          112.121.183.0/24
origin:         AS45753
descr:          Netsec Limited
                RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by:         MAINT-NETSEC-HK
last-modified:  2021-11-29T08:43:25Z
source:         APNIC

% Information related to '112.121.183.0/24AS9744'

route:          112.121.183.0/24
origin:         AS9744
descr:          Netsec Limited
                RM 2607-08, 26/F, Billion Plaza, 8 Cheung Yue St, Cheung Sha
mnt-by:         MAINT-NETSEC-HK
last-modified:  2021-11-29T08:32:24Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.121.183.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.121.183.78.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025113000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 30 21:30:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 78.183.121.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 78.183.121.112.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
122.51.183.47 attackspam
fail2ban -- 122.51.183.47
...
2020-06-13 00:13:24
157.55.39.47 attack
Automatic report - Banned IP Access
2020-06-12 23:59:24
180.235.4.131 attackspambots
1591963525 - 06/12/2020 14:05:25 Host: 180.235.4.131/180.235.4.131 Port: 445 TCP Blocked
2020-06-13 00:05:57
123.206.51.192 attackbots
Jun 12 14:17:17 meumeu sshd[325638]: Invalid user uw from 123.206.51.192 port 58720
Jun 12 14:17:17 meumeu sshd[325638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192 
Jun 12 14:17:17 meumeu sshd[325638]: Invalid user uw from 123.206.51.192 port 58720
Jun 12 14:17:20 meumeu sshd[325638]: Failed password for invalid user uw from 123.206.51.192 port 58720 ssh2
Jun 12 14:19:41 meumeu sshd[325787]: Invalid user leo from 123.206.51.192 port 57254
Jun 12 14:19:41 meumeu sshd[325787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192 
Jun 12 14:19:41 meumeu sshd[325787]: Invalid user leo from 123.206.51.192 port 57254
Jun 12 14:19:43 meumeu sshd[325787]: Failed password for invalid user leo from 123.206.51.192 port 57254 ssh2
Jun 12 14:22:01 meumeu sshd[325917]: Invalid user tes from 123.206.51.192 port 55788
...
2020-06-13 00:10:50
49.49.195.145 attackbots
LAMP,DEF GET /shell?/bin/busybox+ABCD
2020-06-12 23:36:12
24.230.34.148 attackbots
Jun 12 17:20:14 prox sshd[28120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.230.34.148
2020-06-12 23:53:48
77.23.10.115 attack
Jun 12 07:39:53 mockhub sshd[4190]: Failed password for root from 77.23.10.115 port 47014 ssh2
...
2020-06-12 23:51:39
78.246.36.42 attack
(sshd) Failed SSH login from 78.246.36.42 (FR/France/mat14-1-78-246-36-42.fbx.proxad.net): 5 in the last 3600 secs
2020-06-13 00:24:45
111.40.214.20 attackbots
Jun 12 05:05:41 propaganda sshd[12715]: Connection from 111.40.214.20 port 57894 on 10.0.0.160 port 22 rdomain ""
Jun 12 05:05:45 propaganda sshd[12715]: Connection closed by 111.40.214.20 port 57894 [preauth]
2020-06-12 23:46:49
185.244.39.106 attackbots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-06-12 23:46:20
45.55.184.78 attackbots
(sshd) Failed SSH login from 45.55.184.78 (US/United States/-): 5 in the last 3600 secs
2020-06-13 00:18:37
92.118.160.1 attack
Nov 19 16:09:26 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=92.118.160.1 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=UDP SPT=58776 DPT=123 LEN=56 
...
2020-06-13 00:15:50
46.161.27.75 attackbotsspam
 TCP (SYN) 46.161.27.75:46959 -> port 6044, len 44
2020-06-13 00:10:02
134.175.228.215 attack
2020-06-12T14:59:11.315635ionos.janbro.de sshd[103079]: Invalid user administrator from 134.175.228.215 port 34788
2020-06-12T14:59:13.677617ionos.janbro.de sshd[103079]: Failed password for invalid user administrator from 134.175.228.215 port 34788 ssh2
2020-06-12T15:04:32.780946ionos.janbro.de sshd[103122]: Invalid user irlande from 134.175.228.215 port 34822
2020-06-12T15:04:32.818514ionos.janbro.de sshd[103122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.228.215
2020-06-12T15:04:32.780946ionos.janbro.de sshd[103122]: Invalid user irlande from 134.175.228.215 port 34822
2020-06-12T15:04:34.138929ionos.janbro.de sshd[103122]: Failed password for invalid user irlande from 134.175.228.215 port 34822 ssh2
2020-06-12T15:10:04.555331ionos.janbro.de sshd[103135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.228.215  user=root
2020-06-12T15:10:07.128488ionos.janbro.de sshd[103135]: Failed
...
2020-06-13 00:09:37
62.234.27.166 attackspambots
Brute force SMTP login attempted.
...
2020-06-13 00:00:40

Recently Reported IPs

113.14.255.169 182.104.90.211 183.7.145.207 35.197.120.140
172.20.32.52 149.119.33.10 50.16.56.56 117.198.15.221
34.10.233.154 144.126.236.140 197.55.114.104 156.227.148.1
34.48.151.73 93.170.170.13 63.33.66.89 167.99.81.88
45.150.54.62 104.248.46.134 207.154.203.193 157.230.117.167