Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.10.64.0 - 122.10.127.255'

% Abuse contact for '122.10.64.0 - 122.10.127.255' is 'ipadmin@666666999999999.com'

inetnum:        122.10.64.0 - 122.10.127.255
netname:        HK
descr:          hk
country:        HK
admin-c:        CMJ12-AP
tech-c:         CMJ12-AP
abuse-c:        AD1180-AP
status:         ALLOCATED NON-PORTABLE
remarks:        -------------------------------------------
remarks:        abuse please send e-mail to abuse@666666999999999.com
remarks:        -------------------------------------------
mnt-by:         MAINT-HK-DFNET
mnt-irt:        IRT-DFNET-HK
last-modified:  2021-12-15T01:35:52Z
source:         APNIC

irt:            IRT-DFNET-HK
address:        HongKong
e-mail:         ipadmin@666666999999999.com
abuse-mailbox:  ipadmin@666666999999999.com
admin-c:        CMJ12-AP
tech-c:         CMJ12-AP
auth:           # Filtered
remarks:        ipadmin@666666999999999.com was validated on 2025-07-30
mnt-by:         MAINT-HK-DFNET
last-modified:  2025-09-04T06:53:47Z
source:         APNIC

role:           ABUSE DFNETHK
country:        ZZ
address:        HongKong
phone:          +000000000
e-mail:         ipadmin@666666999999999.com
admin-c:        CMJ12-AP
tech-c:         CMJ12-AP
nic-hdl:        AD1180-AP
remarks:        Generated from irt object IRT-DFNET-HK
remarks:        ipadmin@666666999999999.com was validated on 2025-07-30
abuse-mailbox:  ipadmin@666666999999999.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-30T03:40:50Z
source:         APNIC

role:           ceoi mui joeng
address:        17/F Chevalier Commercial Centre,
address:        8 Wang Hoi Road,
address:        Kowloon Bay,
country:        HK
phone:          +852-2134 4091
e-mail:         ipadmin@666666999999999.com
admin-c:        CMJ12-AP
tech-c:         CMJ12-AP
nic-hdl:        CMJ12-AP
abuse-mailbox:  abuse@666666999999999.com
mnt-by:         MAINT-HK-DFNET
last-modified:  2012-10-02T11:16:32Z
source:         APNIC

% Information related to '122.10.103.0/24AS136897'

route:          122.10.103.0/24
origin:         AS136897
descr:          HK
mnt-by:         MAINT-HK-DFNET
last-modified:  2021-02-08T03:17:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.10.103.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.10.103.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 16:11:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 133.103.10.122.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 122.10.103.133.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.179 attackbots
May  1 23:51:24 combo sshd[3583]: Failed password for root from 218.92.0.179 port 58745 ssh2
May  1 23:51:27 combo sshd[3583]: Failed password for root from 218.92.0.179 port 58745 ssh2
May  1 23:51:31 combo sshd[3583]: Failed password for root from 218.92.0.179 port 58745 ssh2
...
2020-05-02 06:54:37
111.67.198.202 attackspambots
web-1 [ssh_2] SSH Attack
2020-05-02 07:05:58
187.190.227.18 attackspambots
(imapd) Failed IMAP login from 187.190.227.18 (MX/Mexico/fixed-187-190-227-18.totalplay.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May  2 00:42:27 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 9 secs): user=, method=PLAIN, rip=187.190.227.18, lip=5.63.12.44, TLS: Connection closed, session=
2020-05-02 07:12:51
165.227.168.60 attackspambots
(mod_security) mod_security (id:20000010) triggered by 165.227.168.60 (DE/Germany/-): 5 in the last 300 secs
2020-05-02 06:44:29
35.193.6.171 attack
Automatic report - XMLRPC Attack
2020-05-02 06:57:21
195.54.167.16 attack
May  2 00:47:19 debian-2gb-nbg1-2 kernel: \[10632150.422010\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=46462 PROTO=TCP SPT=51433 DPT=23345 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-02 07:03:54
165.227.66.224 attackbots
May  2 00:25:46 meumeu sshd[7440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224 
May  2 00:25:49 meumeu sshd[7440]: Failed password for invalid user pmc2 from 165.227.66.224 port 36816 ssh2
May  2 00:30:28 meumeu sshd[8145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224 
...
2020-05-02 07:02:27
159.65.183.47 attackbotsspam
May  2 00:16:00 MainVPS sshd[28131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47  user=root
May  2 00:16:02 MainVPS sshd[28131]: Failed password for root from 159.65.183.47 port 45170 ssh2
May  2 00:19:25 MainVPS sshd[31161]: Invalid user fct from 159.65.183.47 port 54126
May  2 00:19:25 MainVPS sshd[31161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
May  2 00:19:25 MainVPS sshd[31161]: Invalid user fct from 159.65.183.47 port 54126
May  2 00:19:28 MainVPS sshd[31161]: Failed password for invalid user fct from 159.65.183.47 port 54126 ssh2
...
2020-05-02 06:42:42
122.167.74.82 attack
May  1 22:06:20 electroncash sshd[29381]: Failed password for invalid user barbara from 122.167.74.82 port 53722 ssh2
May  1 22:09:20 electroncash sshd[30157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.167.74.82  user=root
May  1 22:09:22 electroncash sshd[30157]: Failed password for root from 122.167.74.82 port 44336 ssh2
May  1 22:12:27 electroncash sshd[31053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.167.74.82  user=root
May  1 22:12:29 electroncash sshd[31053]: Failed password for root from 122.167.74.82 port 34944 ssh2
...
2020-05-02 07:13:32
128.90.54.102 attackbots
IP 128.90.54.102  and IP 89.187.178.143 (listed in your database) both sent Fraudulent Orders using the same address, 26157 Danti Court, Hayward CA 94545 United States. Three different names were used.
2020-05-02 06:52:55
220.166.63.47 attack
May  1 23:00:08 eventyay sshd[24089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.166.63.47
May  1 23:00:10 eventyay sshd[24089]: Failed password for invalid user ncs from 220.166.63.47 port 62187 ssh2
May  1 23:02:08 eventyay sshd[24156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.166.63.47
...
2020-05-02 07:13:54
31.203.67.127 attackspam
Port probing on unauthorized port 23
2020-05-02 07:15:09
162.243.143.44 attack
" "
2020-05-02 06:59:25
111.229.76.117 attack
Invalid user user3 from 111.229.76.117 port 41592
2020-05-02 06:58:11
140.143.93.31 attack
DATE:2020-05-02 00:57:36, IP:140.143.93.31, PORT:ssh SSH brute force auth (docker-dc)
2020-05-02 07:01:27

Recently Reported IPs

18.203.178.143 2001:0:348b:fb58:109f:2dc1:83b7:c271 124.72.61.142 158.69.152.252
114.119.119.24 175.107.2.1 153.3.238.28 61.241.54.232
122.225.120.27 210.67.142.230 104.218.235.243 14.212.95.50
113.141.87.37 36.41.68.121 36.41.65.173 113.141.85.194
61.172.168.8 125.122.33.94 117.68.88.255 253.181.249.111