Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kowloon City

Region: Kowloon City Kowloon

Country: Hong Kong

Internet Service Provider: Hong Kong Broadband Network Ltd

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       138.19.0.0 - 138.19.255.255
CIDR:           138.19.0.0/16
NetName:        APNIC-ERX-138-19-0-0
NetHandle:      NET-138-19-0-0-1
Parent:         NET138 (NET-138-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2003-12-11
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/138.19.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '138.19.0.0 - 138.19.127.255'

% Abuse contact for '138.19.0.0 - 138.19.127.255' is 'abuse@hkbn.net'

inetnum:        138.19.0.0 - 138.19.127.255
netname:        HKBN-HK
descr:          Hong Kong Broadband Network Ltd
descr:          15/F Trans Asia Centre
descr:          18 Kin Hong Street
country:        HK
org:            ORG-HKBN1-AP
admin-c:        HKBN-HK
tech-c:         HKBN-HK
abuse-c:        AH1013-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-HKBN
mnt-routes:     MAINT-HK-HKBN
mnt-irt:        IRT-HKBN-HK
last-modified:  2021-01-22T00:29:19Z
source:         APNIC

irt:            IRT-HKBN-HK
address:        15/F Trans Asia Centre
address:        18 Kin Hong Street, Kwai Chung
address:        N.T.
e-mail:
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.19.80.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.19.80.186.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020900 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 09 18:58:27 CST 2026
;; MSG SIZE  rcvd: 106
Host info
186.80.19.138.in-addr.arpa domain name pointer 138019080186.ctinets.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
186.80.19.138.in-addr.arpa	name = 138019080186.ctinets.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.56.142.47 attackbots
Invalid user webmaster1 from 149.56.142.47 port 42356
2020-05-16 23:30:37
222.186.175.182 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-16 23:20:53
152.67.7.117 attackspam
May 16 02:51:36 web01 sshd[11818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.7.117 
May 16 02:51:38 web01 sshd[11818]: Failed password for invalid user testing from 152.67.7.117 port 27960 ssh2
...
2020-05-16 23:32:38
179.191.224.126 attackspambots
SSH brute-force attempt
2020-05-16 23:41:55
14.237.135.53 attack
[Thu May 14 06:38:46 2020] - Syn Flood From IP: 14.237.135.53 Port: 49350
2020-05-16 23:36:54
54.37.232.137 attackspam
Observed on multiple hosts.
2020-05-16 23:04:16
180.76.249.74 attackbotsspam
May 16 04:52:09 PorscheCustomer sshd[22562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.249.74
May 16 04:52:12 PorscheCustomer sshd[22562]: Failed password for invalid user git from 180.76.249.74 port 55172 ssh2
May 16 04:55:27 PorscheCustomer sshd[22716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.249.74
...
2020-05-16 23:19:25
31.40.155.143 attackbots
20/4/2@00:55:33: FAIL: Alarm-Network address from=31.40.155.143
...
2020-05-16 23:08:23
49.234.80.94 attackbots
SSH Invalid Login
2020-05-16 23:04:47
197.255.218.114 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-16 23:09:51
212.47.238.207 attackbotsspam
Total attacks: 2
2020-05-16 23:19:48
185.220.100.251 attackbotsspam
May 16 06:22:18 gw1 sshd[31421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.251
May 16 06:22:20 gw1 sshd[31421]: Failed password for invalid user webguest from 185.220.100.251 port 9410 ssh2
...
2020-05-16 23:40:01
222.85.230.155 attackspambots
Bruteforce detected by fail2ban
2020-05-16 23:39:36
59.125.249.152 attackspam
May 16 04:04:14 mout sshd[3227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.249.152  user=pi
May 16 04:04:16 mout sshd[3227]: Failed password for pi from 59.125.249.152 port 50442 ssh2
May 16 04:04:16 mout sshd[3227]: Connection closed by 59.125.249.152 port 50442 [preauth]
2020-05-16 22:57:11
114.35.82.7 attackbots
8080/tcp 81/tcp
[2020-05-11/15]2pkt
2020-05-16 23:18:05

Recently Reported IPs

2606:4700:10::6814:8342 2606:4700:10::6814:6557 2606:4700:10::6814:7376 2606:4700:10::6816:3002
110.77.248.149 2606:4700:10::ac43:1412 2606:4700:10::6814:9927 2606:4700:10::6814:4812
110.78.158.68 2606:4700:10::6814:7894 2606:4700:10::6816:4744 2606:4700:10::6816:4642
188.113.230.16 2606:4700:10::6814:4841 2606:4700:10::6816:3281 2606:4700:10::6814:4890
2606:4700:10::6816:2344 2606:4700:10::6814:4914 2606:4700:10::6814:8047 115.45.40.29