Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       164.52.0.0 - 164.52.127.255
CIDR:           164.52.0.0/17
NetName:        APNIC
NetHandle:      NET-164-52-0-0-1
Parent:         NET164 (NET-164-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2016-09-07
Updated:        2016-09-07
Ref:            https://rdap.arin.net/registry/ip/164.52.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '164.52.105.0 - 164.52.105.255'

% Abuse contact for '164.52.105.0 - 164.52.105.255' is 'tao.li@capitalonline.net'

inetnum:        164.52.105.0 - 164.52.105.255
netname:        UCUL-VN
descr:          UCUL-VN
country:        VN
admin-c:        UN28-AP
tech-c:         UA50-AP
abuse-c:        AC2281-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CDS-HK
mnt-irt:        IRT-CDS-HK
last-modified:  2024-05-30T08:04:34Z
source:         APNIC

irt:            IRT-CDS-HK
address:        137-139, Connaught Road Central, Hongkong, Hongkong
e-mail:         tao.li@capitalonline.net
abuse-mailbox:  tao.li@capitalonline.net
admin-c:        CODS1-AP
tech-c:         CODS1-AP
auth:           # Filtered
remarks:        tao.li@capitalonline.net was validated on 2025-12-17
mnt-by:         MAINT-CDS-HK
last-modified:  2025-12-17T02:39:58Z
source:         APNIC

role:           ABUSE CDSHK
country:        ZZ
address:        137-139, Connaught Road Central, Hongkong, Hongkong
phone:          +000000000
e-mail:         tao.li@capitalonline.net
admin-c:        CODS1-AP
tech-c:         CODS1-AP
nic-hdl:        AC2281-AP
remarks:        Generated from irt object IRT-CDS-HK
remarks:        tao.li@capitalonline.net was validated on 2025-12-17
abuse-mailbox:  tao.li@capitalonline.net
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-17T02:40:29Z
source:         APNIC

role:           UCUL Abuse
address:        401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
country:        US
phone:          +1-213-375-3998
e-mail:         abuse@urbanconnectedcloud.com
admin-c:        UN28-AP
tech-c:         UN28-AP
nic-hdl:        UA50-AP
mnt-by:         MAINT-UCUL-HK
last-modified:  2022-03-29T02:45:10Z
source:         APNIC

role:           UCUL-HK NETADMIN
address:        401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
country:        HK
phone:          +1-213-375-3998
e-mail:         llawrence@urbanconnectedcloud.com
admin-c:        UN28-AP
tech-c:         UN28-AP
nic-hdl:        UN28-AP
mnt-by:         MAINT-UCUL-HK
last-modified:  2022-03-10T03:22:47Z
source:         APNIC

% Information related to '164.52.105.0/24AS63199'

route:          164.52.105.0/24
origin:         AS63199
descr:          Capitalonline Data Service (HK) Co., Limited
                137-139, Connaught Road Central,
mnt-by:         MAINT-CDS-HK
last-modified:  2024-04-01T08:07:37Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.105.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.52.105.76.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 09:52:45 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 76.105.52.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 76.105.52.164.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
117.3.71.151 attackspambots
04/15/2020-23:52:05.486234 117.3.71.151 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-16 15:34:58
132.232.108.149 attack
Apr 16 04:03:50 game-panel sshd[29573]: Failed password for backup from 132.232.108.149 port 56738 ssh2
Apr 16 04:07:59 game-panel sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.108.149
Apr 16 04:08:01 game-panel sshd[29758]: Failed password for invalid user styx from 132.232.108.149 port 51479 ssh2
2020-04-16 15:39:42
195.223.211.242 attackspam
Apr 16 12:07:39 gw1 sshd[6896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Apr 16 12:07:40 gw1 sshd[6896]: Failed password for invalid user deploy from 195.223.211.242 port 36642 ssh2
...
2020-04-16 15:31:53
118.24.33.38 attackspambots
2020-04-16T07:06:26.608678upcloud.m0sh1x2.com sshd[11026]: Invalid user deploy from 118.24.33.38 port 58746
2020-04-16 15:25:37
104.248.156.231 attackbots
Apr 16 10:28:05 pkdns2 sshd\[24360\]: Invalid user admin from 104.248.156.231Apr 16 10:28:07 pkdns2 sshd\[24360\]: Failed password for invalid user admin from 104.248.156.231 port 59138 ssh2Apr 16 10:30:31 pkdns2 sshd\[24502\]: Invalid user dean from 104.248.156.231Apr 16 10:30:33 pkdns2 sshd\[24502\]: Failed password for invalid user dean from 104.248.156.231 port 40626 ssh2Apr 16 10:33:01 pkdns2 sshd\[24587\]: Invalid user postgres from 104.248.156.231Apr 16 10:33:03 pkdns2 sshd\[24587\]: Failed password for invalid user postgres from 104.248.156.231 port 50344 ssh2
...
2020-04-16 15:42:38
2.88.245.178 attackbots
Automatic report - Port Scan Attack
2020-04-16 16:11:59
58.71.15.10 attackbots
$f2bV_matches
2020-04-16 15:53:51
199.66.90.177 attackspam
Apr 16 06:22:26 raspberrypi sshd\[490\]: Failed password for root from 199.66.90.177 port 8713 ssh2Apr 16 07:01:01 raspberrypi sshd\[21160\]: Invalid user admin from 199.66.90.177Apr 16 07:01:02 raspberrypi sshd\[21160\]: Failed password for invalid user admin from 199.66.90.177 port 8713 ssh2
...
2020-04-16 15:59:05
125.124.254.31 attackbotsspam
Apr 16 04:45:50 powerpi2 sshd[10673]: Invalid user joseph from 125.124.254.31 port 49490
Apr 16 04:45:52 powerpi2 sshd[10673]: Failed password for invalid user joseph from 125.124.254.31 port 49490 ssh2
Apr 16 04:50:39 powerpi2 sshd[10983]: Invalid user dui from 125.124.254.31 port 51830
...
2020-04-16 16:10:20
206.189.28.69 attackspambots
" "
2020-04-16 15:48:14
193.202.45.202 attackspam
193.202.45.202 was recorded 28 times by 11 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 28, 86, 523
2020-04-16 15:59:53
60.174.172.211 attackbotsspam
Unauthorized IMAP connection attempt
2020-04-16 15:34:27
167.71.111.16 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-16 16:00:22
151.45.84.200 attack
Port probing on unauthorized port 23
2020-04-16 15:51:49
148.66.147.28 attack
148.66.147.28 has been banned for [WebApp Attack]
...
2020-04-16 15:54:36

Recently Reported IPs

3.101.22.12 170.82.91.3 20.208.130.25 2606:4700:10::6814:9991
2606:4700:10::6814:6309 2606:4700:10::6814:6316 2606:4700:10::6814:7934 2606:4700:10::ac43:2204
2606:4700:10::6816:422d 2606:4700:10::6816:4433 2606:4700:10::6814:4424 2606:4700:10::6814:4679
45.88.192.117 182.138.158.54 175.30.48.192 123.145.13.125
121.56.214.174 114.97.190.44 103.137.160.189 10.80.20.177