City: Ho Chi Minh City
Region: unknown
Country: Vietnam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.52.0.0 - 164.52.127.255
CIDR: 164.52.0.0/17
NetName: APNIC
NetHandle: NET-164-52-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2016-09-07
Updated: 2016-09-07
Ref: https://rdap.arin.net/registry/ip/164.52.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '164.52.105.0 - 164.52.105.255'
% Abuse contact for '164.52.105.0 - 164.52.105.255' is 'tao.li@capitalonline.net'
inetnum: 164.52.105.0 - 164.52.105.255
netname: UCUL-VN
descr: UCUL-VN
country: VN
admin-c: UN28-AP
tech-c: UA50-AP
abuse-c: AC2281-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-CDS-HK
mnt-irt: IRT-CDS-HK
last-modified: 2024-05-30T08:04:34Z
source: APNIC
irt: IRT-CDS-HK
address: 137-139, Connaught Road Central, Hongkong, Hongkong
e-mail: tao.li@capitalonline.net
abuse-mailbox: tao.li@capitalonline.net
admin-c: CODS1-AP
tech-c: CODS1-AP
auth: # Filtered
remarks: tao.li@capitalonline.net was validated on 2025-12-17
mnt-by: MAINT-CDS-HK
last-modified: 2025-12-17T02:39:58Z
source: APNIC
role: ABUSE CDSHK
country: ZZ
address: 137-139, Connaught Road Central, Hongkong, Hongkong
phone: +000000000
e-mail: tao.li@capitalonline.net
admin-c: CODS1-AP
tech-c: CODS1-AP
nic-hdl: AC2281-AP
remarks: Generated from irt object IRT-CDS-HK
remarks: tao.li@capitalonline.net was validated on 2025-12-17
abuse-mailbox: tao.li@capitalonline.net
mnt-by: APNIC-ABUSE
last-modified: 2025-12-17T02:40:29Z
source: APNIC
role: UCUL Abuse
address: 401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
country: US
phone: +1-213-375-3998
e-mail: abuse@urbanconnectedcloud.com
admin-c: UN28-AP
tech-c: UN28-AP
nic-hdl: UA50-AP
mnt-by: MAINT-UCUL-HK
last-modified: 2022-03-29T02:45:10Z
source: APNIC
role: UCUL-HK NETADMIN
address: 401 RAYLAND ST STE 200-A, Reno, NV 89502, USA
country: HK
phone: +1-213-375-3998
e-mail: llawrence@urbanconnectedcloud.com
admin-c: UN28-AP
tech-c: UN28-AP
nic-hdl: UN28-AP
mnt-by: MAINT-UCUL-HK
last-modified: 2022-03-10T03:22:47Z
source: APNIC
% Information related to '164.52.105.0/24AS63199'
route: 164.52.105.0/24
origin: AS63199
descr: Capitalonline Data Service (HK) Co., Limited
137-139, Connaught Road Central,
mnt-by: MAINT-CDS-HK
last-modified: 2024-04-01T08:07:37Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.105.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.52.105.76. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 09:52:45 CST 2026
;; MSG SIZE rcvd: 106
Host 76.105.52.164.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 76.105.52.164.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.3.71.151 | attackspambots | 04/15/2020-23:52:05.486234 117.3.71.151 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-04-16 15:34:58 |
| 132.232.108.149 | attack | Apr 16 04:03:50 game-panel sshd[29573]: Failed password for backup from 132.232.108.149 port 56738 ssh2 Apr 16 04:07:59 game-panel sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.108.149 Apr 16 04:08:01 game-panel sshd[29758]: Failed password for invalid user styx from 132.232.108.149 port 51479 ssh2 |
2020-04-16 15:39:42 |
| 195.223.211.242 | attackspam | Apr 16 12:07:39 gw1 sshd[6896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242 Apr 16 12:07:40 gw1 sshd[6896]: Failed password for invalid user deploy from 195.223.211.242 port 36642 ssh2 ... |
2020-04-16 15:31:53 |
| 118.24.33.38 | attackspambots | 2020-04-16T07:06:26.608678upcloud.m0sh1x2.com sshd[11026]: Invalid user deploy from 118.24.33.38 port 58746 |
2020-04-16 15:25:37 |
| 104.248.156.231 | attackbots | Apr 16 10:28:05 pkdns2 sshd\[24360\]: Invalid user admin from 104.248.156.231Apr 16 10:28:07 pkdns2 sshd\[24360\]: Failed password for invalid user admin from 104.248.156.231 port 59138 ssh2Apr 16 10:30:31 pkdns2 sshd\[24502\]: Invalid user dean from 104.248.156.231Apr 16 10:30:33 pkdns2 sshd\[24502\]: Failed password for invalid user dean from 104.248.156.231 port 40626 ssh2Apr 16 10:33:01 pkdns2 sshd\[24587\]: Invalid user postgres from 104.248.156.231Apr 16 10:33:03 pkdns2 sshd\[24587\]: Failed password for invalid user postgres from 104.248.156.231 port 50344 ssh2 ... |
2020-04-16 15:42:38 |
| 2.88.245.178 | attackbots | Automatic report - Port Scan Attack |
2020-04-16 16:11:59 |
| 58.71.15.10 | attackbots | $f2bV_matches |
2020-04-16 15:53:51 |
| 199.66.90.177 | attackspam | Apr 16 06:22:26 raspberrypi sshd\[490\]: Failed password for root from 199.66.90.177 port 8713 ssh2Apr 16 07:01:01 raspberrypi sshd\[21160\]: Invalid user admin from 199.66.90.177Apr 16 07:01:02 raspberrypi sshd\[21160\]: Failed password for invalid user admin from 199.66.90.177 port 8713 ssh2 ... |
2020-04-16 15:59:05 |
| 125.124.254.31 | attackbotsspam | Apr 16 04:45:50 powerpi2 sshd[10673]: Invalid user joseph from 125.124.254.31 port 49490 Apr 16 04:45:52 powerpi2 sshd[10673]: Failed password for invalid user joseph from 125.124.254.31 port 49490 ssh2 Apr 16 04:50:39 powerpi2 sshd[10983]: Invalid user dui from 125.124.254.31 port 51830 ... |
2020-04-16 16:10:20 |
| 206.189.28.69 | attackspambots | " " |
2020-04-16 15:48:14 |
| 193.202.45.202 | attackspam | 193.202.45.202 was recorded 28 times by 11 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 28, 86, 523 |
2020-04-16 15:59:53 |
| 60.174.172.211 | attackbotsspam | Unauthorized IMAP connection attempt |
2020-04-16 15:34:27 |
| 167.71.111.16 | attackbotsspam | CMS (WordPress or Joomla) login attempt. |
2020-04-16 16:00:22 |
| 151.45.84.200 | attack | Port probing on unauthorized port 23 |
2020-04-16 15:51:49 |
| 148.66.147.28 | attack | 148.66.147.28 has been banned for [WebApp Attack] ... |
2020-04-16 15:54:36 |