Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.66.0.0 - 202.66.127.255'

% Abuse contact for '202.66.0.0 - 202.66.127.255' is 'abuse@citictel-cpc.com'

inetnum:        202.66.0.0 - 202.66.127.255
netname:        CITICTEL-CPC-HK
descr:          CITIC Telecom International CPC Limited
descr:          20/F Lincoln House
descr:          Taikoo Place
descr:          979 Kings Road, Quarry Bay
country:        HK
org:            ORG-CTIC1-AP
admin-c:        CN275-AP
tech-c:         CTIC1-AP
abuse-c:        AC1848-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-CITICTELCPC
mnt-routes:     MAINT-HK-CITICTELCPC
mnt-irt:        IRT-CITICTEL-CPC-HK
last-modified:  2020-06-24T06:23:06Z
source:         APNIC

irt:            IRT-CITICTEL-CPC-HK
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
e-mail:         abuse@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
admin-c:        CN275-AP
tech-c:         CTIC1-AP
auth:           # Filtered
remarks:        abuse@citictel-cpc.com was validated on 2026-03-03
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2026-03-03T13:25:42Z
source:         APNIC

organisation:   ORG-CTIC1-AP
org-name:       CITIC Telecom International CPC Limited
org-type:       LIR
country:        HK
address:        20/F Lincoln House
address:        Taikoo Place
address:        979 King's Road
phone:          +852-2170-7101
fax-no:         +852-2795-1262
e-mail:         hostinfo@citictel-cpc.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:43Z
source:         APNIC

role:           ABUSE CITICTELCPCHK
country:        ZZ
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
phone:          +000000000
e-mail:         abuse@citictel-cpc.com
admin-c:        CN275-AP
tech-c:         CTIC1-AP
nic-hdl:        AC1848-AP
remarks:        Generated from irt object IRT-CITICTEL-CPC-HK
remarks:        abuse@citictel-cpc.com was validated on 2026-03-03
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-03T13:25:52Z
source:         APNIC

role:           CITICTel-CPC NOC
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
country:        HK
phone:          +852-2170-7101
e-mail:         hostinfo@citictel-cpc.com
admin-c:        CTIC1-AP
tech-c:         CTIC1-AP
nic-hdl:        CN275-AP
remarks:        send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify:         hostinfo@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2013-08-13T04:19:50Z
source:         APNIC

person:         CITIC Telecom International CPC Limited NOC
address:        20/F, Lincoln House,
address:        Taikoo Place,
address:        Quarry Bay,
address:        HONG KONG
country:        HK
phone:          +852-2170-7101
e-mail:         hostinfo@citictel-cpc.com
nic-hdl:        CTIC1-AP
remarks:        send email to "abuse@citictel-cpc.com" for spamming/abuse issue
notify:         hostinfo@citictel-cpc.com
abuse-mailbox:  abuse@citictel-cpc.com
mnt-by:         MAINT-HK-CITICTELCPC
last-modified:  2013-08-13T04:16:50Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.66.5.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.66.5.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 23:11:32 CST 2026
;; MSG SIZE  rcvd: 103
Host info
8.5.66.202.in-addr.arpa domain name pointer 202.66.5-8.static.hk.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.5.66.202.in-addr.arpa	name = 202.66.5-8.static.hk.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.120.189.234 attackspambots
Dec 10 10:21:32 ns37 sshd[21395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234
2019-12-10 17:26:08
46.101.48.191 attackspambots
Dec 10 09:47:27 vps691689 sshd[24093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.48.191
Dec 10 09:47:29 vps691689 sshd[24093]: Failed password for invalid user gmod from 46.101.48.191 port 41766 ssh2
...
2019-12-10 17:06:34
149.202.75.205 attackspambots
Dec 10 10:14:48 loxhost sshd\[22702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.75.205  user=root
Dec 10 10:14:50 loxhost sshd\[22702\]: Failed password for root from 149.202.75.205 port 36302 ssh2
Dec 10 10:19:36 loxhost sshd\[22872\]: Invalid user quentin from 149.202.75.205 port 45140
Dec 10 10:19:36 loxhost sshd\[22872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.75.205
Dec 10 10:19:38 loxhost sshd\[22872\]: Failed password for invalid user quentin from 149.202.75.205 port 45140 ssh2
...
2019-12-10 17:23:16
58.215.215.134 attackspam
Dec 10 07:22:03 thevastnessof sshd[2896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.215.215.134
...
2019-12-10 16:58:17
164.132.107.245 attackbots
Dec 10 09:20:14 vps647732 sshd[3374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.107.245
Dec 10 09:20:15 vps647732 sshd[3374]: Failed password for invalid user http from 164.132.107.245 port 60980 ssh2
...
2019-12-10 17:17:57
54.37.155.165 attackspam
Dec  9 22:43:28 php1 sshd\[11705\]: Invalid user git from 54.37.155.165
Dec  9 22:43:28 php1 sshd\[11705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165
Dec  9 22:43:30 php1 sshd\[11705\]: Failed password for invalid user git from 54.37.155.165 port 49574 ssh2
Dec  9 22:49:29 php1 sshd\[12283\]: Invalid user guest from 54.37.155.165
Dec  9 22:49:29 php1 sshd\[12283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165
2019-12-10 17:03:42
103.117.192.87 attack
Host Scan
2019-12-10 17:31:09
88.249.66.247 attack
Automatic report - Port Scan Attack
2019-12-10 17:00:27
1.71.129.49 attackbotsspam
Dec 10 10:16:25 meumeu sshd[11343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 
Dec 10 10:16:27 meumeu sshd[11343]: Failed password for invalid user pontus from 1.71.129.49 port 37319 ssh2
Dec 10 10:22:32 meumeu sshd[12145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49 
...
2019-12-10 17:28:13
50.239.143.100 attackspambots
Dec  9 23:18:01 eddieflores sshd\[31986\]: Invalid user romlah from 50.239.143.100
Dec  9 23:18:01 eddieflores sshd\[31986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100
Dec  9 23:18:02 eddieflores sshd\[31986\]: Failed password for invalid user romlah from 50.239.143.100 port 48188 ssh2
Dec  9 23:23:36 eddieflores sshd\[662\]: Invalid user apache from 50.239.143.100
Dec  9 23:23:36 eddieflores sshd\[662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.100
2019-12-10 17:31:57
45.226.135.18 attackspam
Automatic report - Banned IP Access
2019-12-10 17:32:29
118.25.27.67 attackspambots
Dec 10 09:44:45 MK-Soft-VM5 sshd[31865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67 
Dec 10 09:44:47 MK-Soft-VM5 sshd[31865]: Failed password for invalid user slaby from 118.25.27.67 port 36398 ssh2
...
2019-12-10 17:02:14
125.130.110.20 attack
Dec 10 00:10:56 home sshd[9384]: Invalid user helpdesk from 125.130.110.20 port 54658
Dec 10 00:10:56 home sshd[9384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Dec 10 00:10:56 home sshd[9384]: Invalid user helpdesk from 125.130.110.20 port 54658
Dec 10 00:10:58 home sshd[9384]: Failed password for invalid user helpdesk from 125.130.110.20 port 54658 ssh2
Dec 10 00:19:09 home sshd[9462]: Invalid user console from 125.130.110.20 port 60088
Dec 10 00:19:09 home sshd[9462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Dec 10 00:19:09 home sshd[9462]: Invalid user console from 125.130.110.20 port 60088
Dec 10 00:19:11 home sshd[9462]: Failed password for invalid user console from 125.130.110.20 port 60088 ssh2
Dec 10 00:25:04 home sshd[9512]: Invalid user oratest from 125.130.110.20 port 41020
Dec 10 00:25:04 home sshd[9512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=
2019-12-10 17:32:14
5.11.37.63 attackbotsspam
Dec 10 10:25:35 nextcloud sshd\[31002\]: Invalid user ftpuser from 5.11.37.63
Dec 10 10:25:35 nextcloud sshd\[31002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.11.37.63
Dec 10 10:25:37 nextcloud sshd\[31002\]: Failed password for invalid user ftpuser from 5.11.37.63 port 56470 ssh2
...
2019-12-10 17:37:08
37.49.225.166 attack
37.49.225.166 was recorded 11 times by 10 hosts attempting to connect to the following ports: 17185,3283. Incident counter (4h, 24h, all-time): 11, 33, 1018
2019-12-10 17:11:52

Recently Reported IPs

83.142.209.67 166.88.164.217 59.39.222.245 23.225.40.149
39.98.63.115 165.245.190.93 13.222.157.162 192.204.43.113
112.45.101.155 185.211.101.91 216.167.2.233 220.167.232.114
44.201.59.250 94.231.206.2 94.231.206.109 49.78.84.123
35.203.210.87 34.53.191.143 41.193.162.193 100.50.36.245