Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.160.64.0 - 203.160.95.255'

% Abuse contact for '203.160.64.0 - 203.160.95.255' is 'hk-abuse@chinaunicom.cn'

inetnum:        203.160.64.0 - 203.160.95.255
netname:        UNICOM-HK
descr:          China Unicom (Hong Kong) Operations Limited
country:        HK
org:            ORG-CUKO1-AP
admin-c:        PL112-AP
tech-c:         PL112-AP
abuse-c:        AU99-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-UNICOM
mnt-routes:     MAINT-HK-UNICOM
mnt-irt:        IRT-UNICOM-HK
last-modified:  2020-05-27T00:44:03Z
source:         APNIC

irt:            IRT-UNICOM-HK
address:        28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
e-mail:         wongnicholas@chinaunicom.cn
abuse-mailbox:  hk-abuse@chinaunicom.cn
admin-c:        NW165-AP
tech-c:         NW165-AP
auth:           # Filtered
remarks:        wongnicholas@chinaunicom.cn
remarks:        wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks:        hk-abuse@chinaunicom.cn was validated on 2026-03-26
mnt-by:         MAINT-HK-UNICOM
last-modified:  2026-03-26T01:26:57Z
source:         APNIC

organisation:   ORG-CUKO1-AP
org-name:       China Unicom (Hong Kong) Operations Limited
org-type:       LIR
country:        HK
address:        28F, Tower 1, The gateway
address:        25 Canton Road
address:        Tsim Sha Tsui
phone:          +852-26268766
fax-no:         +852-26268844
e-mail:         wongnicholas@chinaunicom.cn
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:48Z
source:         APNIC

role:           ABUSE UNICOMHK
country:        ZZ
address:        28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
phone:          +000000000
e-mail:         wongnicholas@chinaunicom.cn
admin-c:        NW165-AP
tech-c:         NW165-AP
nic-hdl:        AU99-AP
remarks:        Generated from irt object IRT-UNICOM-HK
remarks:        wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks:        hk-abuse@chinaunicom.cn was validated on 2026-03-26
abuse-mailbox:  hk-abuse@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-26T01:27:32Z
source:         APNIC

person:         Phoebe Lo
address:        Unit 1507, Two Harbourfront, 22 Tak Fung St,
address:        Hunghom, Kowloon, Hong Kong
country:        HK
phone:          +852-2621-3868
fax-no:         +852-2621-3362
e-mail:         phoebe@chinabig.com
nic-hdl:        PL112-AP
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:29:15Z
source:         APNIC

% Information related to '203.160.68.0/24AS10099'

route:          203.160.68.0/24
descr:          China Unicom APAC
origin:         AS10099
mnt-by:         MAINT-HK-UNICOM
last-modified:  2014-11-14T08:25:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.160.68.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.160.68.79.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:07:47 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 79.68.160.203.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 203.160.68.79.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
27.17.3.90 attackspambots
2020-07-04T05:38:33.466144abusebot-2.cloudsearch.cf sshd[13715]: Invalid user ram from 27.17.3.90 port 2596
2020-07-04T05:38:33.473208abusebot-2.cloudsearch.cf sshd[13715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.17.3.90
2020-07-04T05:38:33.466144abusebot-2.cloudsearch.cf sshd[13715]: Invalid user ram from 27.17.3.90 port 2596
2020-07-04T05:38:35.881719abusebot-2.cloudsearch.cf sshd[13715]: Failed password for invalid user ram from 27.17.3.90 port 2596 ssh2
2020-07-04T05:43:26.346306abusebot-2.cloudsearch.cf sshd[13720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.17.3.90  user=root
2020-07-04T05:43:27.978787abusebot-2.cloudsearch.cf sshd[13720]: Failed password for root from 27.17.3.90 port 21676 ssh2
2020-07-04T05:48:11.373383abusebot-2.cloudsearch.cf sshd[13769]: Invalid user cameron from 27.17.3.90 port 40472
...
2020-07-04 14:44:18
223.240.86.204 attack
Jul  3 20:42:11 ny01 sshd[16681]: Failed password for root from 223.240.86.204 port 54403 ssh2
Jul  3 20:45:20 ny01 sshd[17098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.86.204
Jul  3 20:45:22 ny01 sshd[17098]: Failed password for invalid user guest from 223.240.86.204 port 50376 ssh2
2020-07-04 14:50:13
62.234.127.234 attackspambots
SSH brute force
2020-07-04 14:30:10
210.13.96.74 attackspam
(sshd) Failed SSH login from 210.13.96.74 (CN/China/-): 5 in the last 3600 secs
2020-07-04 14:52:57
222.186.175.183 attackbotsspam
Jul  4 07:54:37 rocket sshd[26540]: Failed password for root from 222.186.175.183 port 48284 ssh2
Jul  4 07:54:41 rocket sshd[26540]: Failed password for root from 222.186.175.183 port 48284 ssh2
Jul  4 07:54:44 rocket sshd[26540]: Failed password for root from 222.186.175.183 port 48284 ssh2
...
2020-07-04 15:04:37
23.108.65.85 attackbots
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 23.108.65.85, Wednesday, July 01, 2020 02:07:56
2020-07-04 14:54:05
106.13.37.213 attack
Bruteforce detected by fail2ban
2020-07-04 14:28:26
177.136.39.254 attackbotsspam
Jul  4 06:11:35 web-main sshd[199405]: Failed password for invalid user csczserver from 177.136.39.254 port 43463 ssh2
Jul  4 06:18:31 web-main sshd[199488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.136.39.254  user=root
Jul  4 06:18:34 web-main sshd[199488]: Failed password for root from 177.136.39.254 port 51630 ssh2
2020-07-04 14:35:56
255.255.255.234 attackbots
enjoy your next Scottish Irish welsh civil war with black lives matters CC/DD/EE/FF/GG - reversed time zones USA NEAR SCOTLAND -NICE FLYING USA NEAR SCOTLAND LONDON -NEW UNI -NEW AGE -  CHECK BEFORE EMPLOYING -TV MAC SKY AND MAC BBC -WINDY MILLAR OR MILLER - usually blue/red/green from across ENGLAND EDUCATED 123/JUMPING ON THE BAND WAGON MEDIA MACKENZIE - ENGLISH MAC KENZIE -NEAR LONDON/MANCHESTER NEWS AND SPYING ON THE UK ESPECIALLY English English -English educated Mackenzie bad -racist bigoted still fathers and daughters
2020-07-04 15:01:30
60.249.82.121 attackspam
$f2bV_matches
2020-07-04 14:43:01
46.38.150.94 attack
2020-07-04 06:21:00 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=leader@mail.csmailer.org)
2020-07-04 06:21:32 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=revoke@mail.csmailer.org)
2020-07-04 06:22:03 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=helpme@mail.csmailer.org)
2020-07-04 06:22:35 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=production-pdp@mail.csmailer.org)
2020-07-04 06:23:07 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=robyn@mail.csmailer.org)
...
2020-07-04 14:28:06
51.75.30.238 attackbotsspam
k+ssh-bruteforce
2020-07-04 14:49:44
5.180.187.112 attackbotsspam
Jul  4 04:23:50 journals sshd\[75155\]: Invalid user ftp03 from 5.180.187.112
Jul  4 04:23:50 journals sshd\[75155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.180.187.112
Jul  4 04:23:52 journals sshd\[75155\]: Failed password for invalid user ftp03 from 5.180.187.112 port 35890 ssh2
Jul  4 04:27:26 journals sshd\[75450\]: Invalid user admin from 5.180.187.112
Jul  4 04:27:26 journals sshd\[75450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.180.187.112
...
2020-07-04 15:04:51
106.75.60.142 attack
Invalid user wxm from 106.75.60.142 port 54438
2020-07-04 15:08:02
159.203.72.42 attackbotsspam
$f2bV_matches
2020-07-04 14:53:47

Recently Reported IPs

2606:4700:10::6816:2853 203.160.68.9 134.8.20.222 38.158.156.54
77.83.39.42 10.229.126.182 101.37.118.183 40.124.175.174
2606:4700:10::6814:8842 2606:4700:10::6816:2184 2606:4700:10::6816:3384 2606:4700:10::6814:8611
2606:4700:10::6814:9090 2606:4700:10::6814:7163 2606:4700:10::6816:224 2606:4700:10::6814:4560
2606:4700:10::6814:9160 148.72.33.109 154.36.167.92 61.171.235.22