Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.160.64.0 - 203.160.95.255'

% Abuse contact for '203.160.64.0 - 203.160.95.255' is 'hk-abuse@chinaunicom.cn'

inetnum:        203.160.64.0 - 203.160.95.255
netname:        UNICOM-HK
descr:          China Unicom (Hong Kong) Operations Limited
country:        HK
org:            ORG-CUKO1-AP
admin-c:        PL112-AP
tech-c:         PL112-AP
abuse-c:        AU99-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HK-UNICOM
mnt-routes:     MAINT-HK-UNICOM
mnt-irt:        IRT-UNICOM-HK
last-modified:  2020-05-27T00:44:03Z
source:         APNIC

irt:            IRT-UNICOM-HK
address:        28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
e-mail:         wongnicholas@chinaunicom.cn
abuse-mailbox:  hk-abuse@chinaunicom.cn
admin-c:        NW165-AP
tech-c:         NW165-AP
auth:           # Filtered
remarks:        wongnicholas@chinaunicom.cn
remarks:        wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks:        hk-abuse@chinaunicom.cn was validated on 2026-03-26
mnt-by:         MAINT-HK-UNICOM
last-modified:  2026-03-26T01:26:57Z
source:         APNIC

organisation:   ORG-CUKO1-AP
org-name:       China Unicom (Hong Kong) Operations Limited
org-type:       LIR
country:        HK
address:        28F, Tower 1, The gateway
address:        25 Canton Road
address:        Tsim Sha Tsui
phone:          +852-26268766
fax-no:         +852-26268844
e-mail:         wongnicholas@chinaunicom.cn
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:48Z
source:         APNIC

role:           ABUSE UNICOMHK
country:        ZZ
address:        28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
phone:          +000000000
e-mail:         wongnicholas@chinaunicom.cn
admin-c:        NW165-AP
tech-c:         NW165-AP
nic-hdl:        AU99-AP
remarks:        Generated from irt object IRT-UNICOM-HK
remarks:        wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks:        hk-abuse@chinaunicom.cn was validated on 2026-03-26
abuse-mailbox:  hk-abuse@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-26T01:27:32Z
source:         APNIC

person:         Phoebe Lo
address:        Unit 1507, Two Harbourfront, 22 Tak Fung St,
address:        Hunghom, Kowloon, Hong Kong
country:        HK
phone:          +852-2621-3868
fax-no:         +852-2621-3362
e-mail:         phoebe@chinabig.com
nic-hdl:        PL112-AP
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:29:15Z
source:         APNIC

% Information related to '203.160.68.0/24AS10099'

route:          203.160.68.0/24
descr:          China Unicom APAC
origin:         AS10099
mnt-by:         MAINT-HK-UNICOM
last-modified:  2014-11-14T08:25:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.160.68.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.160.68.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:08:05 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 9.68.160.203.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 203.160.68.9.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
87.251.74.124 attack
May 28 23:27:34 debian-2gb-nbg1-2 kernel: \[12960042.377844\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.124 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=37847 PROTO=TCP SPT=47437 DPT=10929 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-29 05:53:46
167.172.128.22 attackbotsspam
Unauthorized connection attempt detected from IP address 167.172.128.22 to port 22 [T]
2020-05-29 05:37:46
49.232.51.60 attackbotsspam
2020-05-28T21:32:30.401569shield sshd\[15320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60  user=root
2020-05-28T21:32:32.157863shield sshd\[15320\]: Failed password for root from 49.232.51.60 port 33254 ssh2
2020-05-28T21:35:52.281894shield sshd\[15783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60  user=root
2020-05-28T21:35:54.769865shield sshd\[15783\]: Failed password for root from 49.232.51.60 port 56394 ssh2
2020-05-28T21:39:23.703966shield sshd\[16633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60  user=root
2020-05-29 05:40:29
61.177.172.128 attack
May 28 23:36:54 vmd48417 sshd[26511]: Failed password for root from 61.177.172.128 port 20114 ssh2
2020-05-29 05:37:17
180.250.247.45 attack
May 28 23:11:55 OPSO sshd\[971\]: Invalid user 123456 from 180.250.247.45 port 59016
May 28 23:11:55 OPSO sshd\[971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
May 28 23:11:57 OPSO sshd\[971\]: Failed password for invalid user 123456 from 180.250.247.45 port 59016 ssh2
May 28 23:16:13 OPSO sshd\[1726\]: Invalid user 121180 from 180.250.247.45 port 33454
May 28 23:16:13 OPSO sshd\[1726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
2020-05-29 05:50:55
115.193.183.137 attackspam
May 27 19:40:39 mxgate1 sshd[19146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.193.183.137  user=r.r
May 27 19:40:41 mxgate1 sshd[19146]: Failed password for r.r from 115.193.183.137 port 52602 ssh2
May 27 19:40:41 mxgate1 sshd[19146]: Received disconnect from 115.193.183.137 port 52602:11: Bye Bye [preauth]
May 27 19:40:41 mxgate1 sshd[19146]: Disconnected from 115.193.183.137 port 52602 [preauth]
May 27 19:43:27 mxgate1 sshd[19206]: Invalid user ghostname from 115.193.183.137 port 39702
May 27 19:43:27 mxgate1 sshd[19206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.193.183.137


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.193.183.137
2020-05-29 05:58:28
116.52.2.62 attackbotsspam
nft/Honeypot/22/73e86
2020-05-29 05:49:45
37.59.232.6 attackbots
2020-05-28T23:27:57.146351lavrinenko.info sshd[17256]: Failed password for root from 37.59.232.6 port 46948 ssh2
2020-05-28T23:31:05.997089lavrinenko.info sshd[17400]: Invalid user iimura from 37.59.232.6 port 50750
2020-05-28T23:31:06.009058lavrinenko.info sshd[17400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.232.6
2020-05-28T23:31:05.997089lavrinenko.info sshd[17400]: Invalid user iimura from 37.59.232.6 port 50750
2020-05-28T23:31:08.016774lavrinenko.info sshd[17400]: Failed password for invalid user iimura from 37.59.232.6 port 50750 ssh2
...
2020-05-29 05:51:14
203.57.227.58 attackbotsspam
Invalid user charles from 203.57.227.58 port 38476
2020-05-29 05:48:45
200.108.139.242 attack
May 28 22:03:47 santamaria sshd\[25413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242  user=root
May 28 22:03:49 santamaria sshd\[25413\]: Failed password for root from 200.108.139.242 port 39514 ssh2
May 28 22:08:15 santamaria sshd\[25459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242  user=root
...
2020-05-29 06:12:47
176.228.56.53 attackbots
Honeypot attack, port: 5555, PTR: 176-228-56-53.orange.net.il.
2020-05-29 06:04:40
112.85.42.188 attack
05/28/2020-17:59:03.075045 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-29 06:01:31
61.133.232.253 attackspambots
Brute-force attempt banned
2020-05-29 05:39:50
222.186.30.76 attackbotsspam
Fail2Ban Ban Triggered
2020-05-29 05:54:24
45.141.156.181 attackbotsspam
Invalid user chuck from 45.141.156.181 port 46590
2020-05-29 05:48:14

Recently Reported IPs

203.160.68.79 134.8.20.222 38.158.156.54 77.83.39.42
10.229.126.182 101.37.118.183 40.124.175.174 2606:4700:10::6814:8842
2606:4700:10::6816:2184 2606:4700:10::6816:3384 2606:4700:10::6814:8611 2606:4700:10::6814:9090
2606:4700:10::6814:7163 2606:4700:10::6816:224 2606:4700:10::6814:4560 2606:4700:10::6814:9160
148.72.33.109 154.36.167.92 61.171.235.22 3.239.1.167