City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '203.160.64.0 - 203.160.95.255'
% Abuse contact for '203.160.64.0 - 203.160.95.255' is 'hk-abuse@chinaunicom.cn'
inetnum: 203.160.64.0 - 203.160.95.255
netname: UNICOM-HK
descr: China Unicom (Hong Kong) Operations Limited
country: HK
org: ORG-CUKO1-AP
admin-c: PL112-AP
tech-c: PL112-AP
abuse-c: AU99-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-HK-UNICOM
mnt-routes: MAINT-HK-UNICOM
mnt-irt: IRT-UNICOM-HK
last-modified: 2020-05-27T00:44:03Z
source: APNIC
irt: IRT-UNICOM-HK
address: 28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
e-mail: wongnicholas@chinaunicom.cn
abuse-mailbox: hk-abuse@chinaunicom.cn
admin-c: NW165-AP
tech-c: NW165-AP
auth: # Filtered
remarks: wongnicholas@chinaunicom.cn
remarks: wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks: hk-abuse@chinaunicom.cn was validated on 2026-03-26
mnt-by: MAINT-HK-UNICOM
last-modified: 2026-03-26T01:26:57Z
source: APNIC
organisation: ORG-CUKO1-AP
org-name: China Unicom (Hong Kong) Operations Limited
org-type: LIR
country: HK
address: 28F, Tower 1, The gateway
address: 25 Canton Road
address: Tsim Sha Tsui
phone: +852-26268766
fax-no: +852-26268844
e-mail: wongnicholas@chinaunicom.cn
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:48Z
source: APNIC
role: ABUSE UNICOMHK
country: ZZ
address: 28/F, Tower 1, The gateway, 25 Canton road, TST, Hong Kong
phone: +000000000
e-mail: wongnicholas@chinaunicom.cn
admin-c: NW165-AP
tech-c: NW165-AP
nic-hdl: AU99-AP
remarks: Generated from irt object IRT-UNICOM-HK
remarks: wongnicholas@chinaunicom.cn was validated on 2026-02-04
remarks: hk-abuse@chinaunicom.cn was validated on 2026-03-26
abuse-mailbox: hk-abuse@chinaunicom.cn
mnt-by: APNIC-ABUSE
last-modified: 2026-03-26T01:27:32Z
source: APNIC
person: Phoebe Lo
address: Unit 1507, Two Harbourfront, 22 Tak Fung St,
address: Hunghom, Kowloon, Hong Kong
country: HK
phone: +852-2621-3868
fax-no: +852-2621-3362
e-mail: phoebe@chinabig.com
nic-hdl: PL112-AP
mnt-by: MAINT-NEW
last-modified: 2008-09-04T07:29:15Z
source: APNIC
% Information related to '203.160.68.0/24AS10099'
route: 203.160.68.0/24
descr: China Unicom APAC
origin: AS10099
mnt-by: MAINT-HK-UNICOM
last-modified: 2014-11-14T08:25:21Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.160.68.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.160.68.9. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:08:05 CST 2026
;; MSG SIZE rcvd: 105
Host 9.68.160.203.in-addr.arpa not found: 2(SERVFAIL)
server can't find 203.160.68.9.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 87.251.74.124 | attack | May 28 23:27:34 debian-2gb-nbg1-2 kernel: \[12960042.377844\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.124 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=37847 PROTO=TCP SPT=47437 DPT=10929 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-29 05:53:46 |
| 167.172.128.22 | attackbotsspam | Unauthorized connection attempt detected from IP address 167.172.128.22 to port 22 [T] |
2020-05-29 05:37:46 |
| 49.232.51.60 | attackbotsspam | 2020-05-28T21:32:30.401569shield sshd\[15320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60 user=root 2020-05-28T21:32:32.157863shield sshd\[15320\]: Failed password for root from 49.232.51.60 port 33254 ssh2 2020-05-28T21:35:52.281894shield sshd\[15783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60 user=root 2020-05-28T21:35:54.769865shield sshd\[15783\]: Failed password for root from 49.232.51.60 port 56394 ssh2 2020-05-28T21:39:23.703966shield sshd\[16633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60 user=root |
2020-05-29 05:40:29 |
| 61.177.172.128 | attack | May 28 23:36:54 vmd48417 sshd[26511]: Failed password for root from 61.177.172.128 port 20114 ssh2 |
2020-05-29 05:37:17 |
| 180.250.247.45 | attack | May 28 23:11:55 OPSO sshd\[971\]: Invalid user 123456 from 180.250.247.45 port 59016 May 28 23:11:55 OPSO sshd\[971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45 May 28 23:11:57 OPSO sshd\[971\]: Failed password for invalid user 123456 from 180.250.247.45 port 59016 ssh2 May 28 23:16:13 OPSO sshd\[1726\]: Invalid user 121180 from 180.250.247.45 port 33454 May 28 23:16:13 OPSO sshd\[1726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45 |
2020-05-29 05:50:55 |
| 115.193.183.137 | attackspam | May 27 19:40:39 mxgate1 sshd[19146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.193.183.137 user=r.r May 27 19:40:41 mxgate1 sshd[19146]: Failed password for r.r from 115.193.183.137 port 52602 ssh2 May 27 19:40:41 mxgate1 sshd[19146]: Received disconnect from 115.193.183.137 port 52602:11: Bye Bye [preauth] May 27 19:40:41 mxgate1 sshd[19146]: Disconnected from 115.193.183.137 port 52602 [preauth] May 27 19:43:27 mxgate1 sshd[19206]: Invalid user ghostname from 115.193.183.137 port 39702 May 27 19:43:27 mxgate1 sshd[19206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.193.183.137 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=115.193.183.137 |
2020-05-29 05:58:28 |
| 116.52.2.62 | attackbotsspam | nft/Honeypot/22/73e86 |
2020-05-29 05:49:45 |
| 37.59.232.6 | attackbots | 2020-05-28T23:27:57.146351lavrinenko.info sshd[17256]: Failed password for root from 37.59.232.6 port 46948 ssh2 2020-05-28T23:31:05.997089lavrinenko.info sshd[17400]: Invalid user iimura from 37.59.232.6 port 50750 2020-05-28T23:31:06.009058lavrinenko.info sshd[17400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.232.6 2020-05-28T23:31:05.997089lavrinenko.info sshd[17400]: Invalid user iimura from 37.59.232.6 port 50750 2020-05-28T23:31:08.016774lavrinenko.info sshd[17400]: Failed password for invalid user iimura from 37.59.232.6 port 50750 ssh2 ... |
2020-05-29 05:51:14 |
| 203.57.227.58 | attackbotsspam | Invalid user charles from 203.57.227.58 port 38476 |
2020-05-29 05:48:45 |
| 200.108.139.242 | attack | May 28 22:03:47 santamaria sshd\[25413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242 user=root May 28 22:03:49 santamaria sshd\[25413\]: Failed password for root from 200.108.139.242 port 39514 ssh2 May 28 22:08:15 santamaria sshd\[25459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242 user=root ... |
2020-05-29 06:12:47 |
| 176.228.56.53 | attackbots | Honeypot attack, port: 5555, PTR: 176-228-56-53.orange.net.il. |
2020-05-29 06:04:40 |
| 112.85.42.188 | attack | 05/28/2020-17:59:03.075045 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-05-29 06:01:31 |
| 61.133.232.253 | attackspambots | Brute-force attempt banned |
2020-05-29 05:39:50 |
| 222.186.30.76 | attackbotsspam | Fail2Ban Ban Triggered |
2020-05-29 05:54:24 |
| 45.141.156.181 | attackbotsspam | Invalid user chuck from 45.141.156.181 port 46590 |
2020-05-29 05:48:14 |