Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '223.123.64.0 - 223.123.127.255'

% Abuse contact for '223.123.64.0 - 223.123.127.255' is 'complaint.ip@zong.com.pk'

inetnum:        223.123.64.0 - 223.123.127.255
netname:        CMPak-Mobile-Fixed-Network
descr:          CMPak Public IPs
country:        PK
admin-c:        CLA8-AP
tech-c:         CLA8-AP
abuse-c:        AC1719-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-CMPAKLIMITED-PK
mnt-irt:        IRT-CMPAKLIMITED-PK
last-modified:  2025-10-23T09:05:14Z
source:         APNIC

irt:            IRT-CMPAKLIMITED-PK
address:        Plot
address:        Islamabad, Pakistan
e-mail:         complaint.ip@zong.com.pk
abuse-mailbox:  complaint.ip@zong.com.pk
admin-c:        ST1251-AP
tech-c:         ST1251-AP
auth:           # Filtered
remarks:        complaint.ip@zong.com.pk was validated on 2026-04-20
mnt-by:         MAINT-CMPAKLIMITED-PK
last-modified:  2026-04-20T17:47:26Z
source:         APNIC

role:           ABUSE CMPAKLIMITEDPK
country:        ZZ
address:        Plot
address:        Islamabad, Pakistan
phone:          +000000000
e-mail:         complaint.ip@zong.com.pk
admin-c:        ST1251-AP
tech-c:         ST1251-AP
nic-hdl:        AC1719-AP
remarks:        Generated from irt object IRT-CMPAKLIMITED-PK
remarks:        complaint.ip@zong.com.pk was validated on 2026-04-20
abuse-mailbox:  complaint.ip@zong.com.pk
mnt-by:         APNIC-ABUSE
last-modified:  2026-04-20T17:48:01Z
source:         APNIC

role:           CMPak Limited administrator
address:        Plot# 47, National Park Kuri Road, Chak Shehzad
address:        Islamabad, Pakistan
country:        PK
phone:          +9251111222111
fax-no:         +92518350356
e-mail:         complaint.ip@zong.com.pk
admin-c:        ST1251-AP
tech-c:         ST1251-AP
nic-hdl:        CLA8-AP
mnt-by:         MAINT-CMPAKLIMITED-PK
last-modified:  2019-07-22T07:46:07Z
source:         APNIC

% Information related to '223.123.125.0/24AS138423'

route:          223.123.125.0/24
origin:         AS138423
descr:          CMPak Limited
                Block A, Plot No. 47, Park Road, Kurri Road, Chak Shehzad
mnt-by:         MAINT-CMPAKLIMITED-PK
last-modified:  2024-10-01T06:14:03Z
source:         APNIC

% Information related to '223.123.125.0/24AS59257'

route:          223.123.125.0/24
origin:         AS59257
descr:          CMPak Limited
                Block A, Plot No. 47, Park Road, Kurri Road, Chak Shehzad
mnt-by:         MAINT-CMPAKLIMITED-PK
last-modified:  2023-01-13T03:19:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.123.125.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.123.125.15.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 12:00:49 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 15.125.123.223.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 15.125.123.223.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.123.190.234 attackbots
Apr 29 22:12:07 ms-srv sshd[15003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.123.190.234
Apr 29 22:12:08 ms-srv sshd[15003]: Failed password for invalid user localadmin from 213.123.190.234 port 56097 ssh2
2020-03-09 01:14:10
120.70.102.16 attackspambots
Mar  8 14:01:15 ovpn sshd\[10928\]: Invalid user rr from 120.70.102.16
Mar  8 14:01:15 ovpn sshd\[10928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.102.16
Mar  8 14:01:17 ovpn sshd\[10928\]: Failed password for invalid user rr from 120.70.102.16 port 40972 ssh2
Mar  8 14:16:32 ovpn sshd\[14700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.102.16  user=root
Mar  8 14:16:35 ovpn sshd\[14700\]: Failed password for root from 120.70.102.16 port 59285 ssh2
2020-03-09 01:13:17
213.109.163.15 attackbotsspam
May 14 20:57:12 ms-srv sshd[62384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.109.163.15
May 14 20:57:14 ms-srv sshd[62384]: Failed password for invalid user ts3bot from 213.109.163.15 port 46904 ssh2
2020-03-09 01:18:20
213.14.214.203 attackbots
Sep 16 19:19:18 ms-srv sshd[8047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.14.214.203
Sep 16 19:19:20 ms-srv sshd[8047]: Failed password for invalid user toor from 213.14.214.203 port 35098 ssh2
2020-03-09 00:58:53
118.96.115.11 attackbotsspam
Automatic report - Port Scan Attack
2020-03-09 01:37:22
223.149.52.29 attack
Automatic report - Port Scan Attack
2020-03-09 01:10:58
212.73.44.9 attackbotsspam
Aug 29 15:33:11 ms-srv sshd[3653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.73.44.9
Aug 29 15:33:13 ms-srv sshd[3653]: Failed password for invalid user user4 from 212.73.44.9 port 35321 ssh2
2020-03-09 01:36:17
222.186.175.150 attackspambots
Mar  8 19:15:39 ift sshd\[20004\]: Failed password for root from 222.186.175.150 port 64666 ssh2Mar  8 19:15:53 ift sshd\[20004\]: Failed password for root from 222.186.175.150 port 64666 ssh2Mar  8 19:15:58 ift sshd\[20008\]: Failed password for root from 222.186.175.150 port 6930 ssh2Mar  8 19:16:01 ift sshd\[20008\]: Failed password for root from 222.186.175.150 port 6930 ssh2Mar  8 19:16:05 ift sshd\[20008\]: Failed password for root from 222.186.175.150 port 6930 ssh2
...
2020-03-09 01:23:46
171.237.83.74 attack
Unauthorized connection attempt from IP address 171.237.83.74 on Port 445(SMB)
2020-03-09 01:42:14
189.113.185.127 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-09 01:26:23
213.136.64.251 attack
Dec  5 22:35:02 ms-srv sshd[57263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.64.251  user=root
Dec  5 22:35:04 ms-srv sshd[57263]: Failed password for invalid user root from 213.136.64.251 port 48314 ssh2
2020-03-09 01:07:42
179.240.116.195 attack
Honeypot attack, port: 445, PTR: 179-240-116-195.3g.claro.net.br.
2020-03-09 01:16:37
212.85.78.154 attackspam
Sep 25 11:07:19 ms-srv sshd[26389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.85.78.154
Sep 25 11:07:21 ms-srv sshd[26389]: Failed password for invalid user kasey from 212.85.78.154 port 35120 ssh2
2020-03-09 01:25:26
106.13.105.77 attackspambots
Mar  8 18:45:27 gw1 sshd[5817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
Mar  8 18:45:30 gw1 sshd[5817]: Failed password for invalid user trung from 106.13.105.77 port 33084 ssh2
...
2020-03-09 01:22:48
76.80.54.12 attack
Honeypot attack, port: 445, PTR: rrcs-76-80-54-12.west.biz.rr.com.
2020-03-09 01:19:50

Recently Reported IPs

165.227.97.192 20.63.33.98 109.162.251.218 2606:4700:10::6814:5555
2606:4700:10::6814:8814 2606:4700:10::6814:8641 47.95.206.162 185.180.141.37
185.180.141.40 185.180.141.38 110.77.226.87 2606:4700:10::6816:2231
2606:4700:10::6814:4790 2606:4700:10::ac43:1384 43.159.63.116 34.156.36.166
2606:4700:10::6814:8355 2606:4700:10::6814:9867 159.203.33.199 176.65.139.233