Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.225.196.0 - 43.225.196.255'

% Abuse contact for '43.225.196.0 - 43.225.196.255' is 'abuse@dataplugs.com'

inetnum:        43.225.196.0 - 43.225.196.255
netname:        NETSEC
descr:          NETSEC
country:        US
admin-c:        NN541-AP
tech-c:         NN541-AP
abuse-c:        AD748-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-DATAPLUGS-HK
mnt-irt:        IRT-DATAPLUGS-HK
last-modified:  2025-09-09T04:58:50Z
source:         APNIC

irt:            IRT-DATAPLUGS-HK
address:        Unit 8, 26/F, Billion Plaza,, 8 Cheung Yue St, Cheung Sha Wan,, Kowloon, Hong Kong
e-mail:         abuse@dataplugs.com
abuse-mailbox:  abuse@dataplugs.com
admin-c:        DLA5-AP
tech-c:         DLA5-AP
auth:           # Filtered
remarks:        abuse@dataplugs.com was validated on 2026-02-04
mnt-by:         MAINT-DATAPLUGS-HK
last-modified:  2026-02-04T01:19:20Z
source:         APNIC

role:           ABUSE DATAPLUGSHK
country:        ZZ
address:        Unit 8, 26/F, Billion Plaza,, 8 Cheung Yue St, Cheung Sha Wan,, Kowloon, Hong Kong
phone:          +000000000
e-mail:         abuse@dataplugs.com
admin-c:        DLA5-AP
tech-c:         DLA5-AP
nic-hdl:        AD748-AP
remarks:        Generated from irt object IRT-DATAPLUGS-HK
remarks:        abuse@dataplugs.com was validated on 2026-02-04
abuse-mailbox:  abuse@dataplugs.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-04T01:19:34Z
source:         APNIC

role:           NETSEC NOC
address:        Suite 1007, 10/F, The Bay Hub, 17 Kai Cheung Rd, Kowloon Bay
country:        HK
phone:          +85227511100
e-mail:         noc@netsec.com
admin-c:        NN541-AP
tech-c:         NN541-AP
nic-hdl:        NN541-AP
mnt-by:         MAINT-NETSEC-HK
last-modified:  2025-03-14T05:55:40Z
source:         APNIC

% Information related to '43.225.196.0/24AS45753'

route:          43.225.196.0/24
origin:         AS45753
descr:          Dataplugs Limited
                Unit 8, 26/F, Billion Plaza,
                8 Cheung Yue St, Cheung Sha Wan,
                Kowloon
mnt-by:         MAINT-DATAPLUGS-HK
last-modified:  2021-10-19T04:32:28Z
source:         APNIC

% Information related to '43.225.196.0/24AS963'

route:          43.225.196.0/24
origin:         AS963
descr:          Dataplugs Limited
                Unit 8, 26/F, Billion Plaza,
                8 Cheung Yue St, Cheung Sha Wan,
                Kowloon
mnt-by:         MAINT-DATAPLUGS-HK
last-modified:  2025-04-01T07:08:10Z
source:         APNIC

% Information related to '43.225.196.0/24AS9744'

route:          43.225.196.0/24
origin:         AS9744
descr:          Dataplugs Limited
                Unit 8, 26/F, Billion Plaza,
                8 Cheung Yue St, Cheung Sha Wan,
                Kowloon
mnt-by:         MAINT-DATAPLUGS-HK
last-modified:  2021-11-05T06:35:38Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.225.196.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.225.196.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030300 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 21:01:01 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 6.196.225.43.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 43.225.196.6.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.59.139.99 attack
Oct 13 14:38:20 rocket sshd[9249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.139.99
Oct 13 14:38:22 rocket sshd[9249]: Failed password for invalid user yvonne from 185.59.139.99 port 40444 ssh2
...
2020-10-13 22:01:18
61.177.172.107 attackbotsspam
Oct 13 13:43:50 django-0 sshd[821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.107  user=root
Oct 13 13:43:52 django-0 sshd[821]: Failed password for root from 61.177.172.107 port 42098 ssh2
...
2020-10-13 21:42:56
118.24.211.170 attack
Oct 13 14:07:21 serwer sshd\[21257\]: Invalid user victoras from 118.24.211.170 port 40370
Oct 13 14:07:21 serwer sshd\[21257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.211.170
Oct 13 14:07:23 serwer sshd\[21257\]: Failed password for invalid user victoras from 118.24.211.170 port 40370 ssh2
...
2020-10-13 22:24:20
113.107.166.9 attack
Port scan denied
2020-10-13 22:20:10
170.106.37.30 attackbotsspam
Oct 13 15:18:00 sso sshd[3031]: Failed password for root from 170.106.37.30 port 51692 ssh2
Oct 13 15:28:24 sso sshd[4563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.37.30
...
2020-10-13 22:25:05
194.152.206.93 attackspam
Oct 13 01:35:59 pixelmemory sshd[767716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93 
Oct 13 01:35:59 pixelmemory sshd[767716]: Invalid user rb from 194.152.206.93 port 55010
Oct 13 01:36:01 pixelmemory sshd[767716]: Failed password for invalid user rb from 194.152.206.93 port 55010 ssh2
Oct 13 01:43:25 pixelmemory sshd[816138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93  user=root
Oct 13 01:43:27 pixelmemory sshd[816138]: Failed password for root from 194.152.206.93 port 57685 ssh2
...
2020-10-13 22:19:38
120.53.223.186 attack
SSH_scan
2020-10-13 22:07:29
122.51.64.150 attack
Oct 13 13:52:35 host1 sshd[99615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.150  user=root
Oct 13 13:52:37 host1 sshd[99615]: Failed password for root from 122.51.64.150 port 55504 ssh2
Oct 13 13:55:21 host1 sshd[99776]: Invalid user laurentiu from 122.51.64.150 port 38758
Oct 13 13:55:21 host1 sshd[99776]: Invalid user laurentiu from 122.51.64.150 port 38758
...
2020-10-13 22:29:20
180.76.181.152 attack
$f2bV_matches
2020-10-13 21:55:56
122.194.229.59 attack
Oct 13 16:27:15 abendstille sshd\[3206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59  user=root
Oct 13 16:27:17 abendstille sshd\[3206\]: Failed password for root from 122.194.229.59 port 64124 ssh2
Oct 13 16:27:18 abendstille sshd\[3226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59  user=root
Oct 13 16:27:20 abendstille sshd\[3226\]: Failed password for root from 122.194.229.59 port 61052 ssh2
Oct 13 16:27:21 abendstille sshd\[3206\]: Failed password for root from 122.194.229.59 port 64124 ssh2
...
2020-10-13 22:28:54
102.114.15.254 attackbots
Port scan denied
2020-10-13 21:54:49
203.190.55.213 attackspam
Invalid user keshi from 203.190.55.213 port 52132
2020-10-13 22:28:12
106.54.191.247 attackbots
Oct 13 14:27:24 sip sshd[1925034]: Failed password for invalid user oracle from 106.54.191.247 port 56054 ssh2
Oct 13 14:32:42 sip sshd[1925087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247  user=root
Oct 13 14:32:44 sip sshd[1925087]: Failed password for root from 106.54.191.247 port 55364 ssh2
...
2020-10-13 21:38:41
61.2.14.242 attack
20/10/12@17:14:18: FAIL: Alarm-Network address from=61.2.14.242
20/10/12@17:14:18: FAIL: Alarm-Network address from=61.2.14.242
...
2020-10-13 22:10:41
61.132.52.35 attackspambots
Oct 13 14:52:48 host1 sshd[105048]: Invalid user cornelia from 61.132.52.35 port 36638
Oct 13 14:52:50 host1 sshd[105048]: Failed password for invalid user cornelia from 61.132.52.35 port 36638 ssh2
Oct 13 14:52:48 host1 sshd[105048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.52.35 
Oct 13 14:52:48 host1 sshd[105048]: Invalid user cornelia from 61.132.52.35 port 36638
Oct 13 14:52:50 host1 sshd[105048]: Failed password for invalid user cornelia from 61.132.52.35 port 36638 ssh2
...
2020-10-13 22:13:11

Recently Reported IPs

85.11.182.27 209.38.83.239 176.65.149.235 78.47.3.119
2606:4700:10::ac43:1389 2606:4700:10::6814:8036 2606:4700:10::6816:78 2606:4700:10::6814:6052
2606:4700:10::ac43:2859 2606:4700:10::6814:5913 2606:4700:10::6816:3298 2606:4700:10::6814:8061
159.65.148.36 2606:4700:10::6816:1509 2606:4700:10::6816:1698 2606:4700:10::6814:6091
2606:4700:10::6816:2826 2606:4700:10::6814:4478 2606:4700:10::6816:2426 2606:4700:10::ac43:2397