Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
63.140.103.215 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/63.140.103.215/ 
 
 US - 1H : (230)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7782 
 
 IP : 63.140.103.215 
 
 CIDR : 63.140.64.0/18 
 
 PREFIX COUNT : 33 
 
 UNIQUE IP COUNT : 161792 
 
 
 ATTACKS DETECTED ASN7782 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 3 
 
 DateTime : 2019-10-31 04:55:21 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 13:23:16
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       63.140.0.0 - 63.140.15.255
CIDR:           63.140.0.0/20
NetName:        APNIC
NetHandle:      NET-63-140-0-0-1
Parent:         NET63 (NET-63-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2017-10-31
Updated:        2017-10-31
Ref:            https://rdap.arin.net/registry/ip/63.140.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '63.140.1.0 - 63.140.1.255'

% Abuse contact for '63.140.1.0 - 63.140.1.255' is 'guohf@chinatelecomglobal.com'

inetnum:        63.140.1.0 - 63.140.1.255
netname:        CTGI-HK
descr:          China Telecom Global Limited
country:        HK
admin-c:        CTGL1-AP
tech-c:         CTGL1-AP
abuse-c:        AC2197-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-CTGL-HK
mnt-irt:        IRT-CTGL-HK
last-modified:  2023-10-20T06:15:19Z
source:         APNIC

irt:            IRT-CTGL-HK
address:        38/F., DAH SING Financial Center,
address:        108 Gloucester Road, Wan Chai,
address:        Hong Kong
e-mail:         guohf@chinatelecomglobal.com
abuse-mailbox:  guohf@chinatelecomglobal.com
admin-c:        CTGL1-AP
tech-c:         CTGL1-AP
auth:           # Filtered
remarks:        guohf@chinatelecomglobal.com was validated on 2025-12-18
notify:         marcok@chinatelecomglobal.com
mnt-by:         MAINT-CTGL-HK
last-modified:  2025-12-18T01:53:34Z
source:         APNIC

role:           ABUSE CTGLHK
country:        ZZ
address:        38/F., DAH SING Financial Center,
address:        108 Gloucester Road, Wan Chai,
address:        Hong Kong
phone:          +000000000
e-mail:         guohf@chinatelecomglobal.com
admin-c:        CTGL1-AP
tech-c:         CTGL1-AP
nic-hdl:        AC2197-AP
remarks:        Generated from irt object IRT-CTGL-HK
remarks:        guohf@chinatelecomglobal.com was validated on 2025-12-18
abuse-mailbox:  guohf@chinatelecomglobal.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-18T01:53:56Z
source:         APNIC

role:           CHINA TELECOM GLOBAL LIMITED  - network administrator
address:        38/F., DAH SING Financial Center,
address:        108 Gloucester Road, Wan Chai,
country:        HK
phone:          +852 31000000
e-mail:         noc@chinatelecomglobal.com
admin-c:        CTGL1-AP
tech-c:         CTGL1-AP
nic-hdl:        CTGL1-AP
mnt-by:         MAINT-CTGL-HK
last-modified:  2012-11-23T01:36:05Z
source:         APNIC

% Information related to '63.140.1.0/24AS63527'

route:          63.140.1.0/24
origin:         AS63527
descr:          China Telecom Global Limited
                38/F  DAH SING Financial Center
                108 Gloucester Road Wan Chai
mnt-by:         MAINT-CTGL-HK
last-modified:  2020-04-20T06:33:22Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.140.1.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;63.140.1.176.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031601 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 03:08:07 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 176.1.140.63.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 63.140.1.176.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
110.49.71.244 attackspam
Oct  1 23:32:39 localhost sshd[1967647]: Invalid user ftpuser from 110.49.71.244 port 57392
...
2020-10-02 00:06:19
150.95.27.32 attackspam
Oct  1 16:34:21 con01 sshd[2342788]: Failed password for invalid user csgoserver from 150.95.27.32 port 38452 ssh2
Oct  1 16:38:34 con01 sshd[2351679]: Invalid user wp from 150.95.27.32 port 41735
Oct  1 16:38:34 con01 sshd[2351679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.27.32 
Oct  1 16:38:34 con01 sshd[2351679]: Invalid user wp from 150.95.27.32 port 41735
Oct  1 16:38:36 con01 sshd[2351679]: Failed password for invalid user wp from 150.95.27.32 port 41735 ssh2
...
2020-10-02 00:07:22
182.126.87.22 attackspambots
Telnet Server BruteForce Attack
2020-10-01 23:43:54
190.90.251.227 attackbotsspam
Telnet Server BruteForce Attack
2020-10-01 23:40:18
5.188.84.119 attackspam
0,25-01/02 [bc01/m12] PostRequest-Spammer scoring: maputo01_x2b
2020-10-01 23:48:31
83.110.214.178 attack
2020-09-30 21:16:40 server sshd[64866]: Failed password for invalid user root from 83.110.214.178 port 13620 ssh2
2020-10-02 00:10:28
154.224.91.184 attack
Port Scan: TCP/443
2020-10-02 00:12:57
35.235.96.109 attackspam
35.235.96.109 - - [01/Oct/2020:16:42:26 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.235.96.109 - - [01/Oct/2020:16:42:28 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.235.96.109 - - [01/Oct/2020:16:42:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-01 23:55:55
102.176.81.99 attackbotsspam
Oct  1 16:50:39 vm1 sshd[14243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.81.99
Oct  1 16:50:40 vm1 sshd[14243]: Failed password for invalid user hduser from 102.176.81.99 port 48538 ssh2
...
2020-10-01 23:52:39
50.26.17.219 attack
Oct  1 20:24:42 itv-usvr-02 sshd[22714]: Invalid user rodrigo from 50.26.17.219 port 52830
Oct  1 20:24:42 itv-usvr-02 sshd[22714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.26.17.219
Oct  1 20:24:42 itv-usvr-02 sshd[22714]: Invalid user rodrigo from 50.26.17.219 port 52830
Oct  1 20:24:45 itv-usvr-02 sshd[22714]: Failed password for invalid user rodrigo from 50.26.17.219 port 52830 ssh2
Oct  1 20:30:06 itv-usvr-02 sshd[22867]: Invalid user user from 50.26.17.219 port 60880
2020-10-01 23:53:14
187.102.148.38 attack
Icarus honeypot on github
2020-10-01 23:48:52
213.141.131.22 attackspam
Invalid user system from 213.141.131.22 port 41158
2020-10-01 23:38:24
195.54.160.180 attack
Oct  1 15:19:50 staging sshd[168295]: Invalid user qwe123 from 195.54.160.180 port 22492
Oct  1 15:19:50 staging sshd[168295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 
Oct  1 15:19:50 staging sshd[168295]: Invalid user qwe123 from 195.54.160.180 port 22492
Oct  1 15:19:52 staging sshd[168295]: Failed password for invalid user qwe123 from 195.54.160.180 port 22492 ssh2
...
2020-10-01 23:32:19
195.154.176.37 attackspam
(sshd) Failed SSH login from 195.154.176.37 (FR/France/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 11:30:01 server4 sshd[17013]: Invalid user anita from 195.154.176.37
Oct  1 11:30:03 server4 sshd[17013]: Failed password for invalid user anita from 195.154.176.37 port 49496 ssh2
Oct  1 11:43:10 server4 sshd[23856]: Invalid user dev from 195.154.176.37
Oct  1 11:43:12 server4 sshd[23856]: Failed password for invalid user dev from 195.154.176.37 port 42438 ssh2
Oct  1 11:46:40 server4 sshd[25777]: Failed password for root from 195.154.176.37 port 50458 ssh2
2020-10-02 00:00:05
45.184.225.2 attackspambots
Invalid user user13 from 45.184.225.2 port 33764
2020-10-01 23:39:25

Recently Reported IPs

36.113.115.150 20.46.225.117 1.234.96.192 69.92.141.241
54.146.119.88 85.217.149.56 162.243.71.18 228.180.101.202
74.222.3.251 172.234.217.129 63.146.1.176 72.226.100.39
162.216.150.83 82.24.64.32 20.233.241.159 47.128.55.90
54.92.204.5 54.163.45.247 44.202.70.216 152.42.206.31