Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       8.208.0.0 - 8.223.255.255
CIDR:           8.208.0.0/12
NetName:        APNIC
NetHandle:      NET-8-208-0-0-1
Parent:         NET8 (NET-8-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2018-04-24
Updated:        2018-04-24
Ref:            https://rdap.arin.net/registry/ip/8.208.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '8.208.0.0 - 8.223.255.255'

% Abuse contact for '8.208.0.0 - 8.223.255.255' is 'abuse@alibaba-inc.com'

inetnum:        8.208.0.0 - 8.223.255.255
netname:        ASEPL-SG
descr:          Alibaba Cloud (Singapore) Private Limited
descr:          51 Bras Basah Road #03-06 Lazada One Singapore 189554, Singapore
country:        SG
org:            ORG-ASEP1-AP
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
abuse-c:        AA1926-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-ASEPL-SG
mnt-routes:     MAINT-ASEPL-SG
mnt-irt:        IRT-ASEPL-SG
last-modified:  2023-11-09T06:37:20Z
source:         APNIC

irt:            IRT-ASEPL-SG
address:        1 Raffles Place
e-mail:         abuse@alibaba-inc.com
abuse-mailbox:  abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
auth:           # Filtered
remarks:        abuse@alibaba-inc.com is invalid
mnt-by:         MAINT-ASEPL-SG
last-modified:  2025-11-18T00:30:30Z
source:         APNIC

organisation:   ORG-ASEP1-AP
org-name:       Alibaba Cloud (Singapore) Private Limited
org-type:       LIR
country:        SG
address:        51 Bras Basah Road # 03-06 Lazada One Singapore 189554
phone:          +8657185022088-76449
e-mail:         abuse@alibaba-inc.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-07-11T12:55:24Z
source:         APNIC

role:           ABUSE ASEPLSG
country:        ZZ
address:        1 Raffles Place
phone:          +000000000
e-mail:         abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
nic-hdl:        AA1926-AP
remarks:        Generated from irt object IRT-ASEPL-SG
remarks:        abuse@alibaba-inc.com is invalid
abuse-mailbox:  abuse@alibaba-inc.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-29T13:10:14Z
source:         APNIC

role:           Alibabacom Singapore E-Commerce Private Limited a
address:        1 Raffles Place #59-00 One Raffles Place, Tower One Singapore, Singapore
country:        SG
phone:          +86-571-85022088
fax-no:         +86-571-85022088
e-mail:         abuse@alibaba-inc.com
admin-c:        ASEP1-AP
tech-c:         ASEP1-AP
nic-hdl:        ASEP1-AP
mnt-by:         MAINT-ASEPL-SG
last-modified:  2025-07-01T06:25:24Z
source:         APNIC

% Information related to '8.218.121.0/24AS134963'

route:          8.218.121.0/24
origin:         AS134963
descr:          Alibaba.com Singapore E-Commerce Private Limited
                8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by:         MAINT-ASEPL-SG
last-modified:  2020-01-20T07:56:44Z
source:         APNIC

% Information related to '8.218.121.0/24AS45102'

route:          8.218.121.0/24
origin:         AS45102
descr:          Alibaba.com Singapore E-Commerce Private Limited
                8 Shenton Way, #45-01 AXA Tower, Singapore 068811
mnt-by:         MAINT-ASEPL-SG
last-modified:  2020-01-20T07:26:42Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.218.121.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.218.121.174.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 29 12:30:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 174.121.218.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.121.218.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.180.128.134 attack
SSH login attempts.
2020-01-01 18:03:41
208.81.163.110 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-01 18:26:59
138.197.222.141 attackspam
Jan  1 13:20:59 itv-usvr-02 sshd[2515]: Invalid user info from 138.197.222.141 port 47610
Jan  1 13:20:59 itv-usvr-02 sshd[2515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.222.141
Jan  1 13:20:59 itv-usvr-02 sshd[2515]: Invalid user info from 138.197.222.141 port 47610
Jan  1 13:21:02 itv-usvr-02 sshd[2515]: Failed password for invalid user info from 138.197.222.141 port 47610 ssh2
Jan  1 13:23:59 itv-usvr-02 sshd[2544]: Invalid user dbus from 138.197.222.141 port 51000
2020-01-01 18:12:02
212.64.88.97 attackspambots
Jan  1 10:05:53 * sshd[27869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.88.97
Jan  1 10:05:55 * sshd[27869]: Failed password for invalid user raekeija from 212.64.88.97 port 38640 ssh2
2020-01-01 18:05:35
138.68.92.121 attackspambots
Jan  1 06:17:44 marvibiene sshd[12907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121  user=root
Jan  1 06:17:45 marvibiene sshd[12907]: Failed password for root from 138.68.92.121 port 53226 ssh2
Jan  1 06:23:17 marvibiene sshd[12951]: Invalid user plcnoc from 138.68.92.121 port 52094
...
2020-01-01 18:32:01
120.228.188.240 attack
Scanning
2020-01-01 18:28:52
49.232.60.2 attackspambots
$f2bV_matches
2020-01-01 18:20:43
62.210.28.57 attack
\[2020-01-01 05:18:56\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T05:18:56.014-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1011972592277524",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.28.57/56114",ACLName="no_extension_match"
\[2020-01-01 05:23:00\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T05:23:00.008-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="11011972592277524",SessionID="0x7f0fb4aabfc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.28.57/55328",ACLName="no_extension_match"
\[2020-01-01 05:27:04\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T05:27:04.257-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="21011972592277524",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.28.57/53901",ACLName="no_e
2020-01-01 18:36:39
61.48.192.115 attack
Jan  1 08:50:46 mc1 kernel: \[2023827.924783\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
Jan  1 08:51:04 mc1 kernel: \[2023845.765720\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
Jan  1 09:00:21 mc1 kernel: \[2024402.578813\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=61.48.192.115 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=21815 PROTO=TCP SPT=5202 DPT=23 WINDOW=12402 RES=0x00 SYN URGP=0 
...
2020-01-01 18:05:23
119.200.186.168 attackspam
invalid user
2020-01-01 18:04:53
51.158.100.169 attackspam
SSH bruteforce
2020-01-01 18:27:11
189.210.26.98 attackbots
Automatic report - Port Scan Attack
2020-01-01 18:29:59
51.159.35.94 attackbots
SSH bruteforce (Triggered fail2ban)
2020-01-01 18:06:00
14.139.231.132 attackspam
Jan  1 07:21:05 vps691689 sshd[3731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.231.132
Jan  1 07:21:07 vps691689 sshd[3731]: Failed password for invalid user ts3bot from 14.139.231.132 port 64040 ssh2
...
2020-01-01 17:59:37
213.136.89.204 attackbotsspam
Dec 31 01:18:10 nbi-636 sshd[11985]: Invalid user gdm from 213.136.89.204 port 52018
Dec 31 01:18:12 nbi-636 sshd[11985]: Failed password for invalid user gdm from 213.136.89.204 port 52018 ssh2
Dec 31 01:18:12 nbi-636 sshd[11985]: Received disconnect from 213.136.89.204 port 52018:11: Bye Bye [preauth]
Dec 31 01:18:12 nbi-636 sshd[11985]: Disconnected from 213.136.89.204 port 52018 [preauth]
Dec 31 01:25:06 nbi-636 sshd[13232]: User r.r from 213.136.89.204 not allowed because not listed in AllowUsers
Dec 31 01:25:06 nbi-636 sshd[13232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.89.204  user=r.r
Dec 31 01:25:09 nbi-636 sshd[13232]: Failed password for invalid user r.r from 213.136.89.204 port 47866 ssh2
Dec 31 01:25:09 nbi-636 sshd[13232]: Received disconnect from 213.136.89.204 port 47866:11: Bye Bye [preauth]
Dec 31 01:25:09 nbi-636 sshd[13232]: Disconnected from 213.136.89.204 port 47866 [preauth]
Dec 31 01:27:46 ........
-------------------------------
2020-01-01 18:36:07

Recently Reported IPs

103.196.9.105 192.80.170.186 20.118.240.192 135.233.112.26
172.17.8.3 169.150.203.242 103.115.18.6 154.99.3.172
178.62.222.54 157.254.38.189 61.0.84.249 156.214.245.235
103.101.50.70 22.225.54.38 122.225.54.38 196.251.100.27
45.192.113.57 14.213.27.192 8.212.115.61 10.115.158.151