APNIC - Query the APNIC Whois Database

To assist you with debugging problems, this whois query was received from IP Address

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html
% Information related to '103.143.32.0 - 103.143.33.255'
% Abuse contact for '103.143.32.0 - 103.143.33.255' is 'abuse@packet.stream'
inetnum:        103.143.32.0 - 103.143.33.255
netname:        CLOUDNX-KR
descr:          CreativeLab
country:        KR
org:            ORG-CA60-AP
admin-c:        PA353-AP
tech-c:         PA353-AP
abuse-c:        AP1199-AP
status:         ASSIGNED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-routes:     MAINT-PACKETSTREAM-KR
mnt-irt:        IRT-PACKETSTREAM
last-modified:  2021-08-14T18:07:10Z
source:         APNIC
irt:            IRT-PACKETSTREAM
address:        24, World Cup buk-ro 60-gil, Mapo-gu, Seoul, Republic of Korea
e-mail:         abuse@packet.stream
abuse-mailbox:  abuse@packet.stream
admin-c:        PA353-AP
tech-c:         PA353-AP
auth:           # Filtered
remarks:        abuse@packet.stream was validated on 2023-10-17
mnt-by:         MAINT-PACKETSTREAM-KR
last-modified:  2023-10-17T06:34:32Z
source:         APNIC
organisation:   ORG-CA60-AP
org-name:       CloudNX
org-type:       LIR
country:        KR
address:        CloudNX NOC, 4, Bongeunsa-ro 109-gil, Gangnam-gu, Seoul
phone:          +82-70-8095-2240
e-mail:         noc@cloudnx.cloud
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:17:56Z
source:         APNIC
role:           ABUSE PACKETSTREAM
address:        24, World Cup buk-ro 60-gil, Mapo-gu, Seoul, Republic of Korea
country:        ZZ
phone:          +000000000
e-mail:         abuse@packet.stream
admin-c:        PA353-AP
tech-c:         PA353-AP
nic-hdl:        AP1199-AP
remarks:        Generated from irt object IRT-PACKETSTREAM
remarks:        abuse@packet.stream was validated on 2023-10-17
abuse-mailbox:  abuse@packet.stream
mnt-by:         APNIC-ABUSE
last-modified:  2023-10-17T06:35:06Z
source:         APNIC
role:           PacketStream Administrator
address:        24, World Cup buk-ro 60-gil, Mapo-gu, Seoul, Republic of Korea
country:        KR
phone:          +1-307-240-9554
e-mail:         abuse@packet.stream
admin-c:        PA353-AP
tech-c:         PA353-AP
nic-hdl:        PA353-AP
notify:         abuse@packet.stream
mnt-by:         MAINT-CLOUDNX-KR
last-modified:  2021-07-24T13:35:24Z
source:         APNIC
% This query was served by the APNIC Whois Service version 1.88.25 (WHOIS-AU2)
  • Bold: Object type.
  • Underlined: Primary key(s).
  • Hyperlinks: Searchable Attributes.
5 records found for '103.143.32.0'
Search for  
IP address lookups Miscellaneous queries
-l

1st level less specific

Returns smallest IP address range that includes the queried IP address or range

-i

Inverse attributes

Returns objects with an attribute that matches the query text and attribute type
-L

All less specific

Return all larger IP address ranges that include the queried IP address or range

-T

Object types

Results that match the query and are of a specified object type
-m

1st level more specific

Returns first level more specific address ranges within the boundaries of the queried IP address range
-M

All more specific

Returns all more specific address ranges within the boundaries of the queried IP address range

Query hints

  • Include "AS" in front of an AS number.
    Example: AS4808

  • Include "-t" (template only) or "-v" (template and description) in front of an object name to view the template
    Example: -t inetnum

-x

Exact match only

Returns address range that exactly matches the queried IP address range
-d

Associated reverse domain

Returns IP address range and associated reverse domain

For more information see: