Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Taipei

Country: Taiwan, China

Internet Service Provider: Ambit Microsystems

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.138.14.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.138.14.161.			IN	A

;; AUTHORITY SECTION:
.			264	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011301 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 13 17:25:21 CST 2023
;; MSG SIZE  rcvd: 107
Host info
161.14.138.101.in-addr.arpa domain name pointer 101-138-14-161.mobile.dynamic.aptg.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.14.138.101.in-addr.arpa	name = 101-138-14-161.mobile.dynamic.aptg.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.103.98.211 attackbotsspam
Nov  4 07:33:25 sauna sshd[216953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.98.211
Nov  4 07:33:27 sauna sshd[216953]: Failed password for invalid user eryn from 83.103.98.211 port 60058 ssh2
...
2019-11-04 13:40:22
80.211.243.245 attackspambots
Nov  4 05:35:31 localhost sshd\[74321\]: Invalid user garner from 80.211.243.245 port 38198
Nov  4 05:35:31 localhost sshd\[74321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.243.245
Nov  4 05:35:33 localhost sshd\[74321\]: Failed password for invalid user garner from 80.211.243.245 port 38198 ssh2
Nov  4 05:39:23 localhost sshd\[74498\]: Invalid user costarica from 80.211.243.245 port 47070
Nov  4 05:39:23 localhost sshd\[74498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.243.245
...
2019-11-04 13:58:44
36.72.131.103 attackspam
scan z
2019-11-04 13:54:57
197.157.143.50 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-04 13:54:01
163.172.93.133 attackspambots
Nov  4 06:31:47 vps666546 sshd\[5763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.93.133  user=root
Nov  4 06:31:49 vps666546 sshd\[5763\]: Failed password for root from 163.172.93.133 port 49406 ssh2
Nov  4 06:35:42 vps666546 sshd\[5861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.93.133  user=root
Nov  4 06:35:45 vps666546 sshd\[5861\]: Failed password for root from 163.172.93.133 port 58886 ssh2
Nov  4 06:39:41 vps666546 sshd\[5970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.93.133  user=root
...
2019-11-04 13:56:38
198.199.107.41 attack
Nov  4 05:56:34 lnxded63 sshd[19419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.107.41
2019-11-04 13:41:52
163.172.60.213 attackbots
Automatic report - XMLRPC Attack
2019-11-04 13:43:14
198.98.62.183 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-04 14:12:03
195.154.108.194 attack
2019-11-04T06:47:39.320806tmaserv sshd\[5792\]: Invalid user milady from 195.154.108.194 port 43174
2019-11-04T06:47:39.325217tmaserv sshd\[5792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-108-194.rev.poneytelecom.eu
2019-11-04T06:47:41.598630tmaserv sshd\[5792\]: Failed password for invalid user milady from 195.154.108.194 port 43174 ssh2
2019-11-04T06:51:09.388075tmaserv sshd\[6019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-108-194.rev.poneytelecom.eu  user=root
2019-11-04T06:51:10.816656tmaserv sshd\[6019\]: Failed password for root from 195.154.108.194 port 51640 ssh2
2019-11-04T06:54:38.975368tmaserv sshd\[6080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-108-194.rev.poneytelecom.eu  user=root
...
2019-11-04 13:58:27
222.186.175.217 attack
Nov  4 07:05:51 h2177944 sshd\[13463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Nov  4 07:05:53 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2
Nov  4 07:05:58 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2
Nov  4 07:06:02 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2
...
2019-11-04 14:06:48
173.219.133.94 attackspambots
Honeypot attack, port: 445, PTR: 173-219-133-94.com.sta.suddenlink.net.
2019-11-04 14:15:18
180.76.187.94 attack
Nov  4 06:56:32 MK-Soft-VM5 sshd[9269]: Failed password for root from 180.76.187.94 port 43120 ssh2
...
2019-11-04 14:18:13
101.89.91.175 attack
Nov  4 05:56:17 MK-Soft-VM4 sshd[11683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.91.175 
Nov  4 05:56:19 MK-Soft-VM4 sshd[11683]: Failed password for invalid user one from 101.89.91.175 port 36088 ssh2
...
2019-11-04 13:49:55
43.225.117.245 attack
Jan 30 04:59:25 vtv3 sshd\[27701\]: Invalid user weblogic from 43.225.117.245 port 41956
Jan 30 04:59:25 vtv3 sshd\[27701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.117.245
Jan 30 04:59:27 vtv3 sshd\[27701\]: Failed password for invalid user weblogic from 43.225.117.245 port 41956 ssh2
Jan 30 05:03:04 vtv3 sshd\[28881\]: Invalid user tester from 43.225.117.245 port 34248
Jan 30 05:03:04 vtv3 sshd\[28881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.117.245
Feb 13 04:23:45 vtv3 sshd\[4980\]: Invalid user martina from 43.225.117.245 port 60182
Feb 13 04:23:45 vtv3 sshd\[4980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.117.245
Feb 13 04:23:47 vtv3 sshd\[4980\]: Failed password for invalid user martina from 43.225.117.245 port 60182 ssh2
Feb 13 04:29:35 vtv3 sshd\[6499\]: Invalid user uuu from 43.225.117.245 port 50202
Feb 13 04:29:35 vtv3 sshd\[
2019-11-04 13:55:51
118.25.143.199 attack
Nov  4 05:55:46 v22018076622670303 sshd\[32705\]: Invalid user toil from 118.25.143.199 port 49079
Nov  4 05:55:46 v22018076622670303 sshd\[32705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199
Nov  4 05:55:48 v22018076622670303 sshd\[32705\]: Failed password for invalid user toil from 118.25.143.199 port 49079 ssh2
...
2019-11-04 14:10:28

Recently Reported IPs

150.190.234.108 24.53.48.82 134.122.87.150 153.108.117.133
113.122.6.2 76.107.102.239 94.43.177.125 92.67.65.226
89.22.244.89 82.62.159.140 80.12.80.200 79.152.32.133
72.85.191.163 72.246.175.195 67.62.239.106 6.210.35.25
56.225.249.192 40.123.162.7 41.199.22.199 37.142.39.199