Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: Ambit Microsystems

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.139.28.184
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.139.28.184.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:16:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
184.28.139.101.in-addr.arpa domain name pointer 101-139-28-184.mobile.dynamic.aptg.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
184.28.139.101.in-addr.arpa	name = 101-139-28-184.mobile.dynamic.aptg.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.82.153.35 attackspam
10/25/2019-19:46:41.149220 45.82.153.35 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-26 08:19:02
198.108.67.108 attackspam
firewall-block, port(s): 2010/tcp
2019-10-26 08:03:18
185.176.27.54 attack
firewall-block, port(s): 10385/tcp, 10386/tcp, 40135/tcp, 40136/tcp, 40137/tcp, 47185/tcp
2019-10-26 08:06:05
193.32.161.48 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 2323 proto: TCP cat: Misc Attack
2019-10-26 08:03:32
81.22.45.73 attack
ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack
2019-10-26 07:57:08
118.24.173.104 attackspam
SSH Brute Force, server-1 sshd[17804]: Failed password for root from 118.24.173.104 port 41881 ssh2
2019-10-26 08:23:44
106.13.49.233 attackspam
Oct 25 23:51:51 TORMINT sshd\[18588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.233  user=root
Oct 25 23:51:53 TORMINT sshd\[18588\]: Failed password for root from 106.13.49.233 port 52978 ssh2
Oct 25 23:56:31 TORMINT sshd\[18844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.233  user=root
...
2019-10-26 12:00:14
62.234.73.104 attackbotsspam
Oct 26 02:04:46 dedicated sshd[13178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.104  user=root
Oct 26 02:04:49 dedicated sshd[13178]: Failed password for root from 62.234.73.104 port 58214 ssh2
2019-10-26 08:23:15
185.175.93.105 attack
10/26/2019-02:05:41.064640 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-26 08:06:31
159.203.201.4 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 179 proto: TCP cat: Misc Attack
2019-10-26 08:09:59
187.113.104.100 attackspambots
Oct 26 01:54:41 v22019058497090703 sshd[14128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.113.104.100
Oct 26 01:54:42 v22019058497090703 sshd[14128]: Failed password for invalid user mask from 187.113.104.100 port 47702 ssh2
Oct 26 01:59:51 v22019058497090703 sshd[14494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.113.104.100
...
2019-10-26 08:20:55
115.110.204.197 attack
2019-10-26T03:54:43.585356abusebot-7.cloudsearch.cf sshd\[22759\]: Invalid user ftpuser from 115.110.204.197 port 47428
2019-10-26 12:09:03
187.167.195.131 attack
Automatic report - Port Scan Attack
2019-10-26 12:00:02
31.184.215.240 attack
10/25/2019-16:59:47.451579 31.184.215.240 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-26 08:19:22
223.196.83.98 attackbotsspam
Oct 26 05:54:39 mail sshd[18462]: Invalid user aeok from 223.196.83.98
Oct 26 05:54:39 mail sshd[18462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.196.83.98
Oct 26 05:54:39 mail sshd[18462]: Invalid user aeok from 223.196.83.98
Oct 26 05:54:41 mail sshd[18462]: Failed password for invalid user aeok from 223.196.83.98 port 38536 ssh2
...
2019-10-26 12:09:50

Recently Reported IPs

208.113.173.66 247.16.11.11 201.207.172.196 20.245.83.53
122.110.194.239 72.96.35.168 176.162.234.131 153.216.229.169
69.210.10.183 120.75.42.113 93.18.135.130 255.67.43.189
231.31.115.43 20.176.193.214 17.178.149.160 99.124.56.213
127.124.39.172 18.105.195.95 26.2.150.35 47.204.48.42