Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Ambit Microsystem Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.139.87.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31116
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;101.139.87.2.			IN	A

;; AUTHORITY SECTION:
.			1692	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 23 00:59:40 CST 2019
;; MSG SIZE  rcvd: 116
Host info
2.87.139.101.in-addr.arpa domain name pointer 101-139-87-2.mobile.dynamic.aptg.com.tw.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
2.87.139.101.in-addr.arpa	name = 101-139-87-2.mobile.dynamic.aptg.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.231.5.51 attackspam
2019-12-31T18:25:03.208079abusebot-2.cloudsearch.cf sshd[23107]: Invalid user nagios from 49.231.5.51 port 37332
2019-12-31T18:25:03.213737abusebot-2.cloudsearch.cf sshd[23107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.5.51
2019-12-31T18:25:03.208079abusebot-2.cloudsearch.cf sshd[23107]: Invalid user nagios from 49.231.5.51 port 37332
2019-12-31T18:25:05.219698abusebot-2.cloudsearch.cf sshd[23107]: Failed password for invalid user nagios from 49.231.5.51 port 37332 ssh2
2019-12-31T18:27:51.797648abusebot-2.cloudsearch.cf sshd[23288]: Invalid user legal3 from 49.231.5.51 port 34052
2019-12-31T18:27:51.804631abusebot-2.cloudsearch.cf sshd[23288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.5.51
2019-12-31T18:27:51.797648abusebot-2.cloudsearch.cf sshd[23288]: Invalid user legal3 from 49.231.5.51 port 34052
2019-12-31T18:27:54.542877abusebot-2.cloudsearch.cf sshd[23288]: Failed password
...
2020-01-01 05:06:21
118.68.0.249 attackspam
Unauthorized connection attempt detected from IP address 118.68.0.249 to port 23
2020-01-01 05:00:26
154.85.38.50 attackbotsspam
Invalid user vcsa from 154.85.38.50 port 42630
2020-01-01 05:08:46
106.75.84.197 attack
Unauthorized connection attempt detected from IP address 106.75.84.197 to port 5007
2020-01-01 04:42:42
117.25.182.90 attackbotsspam
Unauthorized connection attempt detected from IP address 117.25.182.90 to port 1433
2020-01-01 05:00:49
106.1.90.100 attackbotsspam
Unauthorized connection attempt detected from IP address 106.1.90.100 to port 8000
2020-01-01 04:44:19
182.40.250.190 attackbotsspam
Unauthorized connection attempt detected from IP address 182.40.250.190 to port 5555
2020-01-01 04:55:49
114.217.244.86 attackbots
Unauthorized connection attempt detected from IP address 114.217.244.86 to port 23
2020-01-01 04:39:59
42.119.213.116 attackspam
SSH login attempts.
2020-01-01 05:04:19
49.145.197.19 attackspambots
Unauthorized connection attempt detected from IP address 49.145.197.19 to port 445
2020-01-01 04:47:43
183.80.176.155 attack
Unauthorized connection attempt detected from IP address 183.80.176.155 to port 23
2020-01-01 04:55:06
76.214.99.209 attackspambots
SSH login attempts
2020-01-01 05:09:30
183.2.171.225 attackspambots
Unauthorized connection attempt detected from IP address 183.2.171.225 to port 445
2020-01-01 04:55:35
117.114.139.186 attack
Unauthorized connection attempt detected from IP address 117.114.139.186 to port 1433
2020-01-01 04:37:43
202.131.126.142 attackspambots
Dec 31 14:49:18 prox sshd[26031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.126.142 
Dec 31 14:49:20 prox sshd[26031]: Failed password for invalid user mysql from 202.131.126.142 port 45052 ssh2
2020-01-01 05:08:31

Recently Reported IPs

201.160.134.218 132.37.29.226 201.131.184.86 87.113.186.196
29.52.164.254 45.43.42.6 211.176.177.167 191.53.194.240
2.49.14.255 200.148.103.142 2.183.202.73 197.237.242.65
179.127.144.252 192.99.186.31 195.55.235.91 120.98.52.182
199.191.50.23 1.174.91.165 113.178.88.223 113.172.133.87