Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hạ Long

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.160.0.0 - 113.191.255.255'

% Abuse contact for '113.160.0.0 - 113.191.255.255' is 'hm-changed@vnnic.vn'

inetnum:        113.160.0.0 - 113.191.255.255
netname:        VNPT-VN
descr:          Vietnam Posts and Telecommunications Group
descr:          No 57, Huynh Thuc Khang Street, Lang Ha ward, Dong Da district, Ha Noi City
country:        VN
admin-c:        PTH13-AP
tech-c:         PTH13-AP
remarks:        for admin contact mail to Nguyen Xuan Cuong NXC1-AP
remarks:        for Tech contact mail to Nguyen Hien Khanh KNH1-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-VN-VNNIC
mnt-lower:      MAINT-VN-VNPT
mnt-routes:     MAINT-VN-VNPT
last-modified:  2018-01-25T03:55:17Z
mnt-irt:        IRT-VNNIC-AP
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2025-09-04T05:18:22Z
source:         APNIC

person:         Pham Tien Huy
address:        VNPT-VN
country:        VN
phone:          +84-24-37741604
e-mail:         huypt@vnpt.vn
nic-hdl:        PTH13-AP
mnt-by:         MAINT-VN-VNPT
last-modified:  2017-11-19T07:06:20Z
source:         APNIC

% Information related to '113.160.0.0/11AS45899'

route:          113.160.0.0/11
descr:          VNPT
origin:         AS45899
mnt-by:         MAINT-VN-VNPT
last-modified:  2022-07-29T15:07:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.183.100.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.183.100.189.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 21 07:48:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
189.100.183.113.in-addr.arpa domain name pointer static.vnpt.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.100.183.113.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.228.137.6 attackspam
Fail2Ban Ban Triggered
2020-04-04 02:25:25
206.189.148.203 attack
Apr  3 16:46:25 DAAP sshd[26148]: Invalid user kw from 206.189.148.203 port 36988
Apr  3 16:46:25 DAAP sshd[26148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.148.203
Apr  3 16:46:25 DAAP sshd[26148]: Invalid user kw from 206.189.148.203 port 36988
Apr  3 16:46:27 DAAP sshd[26148]: Failed password for invalid user kw from 206.189.148.203 port 36988 ssh2
Apr  3 16:55:34 DAAP sshd[26289]: Invalid user wangxue from 206.189.148.203 port 43810
...
2020-04-04 02:31:23
192.144.155.110 attack
Invalid user pz from 192.144.155.110 port 47256
2020-04-04 02:35:40
59.36.137.105 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-04-04 02:20:15
45.117.176.23 attackbotsspam
Invalid user hongli from 45.117.176.23 port 35402
2020-04-04 02:25:43
222.175.126.74 attack
Invalid user sma from 222.175.126.74 port 62997
2020-04-04 02:27:10
198.98.54.28 attackspambots
Invalid user ubnt from 198.98.54.28 port 63058
2020-04-04 02:33:00
129.28.188.115 attackspambots
Invalid user lwh from 129.28.188.115 port 46750
2020-04-04 02:03:05
206.189.128.215 attackspam
$f2bV_matches
2020-04-04 02:31:48
51.254.127.231 attack
Invalid user zhanglei from 51.254.127.231 port 54924
2020-04-04 02:21:54
46.136.173.103 attackbots
SSH Brute Force
2020-04-04 02:25:06
51.91.110.170 attackspam
Invalid user avisha from 51.91.110.170 port 47224
2020-04-04 02:22:38
78.118.222.208 attackspambots
Apr  3 19:47:18 ArkNodeAT sshd\[3343\]: Invalid user um from 78.118.222.208
Apr  3 19:47:18 ArkNodeAT sshd\[3343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.118.222.208
Apr  3 19:47:20 ArkNodeAT sshd\[3343\]: Failed password for invalid user um from 78.118.222.208 port 36902 ssh2
2020-04-04 02:18:04
182.74.133.117 attack
Apr  3 18:10:45 host sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.133.117  user=root
Apr  3 18:10:46 host sshd[22786]: Failed password for root from 182.74.133.117 port 45526 ssh2
...
2020-04-04 02:38:43
149.56.44.101 attackbotsspam
Invalid user hq from 149.56.44.101 port 59256
2020-04-04 01:59:16

Recently Reported IPs

199.45.155.106 213.209.143.44 147.185.133.62 193.17.183.25
113.215.189.151 42.228.118.241 39.73.137.14 39.154.8.226
36.143.179.111 220.202.230.71 123.132.86.83 121.27.193.186
120.71.59.24 120.239.50.131 120.230.20.67 120.216.130.94
117.188.22.249 112.237.7.17 110.52.68.171 110.244.101.193