Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: Chunghwa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '118.160.0.0 - 118.167.255.255'

% Abuse contact for '118.160.0.0 - 118.167.255.255' is 'abuse@hinet.net'

inetnum:        118.160.0.0 - 118.167.255.255
netname:        HINET-NET
descr:          Data Communication Business Group,
descr:          Chunghwa Telecom Co.,Ltd.
descr:          No.21, Sec.1, Xinyi Rd., Taipei City
descr:          10048, Taiwan
country:        TW
admin-c:        HN27-AP
tech-c:         HN27-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-HINET-AP
last-modified:  2025-11-07T01:34:19Z
source:         APNIC

irt:            IRT-HINET-AP
address:        Chunghwa Telecom Co.,Ltd.
address:        No.21-3, Sec. 1, Xinyi Rd., Taipei 10048, Taiwan, R.O.C.
address:        Taipei
phone:          +886-2-2322-3495
e-mail:         network-adm@hinet.net
abuse-mailbox:  abuse@hinet.net
admin-c:        TR391-AP
tech-c:         TR391-AP
remarks:        (oid:HINET)
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:20:07Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         HINET Network-Adm
address:        CHTD, Chunghwa Telecom Co., Ltd.
address:        No. 21, Sec. 21, Hsin-Yi Rd.,
address:        Taipei Taiwan 100
country:        TW
phone:          +886 2 2322 3495
phone:          +886 2 2322 3442
phone:          +886 2 2344 3007
fax-no:         +886 2 2344 2513
fax-no:         +886 2 2395 5671
e-mail:         network-adm@hinet.net
nic-hdl:        HN27-AP
remarks:        (hid:HN184-TW)
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-08-28T07:34:45Z
source:         APNIC

% Information related to '118.163.0.0 - 118.163.255.255'

inetnum:        118.163.0.0 - 118.163.255.255
netname:        HINET-NET
descr:          Chunghwa Telecom Co.,Ltd.
descr:          No.21-3, Sec. 1, Xinyi Rd., Taipei 10048, Taiwan, R.O.C.
descr:          Taipei Taiwan
country:        TW
admin-c:        HN184-TW
tech-c:         HN184-TW
mnt-by:         MAINT-TW-TWNIC
changed:        network-adm@hinet.net 20071004
status:         ASSIGNED NON-PORTABLE
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         HINET Network-Adm
address:        Changhua Telecom Co., Ltd.
address:        No. 21, Sec. 21, Hsin-Yi Rd.
address:        Taipei Taiwan
country:        TW
phone:          +886-2-2322-3495
fax-no:         +886-2-2344-2513
e-mail:         network-adm@hinet.net
nic-hdl:        HN184-TW
changed:        hostmaster@twnic.net 20130307
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.163.85.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.163.85.183.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 14:21:57 CST 2026
;; MSG SIZE  rcvd: 107
Host info
183.85.163.118.in-addr.arpa domain name pointer 118-163-85-183.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
183.85.163.118.in-addr.arpa	name = 118-163-85-183.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.97.204.57 attackspambots
20 attempts against mh-ssh on echoip
2020-10-02 02:15:23
216.255.123.98 attackbots
2020-10-01T03:30:57.971016hostname sshd[121856]: Failed password for root from 216.255.123.98 port 14894 ssh2
...
2020-10-02 02:12:06
193.118.53.142 attackbots
Found on   Github Combined on 3 lists    / proto=6  .  srcport=39045  .  dstport=443 HTTPS  .     (2747)
2020-10-02 01:53:17
119.28.149.51 attackspambots
Oct  1 11:46:14 rotator sshd\[16502\]: Invalid user invitado from 119.28.149.51Oct  1 11:46:16 rotator sshd\[16502\]: Failed password for invalid user invitado from 119.28.149.51 port 54074 ssh2Oct  1 11:49:18 rotator sshd\[16517\]: Invalid user culture from 119.28.149.51Oct  1 11:49:19 rotator sshd\[16517\]: Failed password for invalid user culture from 119.28.149.51 port 60002 ssh2Oct  1 11:52:14 rotator sshd\[17278\]: Failed password for root from 119.28.149.51 port 37692 ssh2Oct  1 11:55:16 rotator sshd\[17471\]: Failed password for root from 119.28.149.51 port 43618 ssh2
...
2020-10-02 01:53:31
188.173.97.144 attackspam
Brute%20Force%20SSH
2020-10-02 02:13:59
118.163.135.18 attackspam
Oct  1 19:29:08 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:118.163.135.18\]
...
2020-10-02 02:10:09
106.12.193.6 attackbotsspam
Brute-force attempt banned
2020-10-02 01:45:09
192.241.214.165 attack
Found on   CINS badguys     / proto=6  .  srcport=52605  .  dstport=49152  .     (1011)
2020-10-02 02:18:43
101.95.86.34 attack
Oct  1 11:55:58 ws22vmsma01 sshd[101739]: Failed password for root from 101.95.86.34 port 45349 ssh2
Oct  1 12:03:39 ws22vmsma01 sshd[103975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.86.34
...
2020-10-02 02:04:50
211.173.58.253 attack
Oct  1 16:58:07 db sshd[30810]: Invalid user odoo from 211.173.58.253 port 50003
...
2020-10-02 02:13:39
160.155.53.22 attackspambots
21 attempts against mh-ssh on cloud
2020-10-02 02:10:57
20.194.3.84 attackspam
Oct  1 15:27:53 web8 sshd\[7653\]: Invalid user administrator from 20.194.3.84
Oct  1 15:27:53 web8 sshd\[7653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.3.84
Oct  1 15:27:55 web8 sshd\[7653\]: Failed password for invalid user administrator from 20.194.3.84 port 32962 ssh2
Oct  1 15:33:51 web8 sshd\[10611\]: Invalid user library from 20.194.3.84
Oct  1 15:33:51 web8 sshd\[10611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.3.84
2020-10-02 02:18:02
154.34.24.212 attackbotsspam
SSH Brute-Force Attack
2020-10-02 01:58:51
51.75.195.25 attackspambots
fail2ban -- 51.75.195.25
...
2020-10-02 02:20:02
192.241.232.227 attack
IP 192.241.232.227 attacked honeypot on port: 110 at 10/1/2020 8:33:30 AM
2020-10-02 02:08:27

Recently Reported IPs

51.223.8.32 44.220.188.117 154.219.123.77 2606:4700:10::6814:8727
2606:4700:10::6814:6135 2606:4700:10::6814:4519 2606:4700:10::6816:4347 2606:4700:10::6814:7185
2606:4700:10::6814:9864 2606:4700:10::6814:4521 2606:4700:10::6816:831 2606:4700:10::6816:1662
2606:4700:10::6814:7099 2606:4700:10::ac43:2692 2606:4700:10::6814:6606 2606:4700:10::6816:1641
110.78.156.187 121.234.219.124 14.207.194.57 18.97.26.10