Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daan District

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.193.52.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.193.52.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121802 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 19 08:28:39 CST 2024
;; MSG SIZE  rcvd: 106
Host info
99.52.193.123.in-addr.arpa domain name pointer 123-193-52-99.dynamic.kbronet.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.52.193.123.in-addr.arpa	name = 123-193-52-99.dynamic.kbronet.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.165.242.200 attackbotsspam
Invalid user julius from 188.165.242.200 port 41272
2019-07-25 06:24:22
139.59.9.58 attack
Jul 24 22:37:42 debian sshd\[28426\]: Invalid user user from 139.59.9.58 port 59504
Jul 24 22:37:42 debian sshd\[28426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.9.58
...
2019-07-25 06:26:20
46.107.89.215 attackspambots
Automatic report - Port Scan Attack
2019-07-25 05:58:30
117.60.141.200 attack
Jul 24 19:19:26 lively sshd[7868]: Bad protocol version identification '' from 117.60.141.200 port 33318
Jul 24 19:19:28 lively sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.141.200  user=r.r
Jul 24 19:19:30 lively sshd[7869]: Failed password for r.r from 117.60.141.200 port 33451 ssh2
Jul 24 19:19:31 lively sshd[7869]: Connection closed by authenticating user r.r 117.60.141.200 port 33451 [preauth]
Jul 24 19:19:34 lively sshd[7871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.141.200  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.60.141.200
2019-07-25 06:22:49
157.230.24.107 attack
Automatic report - Banned IP Access
2019-07-25 06:27:11
2.136.95.127 attackbotsspam
Repeated brute force against a port
2019-07-25 06:03:53
104.248.116.76 attackbotsspam
Jul 25 00:55:59 srv-4 sshd\[30763\]: Invalid user he from 104.248.116.76
Jul 25 00:55:59 srv-4 sshd\[30763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.76
Jul 25 00:56:01 srv-4 sshd\[30763\]: Failed password for invalid user he from 104.248.116.76 port 52682 ssh2
...
2019-07-25 06:37:17
14.98.22.30 attackbotsspam
Jul 24 16:28:17 localhost sshd\[61444\]: Invalid user test from 14.98.22.30 port 43405
Jul 24 16:28:17 localhost sshd\[61444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.22.30
Jul 24 16:28:19 localhost sshd\[61444\]: Failed password for invalid user test from 14.98.22.30 port 43405 ssh2
Jul 24 16:39:37 localhost sshd\[61846\]: Invalid user username from 14.98.22.30 port 39935
Jul 24 16:39:37 localhost sshd\[61846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.22.30
...
2019-07-25 06:02:37
205.185.121.52 attack
ZTE Router Exploit Scanner
2019-07-25 05:54:10
223.241.7.225 attack
CN China - Failures: 5 smtpauth
2019-07-25 06:21:11
104.140.148.58 attackbotsspam
" "
2019-07-25 06:38:18
180.126.232.84 attackbotsspam
scan z
2019-07-25 06:34:05
142.54.101.146 attack
Invalid user qhsupport from 142.54.101.146 port 32155
2019-07-25 06:24:06
185.220.101.50 attackspambots
Invalid user guest from 185.220.101.50 port 42473
2019-07-25 06:07:47
71.6.146.186 attackspam
Web application attack detected by fail2ban
2019-07-25 06:25:31

Recently Reported IPs

51.52.90.120 156.214.168.234 92.194.74.180 176.96.1.153
135.246.171.89 26.101.90.199 40.241.174.229 199.103.2.0
198.73.182.137 107.166.251.194 179.160.12.244 156.101.110.240
107.146.66.195 242.130.4.95 233.232.28.225 40.49.106.15
254.43.30.214 23.238.200.255 45.68.57.2 37.165.16.208