Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.128.98.0 - 163.128.99.255'

% Abuse contact for '163.128.98.0 - 163.128.99.255' is 'abuse@mail.cyberjetservice.com'

inetnum:        163.128.98.0 - 163.128.99.255
netname:        CYBERJETPTELTD-SG
descr:          CYBERJET PTE LTD
country:        SG
org:            ORG-CPL93-AP
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
abuse-c:        AC2922-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CYBERJETPTELTD-SG
mnt-routes:     MAINT-CYBERJETPTELTD-SG
mnt-irt:        IRT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T22:35:16Z
source:         APNIC

irt:            IRT-CYBERJETPTELTD-SG
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
e-mail:         abuse@mail.cyberjetservice.com
abuse-mailbox:  abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
auth:           # Filtered
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T14:17:25Z
source:         APNIC

organisation:   ORG-CPL93-AP
org-name:       CYBERJET PTE LTD
org-type:       LIR
country:        SG
address:        73 Ayer Rajah Crescent
phone:          +65-6047-0237
e-mail:         contact@mail.cyberjetservice.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2026-02-21T13:24:53Z
source:         APNIC

role:           ABUSE CYBERJETPTELTDSG
country:        ZZ
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
phone:          +000000000
e-mail:         abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
nic-hdl:        AC2922-AP
remarks:        Generated from irt object IRT-CYBERJETPTELTD-SG
abuse-mailbox:  abuse@mail.cyberjetservice.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-23T22:35:16Z
source:         APNIC

role:           CYBERJET PTE LTD administrator
address:        73 Ayer Rajah Crescent, Singapore Singapore 139952
country:        SG
phone:          +65-6047-0237
e-mail:         abuse@mail.cyberjetservice.com
admin-c:        CPLA69-AP
tech-c:         CPLA69-AP
nic-hdl:        CPLA69-AP
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-23T14:17:16Z
source:         APNIC

% Information related to '163.128.98.0/23AS154562'

route:          163.128.98.0/23
descr:          Private Customer
origin:         AS154562
mnt-by:         MAINT-CYBERJETPTELTD-SG
last-modified:  2026-03-30T09:01:11Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.128.98.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.128.98.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 23:18:26 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 1.98.128.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.98.128.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.236.59.142 attackbotsspam
Aug  3 15:13:51 OPSO sshd\[31906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.59.142  user=root
Aug  3 15:13:54 OPSO sshd\[31906\]: Failed password for root from 151.236.59.142 port 40422 ssh2
Aug  3 15:17:41 OPSO sshd\[32653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.59.142  user=root
Aug  3 15:17:42 OPSO sshd\[32653\]: Failed password for root from 151.236.59.142 port 51808 ssh2
Aug  3 15:21:36 OPSO sshd\[678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.59.142  user=root
2020-08-04 00:05:52
222.99.52.216 attack
$f2bV_matches
2020-08-03 23:47:49
178.128.194.144 attackspam
Aug  3 16:34:50 debian-2gb-nbg1-2 kernel: \[18723760.628166\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.128.194.144 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=15212 PROTO=TCP SPT=35701 DPT=4444 WINDOW=65535 RES=0x00 SYN URGP=0
2020-08-03 23:34:35
14.29.162.139 attackbots
Aug  3 16:23:40 pornomens sshd\[20210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=root
Aug  3 16:23:42 pornomens sshd\[20210\]: Failed password for root from 14.29.162.139 port 34680 ssh2
Aug  3 16:27:15 pornomens sshd\[20212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139  user=root
...
2020-08-04 00:01:15
192.99.225.171 attackbots
[portscan] Port scan
2020-08-03 23:56:17
222.186.30.112 attack
Aug  3 17:54:12 minden010 sshd[20209]: Failed password for root from 222.186.30.112 port 32846 ssh2
Aug  3 17:54:14 minden010 sshd[20209]: Failed password for root from 222.186.30.112 port 32846 ssh2
Aug  3 17:54:16 minden010 sshd[20209]: Failed password for root from 222.186.30.112 port 32846 ssh2
...
2020-08-04 00:04:39
218.22.36.135 attack
Aug  3 15:24:39 root sshd[7307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.22.36.135  user=root
Aug  3 15:24:42 root sshd[7307]: Failed password for root from 218.22.36.135 port 19590 ssh2
...
2020-08-03 23:57:26
160.16.127.211 attackbots
2020-08-03T15:07:26.921805shield sshd\[4418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-239-29457.vs.sakura.ne.jp  user=root
2020-08-03T15:07:28.326328shield sshd\[4418\]: Failed password for root from 160.16.127.211 port 45808 ssh2
2020-08-03T15:08:23.409570shield sshd\[4757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-239-29457.vs.sakura.ne.jp  user=root
2020-08-03T15:08:24.970134shield sshd\[4757\]: Failed password for root from 160.16.127.211 port 59338 ssh2
2020-08-03T15:09:20.851325shield sshd\[5073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-239-29457.vs.sakura.ne.jp  user=root
2020-08-03 23:46:23
115.221.241.139 attackspambots
Bad mail account name (SMTP)
2020-08-03 23:35:09
207.180.225.181 attackbots
Lines containing failures of 207.180.225.181
Aug  3 10:34:09 shared07 sshd[3120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.225.181  user=r.r
Aug  3 10:34:12 shared07 sshd[3120]: Failed password for r.r from 207.180.225.181 port 51014 ssh2
Aug  3 10:34:12 shared07 sshd[3120]: Received disconnect from 207.180.225.181 port 51014:11: Bye Bye [preauth]
Aug  3 10:34:12 shared07 sshd[3120]: Disconnected from authenticating user r.r 207.180.225.181 port 51014 [preauth]
Aug  3 10:41:18 shared07 sshd[6594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.225.181  user=r.r
Aug  3 10:41:20 shared07 sshd[6594]: Failed password for r.r from 207.180.225.181 port 43702 ssh2
Aug  3 10:41:20 shared07 sshd[6594]: Received disconnect from 207.180.225.181 port 43702:11: Bye Bye [preauth]
Aug  3 10:41:20 shared07 sshd[6594]: Disconnected from authenticating user r.r 207.180.225.181 port 4370........
------------------------------
2020-08-04 00:09:55
95.181.131.153 attack
2020-08-03T13:30:34.033882randservbullet-proofcloud-66.localdomain sshd[22158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153  user=root
2020-08-03T13:30:36.213187randservbullet-proofcloud-66.localdomain sshd[22158]: Failed password for root from 95.181.131.153 port 54892 ssh2
2020-08-03T14:02:57.081644randservbullet-proofcloud-66.localdomain sshd[22231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153  user=root
2020-08-03T14:02:58.998673randservbullet-proofcloud-66.localdomain sshd[22231]: Failed password for root from 95.181.131.153 port 40100 ssh2
...
2020-08-03 23:46:53
183.89.214.176 attackbotsspam
Missing mail login name (IMAP)
2020-08-03 23:53:48
45.134.254.37 attackspam
Every day many spam mails from frank.casey.th@athelticona.com
2020-08-03 23:36:06
45.35.37.2 attackbotsspam
*Port Scan* detected from 45.35.37.2 (US/United States/California/Los Angeles (Downtown Los Angeles)/iebee.com). 4 hits in the last 295 seconds
2020-08-03 23:38:42
139.162.109.43 attack
Unauthorised access (Aug  3) SRC=139.162.109.43 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=54321 TCP DPT=111 WINDOW=65535 SYN
2020-08-04 00:07:09

Recently Reported IPs

2606:4700:10::6816:2692 35.186.186.214 88.101.166.29 88.101.166.189
103.215.74.213 110.77.248.115 2606:4700:10::6816:1314 2606:4700:10::6814:9150
2606:4700:10::6814:4899 110.78.150.162 2606:4700:10::6816:1235 2606:4700:10::6816:4905
166.88.142.143 66.132.195.103 222.199.16.39 116.204.183.163
116.204.183.187 2606:4700:10::6814:5922 2606:4700:10::6814:6162 2606:4700:10::6816:3845