Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.28.112.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.28.112.1.			IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:10:32 CST 2023
;; MSG SIZE  rcvd: 105
Host info
1.112.28.163.in-addr.arpa domain name pointer name.tnrc.edu.tw.
1.112.28.163.in-addr.arpa domain name pointer name.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.112.28.163.in-addr.arpa	name = name.ncku.edu.tw.
1.112.28.163.in-addr.arpa	name = name.tnrc.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.133.56.235 attack
Aug  9 08:05:44 ip106 sshd[22432]: Failed password for root from 202.133.56.235 port 55902 ssh2
...
2020-08-09 20:06:50
14.118.213.215 attack
Lines containing failures of 14.118.213.215
Aug  9 03:33:59 siirappi sshd[13863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.118.213.215  user=r.r
Aug  9 03:34:02 siirappi sshd[13863]: Failed password for r.r from 14.118.213.215 port 59724 ssh2
Aug  9 03:34:03 siirappi sshd[13863]: Received disconnect from 14.118.213.215 port 59724:11: Bye Bye [preauth]
Aug  9 03:34:03 siirappi sshd[13863]: Disconnected from authenticating user r.r 14.118.213.215 port 59724 [preauth]
Aug  9 03:45:54 siirappi sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.118.213.215  user=r.r
Aug  9 03:45:56 siirappi sshd[13991]: Failed password for r.r from 14.118.213.215 port 36304 ssh2
Aug  9 03:45:57 siirappi sshd[13991]: Received disconnect from 14.118.213.215 port 36304:11: Bye Bye [preauth]
Aug  9 03:45:57 siirappi sshd[13991]: Disconnected from authenticating user r.r 14.118.213.215 port 36304........
------------------------------
2020-08-09 20:00:20
113.22.236.243 attackbots
Attempted connection to port 445.
2020-08-09 19:45:29
183.64.214.250 attack
Attempted connection to port 1433.
2020-08-09 19:43:05
45.70.215.126 attackspambots
Sent packet to closed port: 8291
2020-08-09 20:07:56
112.85.42.176 attackspambots
Aug  9 13:49:33 ns381471 sshd[14284]: Failed password for root from 112.85.42.176 port 19395 ssh2
Aug  9 13:49:36 ns381471 sshd[14284]: Failed password for root from 112.85.42.176 port 19395 ssh2
2020-08-09 19:53:00
27.147.209.215 attackspambots
Attempted connection to port 80.
2020-08-09 19:40:17
112.134.184.165 attackbots
Unauthorized connection attempt from IP address 112.134.184.165 on Port 445(SMB)
2020-08-09 20:10:33
213.33.157.204 attack
Dovecot Invalid User Login Attempt.
2020-08-09 19:49:56
14.235.93.85 attack
Attempted connection to port 445.
2020-08-09 19:46:11
183.16.100.180 attackbots
Port probing on unauthorized port 4899
2020-08-09 19:43:19
176.67.51.74 attackbots
Attempted connection to port 2323.
2020-08-09 19:45:11
129.226.67.92 attackbotsspam
*Port Scan* detected from 129.226.67.92 (SG/Singapore/-/Singapore/-). 4 hits in the last 130 seconds
2020-08-09 19:56:33
113.186.157.29 attack
Unauthorized connection attempt from IP address 113.186.157.29 on Port 445(SMB)
2020-08-09 20:17:35
52.152.226.185 attackspambots
Aug  5 22:40:38 django sshd[29289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.152.226.185  user=r.r
Aug  5 22:40:40 django sshd[29289]: Failed password for r.r from 52.152.226.185 port 39943 ssh2
Aug  5 22:40:41 django sshd[29290]: Received disconnect from 52.152.226.185: 11: Bye Bye
Aug  5 22:50:49 django sshd[30999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.152.226.185  user=r.r
Aug  5 22:50:51 django sshd[30999]: Failed password for r.r from 52.152.226.185 port 51551 ssh2
Aug  5 22:50:51 django sshd[31000]: Received disconnect from 52.152.226.185: 11: Bye Bye
Aug  5 22:53:55 django sshd[31761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.152.226.185  user=r.r
Aug  5 22:53:57 django sshd[31761]: Failed password for r.r from 52.152.226.185 port 49047 ssh2
Aug  5 22:53:57 django sshd[31762]: Received disconnect from 52.152.226........
-------------------------------
2020-08-09 19:58:30

Recently Reported IPs

193.227.50.54 54.183.229.230 140.116.159.135 134.106.56.79
137.189.40.190 140.116.85.113 140.116.16.233 140.113.63.41
137.205.84.17 140.116.205.179 147.46.208.218 140.116.20.205
147.46.112.51 140.116.106.12 124.16.155.56 140.113.150.57
140.116.215.186 147.46.42.107 129.132.37.91 134.173.42.160