Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.148.220.0 - 202.148.221.255'

% Abuse contact for '202.148.220.0 - 202.148.221.255' is 'soc@imcloud.tw'

inetnum:        202.148.220.0 - 202.148.221.255
netname:        SDCL-TW
descr:          Sky Digital Co., Ltd.
country:        TW
admin-c:        SDCL2-AP
tech-c:         SDCL2-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-SDCL-TW-TW
last-modified:  2025-10-21T02:28:26Z
source:         APNIC

irt:            IRT-SDCL-TW-TW
address:        Sky Digital Co., Ltd.
address:        Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
phone:          +88634271005
e-mail:         soc@imcloud.tw
abuse-mailbox:  soc@imcloud.tw
admin-c:        TR524-AP
tech-c:         TR524-AP
auth:           # Filtered
remarks:        (oid:SDCL-TW)
remarks:        soc@imcloud.tw was validated on 2023-06-27
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:46:54Z
source:         APNIC

role:           Sky Digital Co Ltd administrator
address:        Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676
country:        TW
phone:          +88634271005
fax-no:         +88634271009
e-mail:         abuse@idc-tw.com
admin-c:        SDCL2-AP
tech-c:         SDCL2-AP
nic-hdl:        SDCL2-AP
mnt-by:         MAINT-SDCL-TW
last-modified:  2023-07-18T17:00:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.148.221.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.148.221.131.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 21:10:33 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'Host 131.221.148.202.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 202.148.221.131.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.129.144.231 attackspambots
SSH / Telnet Brute Force Attempts on Honeypot
2020-08-05 08:39:54
193.27.229.112 attackspam
Brute forcing RDP port 3389
2020-08-05 08:20:42
94.102.59.107 attackspam
Attempt to log onto Postfix
2020-08-05 08:20:09
190.78.67.98 attackbots
1596563576 - 08/04/2020 19:52:56 Host: 190.78.67.98/190.78.67.98 Port: 445 TCP Blocked
2020-08-05 08:31:03
109.21.212.151 attack
Sniffing for wp-login
2020-08-05 08:18:16
187.192.138.1 attack
20/8/4@13:53:09: FAIL: Alarm-Intrusion address from=187.192.138.1
...
2020-08-05 08:24:41
163.172.93.131 attackbots
Failed password for root from 163.172.93.131 port 54944 ssh2
2020-08-05 08:34:53
94.102.49.159 attackspambots
Aug502:03:44server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.52LEN=40TOS=0x00PREC=0x00TTL=249ID=40644PROTO=TCPSPT=57709DPT=17638WINDOW=1024RES=0x00SYNURGP=0Aug502:03:58server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=25432PROTO=TCPSPT=57709DPT=17373WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=16205PROTO=TCPSPT=57709DPT=17851WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.55LEN=40TOS=0x00PREC=0x00TTL=249ID=40984PROTO=TCPSPT=57709DPT=15255WINDOW=1024RES=0x00SYNURGP=0Aug502:04:03server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7
2020-08-05 08:09:22
13.84.35.115 attackbots
(sshd) Failed SSH login from 13.84.35.115 (US/United States/-): 5 in the last 3600 secs
2020-08-05 08:13:35
106.52.135.88 attack
Aug  4 17:45:12 host sshd\[7232\]: Failed password for root from 106.52.135.88 port 51564 ssh2
Aug  4 17:50:56 host sshd\[8375\]: Failed password for root from 106.52.135.88 port 57380 ssh2
Aug  4 17:56:38 host sshd\[9495\]: Failed password for root from 106.52.135.88 port 34964 ssh2
...
2020-08-05 08:21:06
156.236.72.149 attack
Aug  5 07:24:41 localhost sshd[971571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.72.149  user=root
Aug  5 07:24:43 localhost sshd[971571]: Failed password for root from 156.236.72.149 port 60520 ssh2
...
2020-08-05 08:27:54
117.194.117.145 attackbots
1596563603 - 08/04/2020 19:53:23 Host: 117.194.117.145/117.194.117.145 Port: 445 TCP Blocked
2020-08-05 08:14:35
187.141.128.42 attack
Ssh brute force
2020-08-05 08:43:56
51.38.71.36 attackspambots
SSH brutforce
2020-08-05 08:41:52
194.152.206.103 attack
Aug  4 21:04:51 vps647732 sshd[25629]: Failed password for root from 194.152.206.103 port 41981 ssh2
...
2020-08-05 08:42:35

Recently Reported IPs

2606:4700:10::ac43:2531 10.53.183.46 10.209.4.53 10.160.35.245
43.142.176.157 86.102.75.168 240e:370:4948:4040:39ab:7ede:5b0c:d73f 148.153.56.60
2606:4700:10::6814:5659 2606:4700:10::6814:9099 2606:4700:10::6814:8235 2606:4700:10::6816:4575
2606:4700:10::6814:9162 2606:4700:10::6816:979 2606:4700:10::6816:3888 2606:4700:10::ac43:826
164.155.74.152 2606:4700:10::6814:4415 2606:4700:10::6814:8550 109.162.246.33