Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.160.64.0 - 202.160.95.255'

% Abuse contact for '202.160.64.0 - 202.160.95.255' is 'jft.admin@jforce.com.tw'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd.
descr:          ISP, Taiwan, R.O.C.
descr:          AS2914 NTT America, Inc.
country:        TW
admin-c:        TW108-AP
tech-c:         TW108-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
remarks:        Transfer from APNIC 20040120
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-TPSILKERA-TW
last-modified:  2025-11-07T02:26:16Z
source:         APNIC

irt:            IRT-TPSILKERA-TW
address:        New Silkera Network Corp.
address:        2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
address:        Taipei
phone:          +886-2-2796-1557 ext 123
e-mail:         jft.admin@jforce.com.tw
abuse-mailbox:  jft.admin@jforce.com.tw
admin-c:        TR585-AP
tech-c:         TR585-AP
remarks:        (oid:TPSILKERA)
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:52:45Z
source:         APNIC
auth:           # Filtered

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Truman Wu
address:        New Silkera Network Corp. 4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd. Taipei,  Taiwan
country:        TW
phone:          +886 2 2759 1319
fax-no:         +886 2 2727 6602
e-mail:         vdbill@silkera.net
nic-hdl:        TW108-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2008-09-04T07:31:23Z
source:         APNIC

% Information related to '202.160.64.0 - 202.160.95.255'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
descr:          Taipei Taiwan
country:        TW
admin-c:        NV1-TW
tech-c:         NV1-TW
mnt-by:         MAINT-TW-TWNIC
changed:        jft.admin@jforce.com.tw 20061002
status:         ASSIGNED NON-PORTABLE
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         NSN VDAdm
address:        New Silkera Network
address:        15F, No.510, Sec 5, Chung-Hsiao E. Rd.
address:        Taipei Taiwan
country:        TW
phone:          +886-2-2759-1319
fax-no:         +886-2-2727-6602
e-mail:         vdadm@silkera.net
nic-hdl:        NV1-TW
changed:        hostmaster@twnic.net 20010410
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.160.86.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.160.86.191.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 19:18:54 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 191.86.160.202.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 202.160.86.191.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
189.161.223.62 attack
Unauthorized connection attempt detected from IP address 189.161.223.62 to port 445 [T]
2020-08-16 19:37:43
46.191.143.62 attack
Unauthorized connection attempt detected from IP address 46.191.143.62 to port 10023 [T]
2020-08-16 19:31:56
177.94.208.54 attackbots
Unauthorized connection attempt detected from IP address 177.94.208.54 to port 445 [T]
2020-08-16 19:19:43
95.105.12.147 attack
Unauthorized connection attempt detected from IP address 95.105.12.147 to port 80 [T]
2020-08-16 19:26:43
193.118.53.210 attack
 TCP (SYN) 193.118.53.210:23594 -> port 443, len 44
2020-08-16 19:36:53
142.93.47.124 attack
Unauthorized connection attempt detected from IP address 142.93.47.124 to port 7022 [T]
2020-08-16 19:21:54
103.68.176.74 attackbots
Unauthorized connection attempt detected from IP address 103.68.176.74 to port 1433 [T]
2020-08-16 19:06:47
212.98.164.74 attackspambots
Unauthorized connection attempt detected from IP address 212.98.164.74 to port 445 [T]
2020-08-16 19:16:30
222.177.17.107 attack
Unauthorized connection attempt detected from IP address 222.177.17.107 to port 1433 [T]
2020-08-16 19:15:24
91.235.187.132 attackspam
Unauthorized connection attempt detected from IP address 91.235.187.132 to port 1433 [T]
2020-08-16 19:27:50
164.68.110.55 attack
 TCP (SYN) 164.68.110.55:35687 -> port 445, len 52
2020-08-16 19:21:02
151.80.145.175 attackbots
Unauthorized connection attempt detected from IP address 151.80.145.175 to port 443 [T]
2020-08-16 19:02:55
123.202.145.209 attack
Unauthorized connection attempt detected from IP address 123.202.145.209 to port 5555 [T]
2020-08-16 19:23:06
213.81.196.31 attackbots
 TCP (SYN) 213.81.196.31:53612 -> port 1433, len 40
2020-08-16 19:35:29
188.44.110.215 attackspam
Unauthorized connection attempt detected from IP address 188.44.110.215 to port 80 [T]
2020-08-16 19:38:33

Recently Reported IPs

2606:4700:10::6816:2267 2606:4700:10::ac43:706 52.84.50.0 4.232.188.102
221.238.131.250 34.96.52.79 185.241.32.124 2606:4700:10::ac43:1957
2606:4700:10::6814:8076 2606:4700:10::6814:4991 110.78.154.190 2606:4700:10::6816:3338
2606:4700:10::6814:9420 167.71.53.238 151.252.107.21 43.98.191.225
43.98.197.211 2606:4700:10::ac43:218e 2606:4700:10::6814:4893 69.30.197.146