Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.160.64.0 - 202.160.95.255'

% Abuse contact for '202.160.64.0 - 202.160.95.255' is 'jft.admin@jforce.com.tw'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd.
descr:          ISP, Taiwan, R.O.C.
descr:          AS2914 NTT America, Inc.
country:        TW
admin-c:        TW108-AP
tech-c:         TW108-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
remarks:        Transfer from APNIC 20040120
mnt-by:         MAINT-TW-TWNIC
mnt-irt:        IRT-TPSILKERA-TW
last-modified:  2025-11-07T02:26:16Z
source:         APNIC

irt:            IRT-TPSILKERA-TW
address:        New Silkera Network Corp.
address:        2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
address:        Taipei
phone:          +886-2-2796-1557 ext 123
e-mail:         jft.admin@jforce.com.tw
abuse-mailbox:  jft.admin@jforce.com.tw
admin-c:        TR585-AP
tech-c:         TR585-AP
remarks:        (oid:TPSILKERA)
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:52:45Z
source:         APNIC
auth:           # Filtered

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Truman Wu
address:        New Silkera Network Corp. 4F-3, No. 508, Sec. 5, Chung-Hsiao E. Rd. Taipei,  Taiwan
country:        TW
phone:          +886 2 2759 1319
fax-no:         +886 2 2727 6602
e-mail:         vdbill@silkera.net
nic-hdl:        TW108-AP
mnt-by:         MAINT-TW-TWNIC
last-modified:  2008-09-04T07:31:23Z
source:         APNIC

% Information related to '202.160.88.0/21AS10103'

route:          202.160.88.0/21
origin:         AS10103
descr:          route object for 202.160.88.0/21
mnt-by:         MAINT-TW-TWNIC
last-modified:  2024-07-25T09:21:55Z
source:         APNIC

% Information related to '202.160.88.0/21AS152179'

route:          202.160.88.0/21
origin:         AS152179
descr:          route object for 202.160.88.0/21
mnt-by:         MAINT-TW-TWNIC
last-modified:  2024-07-25T09:22:04Z
source:         APNIC

% Information related to '202.160.64.0 - 202.160.95.255'

inetnum:        202.160.64.0 - 202.160.95.255
netname:        SILKERA-NET
descr:          New Silkera Network Corp.
descr:          2F-1, No. 196, Xinhu 3rd. Road, Neihu Dist.
descr:          Taipei Taiwan
country:        TW
admin-c:        NV1-TW
tech-c:         NV1-TW
mnt-by:         MAINT-TW-TWNIC
changed:        jft.admin@jforce.com.tw 20061002
status:         ASSIGNED NON-PORTABLE
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         NSN VDAdm
address:        New Silkera Network
address:        15F, No.510, Sec 5, Chung-Hsiao E. Rd.
address:        Taipei Taiwan
country:        TW
phone:          +886-2-2759-1319
fax-no:         +886-2-2727-6602
e-mail:         vdadm@silkera.net
nic-hdl:        NV1-TW
changed:        hostmaster@twnic.net 20010410
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.160.91.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58655
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.160.91.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 11:16:06 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 71.91.160.202.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 202.160.91.71.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.172 attackspam
sshd jail - ssh hack attempt
2020-03-23 05:11:52
222.186.175.23 attackbotsspam
Mar 22 21:53:13 vps691689 sshd[7356]: Failed password for root from 222.186.175.23 port 57810 ssh2
Mar 22 21:53:15 vps691689 sshd[7356]: Failed password for root from 222.186.175.23 port 57810 ssh2
Mar 22 21:53:18 vps691689 sshd[7356]: Failed password for root from 222.186.175.23 port 57810 ssh2
...
2020-03-23 04:57:00
35.227.35.222 attackspam
$f2bV_matches
2020-03-23 04:56:27
118.163.135.17 attackspambots
(imapd) Failed IMAP login from 118.163.135.17 (TW/Taiwan/118-163-135-17.HINET-IP.hinet.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 22 22:46:18 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=118.163.135.17, lip=5.63.12.44, session=
2020-03-23 05:18:45
175.210.201.63 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-23 05:24:19
37.28.154.68 attackspam
Automatic report - Banned IP Access
2020-03-23 05:19:19
54.185.186.155 attack
IDS admin
2020-03-23 05:12:16
124.105.87.101 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 05:14:12
162.247.73.192 attackbotsspam
$f2bV_matches
2020-03-23 04:54:51
212.152.181.201 attackspambots
Honeypot attack, port: 445, PTR: nitweb11.nit.at.
2020-03-23 05:17:44
198.144.189.250 attackbotsspam
2020-03-22T19:53:29.415205struts4.enskede.local sshd\[11173\]: Invalid user ubnt from 198.144.189.250 port 52070
2020-03-22T19:53:29.421459struts4.enskede.local sshd\[11173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.144.189.250
2020-03-22T19:53:32.707897struts4.enskede.local sshd\[11173\]: Failed password for invalid user ubnt from 198.144.189.250 port 52070 ssh2
2020-03-22T19:53:33.679802struts4.enskede.local sshd\[11175\]: Invalid user admin from 198.144.189.250 port 60424
2020-03-22T19:53:33.687990struts4.enskede.local sshd\[11175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.144.189.250
...
2020-03-23 05:20:10
51.89.199.107 attackspam
(smtpauth) Failed SMTP AUTH login from 51.89.199.107 (FR/France/ip107.ip-51-89-199.eu): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-22 17:25:58 plain authenticator failed for ip107.ip-51-89-199.eu [51.89.199.107]: 535 Incorrect authentication data (set_id=a_abedan@azarpishro.com)
2020-03-23 05:23:33
35.198.138.59 attackspambots
Fail2Ban Ban Triggered
2020-03-23 05:06:36
198.98.52.141 attackbotsspam
22.03.2020 17:33:34 Connection to port 8080 blocked by firewall
2020-03-23 04:59:06
49.88.112.112 attackspambots
Mar 22 22:13:20 jane sshd[31867]: Failed password for root from 49.88.112.112 port 36491 ssh2
Mar 22 22:13:24 jane sshd[31867]: Failed password for root from 49.88.112.112 port 36491 ssh2
...
2020-03-23 05:22:49

Recently Reported IPs

131.24.199.74 114.230.196.177 10.108.79.200 196.16.81.173
30.40.59.167 210.116.247.203 10.220.153.35 64.42.181.152
113.116.59.117 210.110.187.212 216.180.246.233 14.18.16.154
157.245.253.52 2606:4700:10::6814:5061 110.78.156.127 2606:4700:10::ac43:1512
2606:4700:10::6816:3460 110.78.153.133 2606:4700:10::6816:1552 2606:4700:10::6814:8871