City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.137.22.0 - 103.137.23.255'
% Abuse contact for '103.137.22.0 - 103.137.23.255' is 'soc@imcloud.tw'
inetnum: 103.137.22.0 - 103.137.23.255
country: TW
netname: SDCL-TW-NET
admin-c: SDCL2-AP
tech-c: SDCL2-AP
abuse-c: SDCL2-AP
mnt-irt: IRT-SDCL-TW-TW
descr: Sky Digital Co., Ltd.
descr: Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
status: ALLOCATED PORTABLE
last-modified: 2025-11-24T14:07:10Z
source: APNIC
mnt-by: MAINT-TW-TWNIC
irt: IRT-SDCL-TW-TW
address: Sky Digital Co., Ltd.
address: Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
phone: +88634271005
e-mail: soc@imcloud.tw
abuse-mailbox: soc@imcloud.tw
admin-c: TR524-AP
tech-c: TR524-AP
auth: # Filtered
remarks: (oid:SDCL-TW)
remarks: soc@imcloud.tw was validated on 2023-06-27
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:46:54Z
source: APNIC
role: Sky Digital Co Ltd administrator
address: Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676
country: TW
phone: +88634271005
fax-no: +88634271009
e-mail: abuse@idc-tw.com
admin-c: SDCL2-AP
tech-c: SDCL2-AP
nic-hdl: SDCL2-AP
mnt-by: MAINT-SDCL-TW
last-modified: 2023-07-18T17:00:06Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.137.22.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.137.22.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 18:16:09 CST 2026
;; MSG SIZE rcvd: 107
105.22.137.103.in-addr.arpa domain name pointer 103-137-22-105.TW-TPE.telecom.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.22.137.103.in-addr.arpa name = 103-137-22-105.TW-TPE.telecom.tw.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 145.239.169.177 | attack | Nov 12 18:51:50 heissa sshd\[23372\]: Invalid user ausgrabungsstaette from 145.239.169.177 port 12651 Nov 12 18:51:50 heissa sshd\[23372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.169.177 Nov 12 18:51:52 heissa sshd\[23372\]: Failed password for invalid user ausgrabungsstaette from 145.239.169.177 port 12651 ssh2 Nov 12 19:01:02 heissa sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.169.177 user=sync Nov 12 19:01:05 heissa sshd\[24860\]: Failed password for sync from 145.239.169.177 port 26717 ssh2 |
2019-11-13 02:34:16 |
| 49.88.112.113 | attackspambots | Failed password for root from 49.88.112.113 port 51104 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Failed password for root from 49.88.112.113 port 19277 ssh2 Failed password for root from 49.88.112.113 port 19277 ssh2 Failed password for root from 49.88.112.113 port 19277 ssh2 |
2019-11-13 02:41:54 |
| 150.95.217.109 | attackspambots | Nov 12 18:16:10 nextcloud sshd\[14184\]: Invalid user marekniewadzi from 150.95.217.109 Nov 12 18:16:10 nextcloud sshd\[14184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.109 Nov 12 18:16:12 nextcloud sshd\[14184\]: Failed password for invalid user marekniewadzi from 150.95.217.109 port 55010 ssh2 ... |
2019-11-13 02:47:11 |
| 51.77.194.241 | attackbotsspam | 2019-11-12 01:44:14 server sshd[9335]: Failed password for invalid user walaha from 51.77.194.241 port 49482 ssh2 |
2019-11-13 02:34:36 |
| 182.127.78.220 | attackspam | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-11-13 02:25:47 |
| 129.158.73.144 | attack | Nov 12 17:17:12 server sshd\[722\]: Invalid user rpm from 129.158.73.144 Nov 12 17:17:12 server sshd\[722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-144.compute.oraclecloud.com Nov 12 17:17:14 server sshd\[722\]: Failed password for invalid user rpm from 129.158.73.144 port 32681 ssh2 Nov 12 17:37:17 server sshd\[6444\]: Invalid user server from 129.158.73.144 Nov 12 17:37:17 server sshd\[6444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-144.compute.oraclecloud.com ... |
2019-11-13 02:49:17 |
| 115.186.148.38 | attackspambots | $f2bV_matches |
2019-11-13 02:39:17 |
| 206.189.165.94 | attackbots | SSH bruteforce (Triggered fail2ban) |
2019-11-13 02:35:07 |
| 218.76.140.201 | attackspam | $f2bV_matches |
2019-11-13 02:36:21 |
| 106.75.148.114 | attack | Nov 12 15:37:11 herz-der-gamer sshd[9623]: Invalid user qzhao from 106.75.148.114 port 39678 Nov 12 15:37:11 herz-der-gamer sshd[9623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114 Nov 12 15:37:11 herz-der-gamer sshd[9623]: Invalid user qzhao from 106.75.148.114 port 39678 Nov 12 15:37:13 herz-der-gamer sshd[9623]: Failed password for invalid user qzhao from 106.75.148.114 port 39678 ssh2 ... |
2019-11-13 02:51:57 |
| 89.42.252.124 | attack | SSHScan |
2019-11-13 02:45:37 |
| 157.44.34.87 | attackspam | ENG,WP GET /wp-login.php |
2019-11-13 02:45:16 |
| 200.89.178.214 | attack | 5x Failed Password |
2019-11-13 02:46:18 |
| 116.113.70.106 | attackspambots | k+ssh-bruteforce |
2019-11-13 02:21:41 |
| 221.160.100.14 | attack | Nov 12 10:44:26 server sshd\[29056\]: Failed password for invalid user zimbra from 221.160.100.14 port 59196 ssh2 Nov 12 18:15:34 server sshd\[16879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 user=root Nov 12 18:15:37 server sshd\[16879\]: Failed password for root from 221.160.100.14 port 36200 ssh2 Nov 12 21:08:02 server sshd\[30510\]: Invalid user test from 221.160.100.14 Nov 12 21:08:02 server sshd\[30510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 ... |
2019-11-13 02:27:23 |