Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.137.22.0 - 103.137.23.255'

% Abuse contact for '103.137.22.0 - 103.137.23.255' is 'soc@imcloud.tw'

inetnum:        103.137.22.0 - 103.137.23.255
country:        TW
netname:        SDCL-TW-NET
admin-c:        SDCL2-AP
tech-c:         SDCL2-AP
abuse-c:        SDCL2-AP
mnt-irt:        IRT-SDCL-TW-TW
descr:          Sky Digital Co., Ltd.
descr:          Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
status:         ALLOCATED PORTABLE
last-modified:  2025-11-24T14:07:10Z
source:         APNIC
mnt-by:         MAINT-TW-TWNIC

irt:            IRT-SDCL-TW-TW
address:        Sky Digital Co., Ltd.
address:        Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
phone:          +88634271005
e-mail:         soc@imcloud.tw
abuse-mailbox:  soc@imcloud.tw
admin-c:        TR524-AP
tech-c:         TR524-AP
auth:           # Filtered
remarks:        (oid:SDCL-TW)
remarks:        soc@imcloud.tw was validated on 2023-06-27
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:46:54Z
source:         APNIC

role:           Sky Digital Co Ltd administrator
address:        Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676
country:        TW
phone:          +88634271005
fax-no:         +88634271009
e-mail:         abuse@idc-tw.com
admin-c:        SDCL2-AP
tech-c:         SDCL2-AP
nic-hdl:        SDCL2-AP
mnt-by:         MAINT-SDCL-TW
last-modified:  2023-07-18T17:00:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.137.22.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.137.22.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 18:16:09 CST 2026
;; MSG SIZE  rcvd: 107
Host info
105.22.137.103.in-addr.arpa domain name pointer 103-137-22-105.TW-TPE.telecom.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.22.137.103.in-addr.arpa	name = 103-137-22-105.TW-TPE.telecom.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
145.239.169.177 attack
Nov 12 18:51:50 heissa sshd\[23372\]: Invalid user ausgrabungsstaette from 145.239.169.177 port 12651
Nov 12 18:51:50 heissa sshd\[23372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.169.177
Nov 12 18:51:52 heissa sshd\[23372\]: Failed password for invalid user ausgrabungsstaette from 145.239.169.177 port 12651 ssh2
Nov 12 19:01:02 heissa sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.169.177  user=sync
Nov 12 19:01:05 heissa sshd\[24860\]: Failed password for sync from 145.239.169.177 port 26717 ssh2
2019-11-13 02:34:16
49.88.112.113 attackspambots
Failed password for root from 49.88.112.113 port 51104 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Failed password for root from 49.88.112.113 port 19277 ssh2
Failed password for root from 49.88.112.113 port 19277 ssh2
Failed password for root from 49.88.112.113 port 19277 ssh2
2019-11-13 02:41:54
150.95.217.109 attackspambots
Nov 12 18:16:10 nextcloud sshd\[14184\]: Invalid user marekniewadzi from 150.95.217.109
Nov 12 18:16:10 nextcloud sshd\[14184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.109
Nov 12 18:16:12 nextcloud sshd\[14184\]: Failed password for invalid user marekniewadzi from 150.95.217.109 port 55010 ssh2
...
2019-11-13 02:47:11
51.77.194.241 attackbotsspam
2019-11-12 01:44:14 server sshd[9335]: Failed password for invalid user walaha from 51.77.194.241 port 49482 ssh2
2019-11-13 02:34:36
182.127.78.220 attackspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-13 02:25:47
129.158.73.144 attack
Nov 12 17:17:12 server sshd\[722\]: Invalid user rpm from 129.158.73.144
Nov 12 17:17:12 server sshd\[722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-144.compute.oraclecloud.com 
Nov 12 17:17:14 server sshd\[722\]: Failed password for invalid user rpm from 129.158.73.144 port 32681 ssh2
Nov 12 17:37:17 server sshd\[6444\]: Invalid user server from 129.158.73.144
Nov 12 17:37:17 server sshd\[6444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-144.compute.oraclecloud.com 
...
2019-11-13 02:49:17
115.186.148.38 attackspambots
$f2bV_matches
2019-11-13 02:39:17
206.189.165.94 attackbots
SSH bruteforce (Triggered fail2ban)
2019-11-13 02:35:07
218.76.140.201 attackspam
$f2bV_matches
2019-11-13 02:36:21
106.75.148.114 attack
Nov 12 15:37:11 herz-der-gamer sshd[9623]: Invalid user qzhao from 106.75.148.114 port 39678
Nov 12 15:37:11 herz-der-gamer sshd[9623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114
Nov 12 15:37:11 herz-der-gamer sshd[9623]: Invalid user qzhao from 106.75.148.114 port 39678
Nov 12 15:37:13 herz-der-gamer sshd[9623]: Failed password for invalid user qzhao from 106.75.148.114 port 39678 ssh2
...
2019-11-13 02:51:57
89.42.252.124 attack
SSHScan
2019-11-13 02:45:37
157.44.34.87 attackspam
ENG,WP GET /wp-login.php
2019-11-13 02:45:16
200.89.178.214 attack
5x Failed Password
2019-11-13 02:46:18
116.113.70.106 attackspambots
k+ssh-bruteforce
2019-11-13 02:21:41
221.160.100.14 attack
Nov 12 10:44:26 server sshd\[29056\]: Failed password for invalid user zimbra from 221.160.100.14 port 59196 ssh2
Nov 12 18:15:34 server sshd\[16879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14  user=root
Nov 12 18:15:37 server sshd\[16879\]: Failed password for root from 221.160.100.14 port 36200 ssh2
Nov 12 21:08:02 server sshd\[30510\]: Invalid user test from 221.160.100.14
Nov 12 21:08:02 server sshd\[30510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 
...
2019-11-13 02:27:23

Recently Reported IPs

2606:4700:10::6816:768 2606:4700:10::6814:5306 2606:4700:10::6816:467 2606:4700:10::6814:6463
2606:4700:10::6816:1894 2606:4700:10::6814:5798 192.204.36.105 2606:4700:10::6816:1457
122.193.247.148 122.193.247.141 2606:4700:10::6816:2198 118.253.180.93
2606:4700:10::6814:8931 2606:4700:10::6814:8498 2606:4700:10::6814:5657 2606:4700:10::ac43:1679
2606:4700:10::6814:6737 2606:4700:10::6814:8307 2606:4700:10::6814:5824 2606:4700:10::ac43:1589