City: unknown
Region: unknown
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.17.240.0 - 103.17.243.255'
% Abuse contact for '103.17.240.0 - 103.17.243.255' is 'miguel.yeh@hgc-intl.com'
inetnum: 103.17.240.0 - 103.17.243.255
netname: LEOLCY-NET
descr: Hutchison Global Communications(Taiwan) Limited
descr: 18F-1, No. 77, Dun-Hua South Road, Section 2
descr: Taipei Taiwan 106
country: TW
admin-c: LL2314-AP
tech-c: LL2314-AP
abuse-c: AT939-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-lower: MAINT-TW-TWNIC
mnt-routes: MAINT-TW-TWNIC
mnt-irt: IRT-LEOLCY-TW
last-modified: 2023-11-30T03:50:20Z
source: APNIC
irt: IRT-LEOLCY-TW
address: Hutchison Global Communications(Taiwan) Limited
address: 18F-1, No. 77, Dun-Hua South Road, Section 2
address: Taipei Taiwan 106
e-mail: miguel.yeh@hgc-intl.com
abuse-mailbox: miguel.yeh@hgc-intl.com
admin-c: LL2314-AP
tech-c: LL2314-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:23:30Z
source: APNIC
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: Leo Leung
nic-hdl: LL2314-AP
e-mail: leo.leung@hgc.com.hk
address: 18F-1, No. 77, Dun-Hua South Road, Section 2
address: Taipei, 106, R.O.C
phone: +886-2-2705-7110
fax-no: +886-2-2705-6957
country: TW
mnt-by: MAINT-TW-TWNIC
last-modified: 2013-01-08T05:56:01Z
source: APNIC
% Information related to '103.17.240.0 - 103.17.240.255'
inetnum: 103.17.240.0 - 103.17.240.255
netname: HGCTW-NET
descr: HGC Global Communications
descr: 18F-1, No. 77, Dun-Hua South Road, Section 2
descr: Taipei Taiwan
country: TW
admin-c: DW343-TW
tech-c: LL1514-TW
mnt-by: MAINT-TW-TWNIC
changed: miguel.yeh@hgc-intl.com 20140129
status: ASSIGNED NON-PORTABLE
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: Daniel Wang
address: HGC Global Communications
address: 18F-1, No. 77, Dun-Hua South Road, Section 2
address: Taipei Taiwan
country: TW
phone: +886-2-2705-7110
fax-no: +886-2-2705-6957
e-mail: danielwsc@hgc-intl.com
nic-hdl: DW343-TW
changed: hostmaster@twnic.net 20130108
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: Leo Leung
address: HGC Global Communications
address: 18F-1, No. 77, Dun-Hua South Road, Section 2
address: Taipei Taiwan
country: TW
phone: +886-2-2705-7110
fax-no: +886-2-2705-6957
e-mail: leo.leung@hgc.com.hk
nic-hdl: LL1514-TW
changed: hostmaster@twnic.net 20130108
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.17.240.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.17.240.36. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120200 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 00:05:20 CST 2025
;; MSG SIZE rcvd: 106
Host 36.240.17.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 36.240.17.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.72.178.114 | attack | Apr 8 23:46:11 sticky sshd\[4988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114 user=root Apr 8 23:46:13 sticky sshd\[4988\]: Failed password for root from 182.72.178.114 port 23530 ssh2 Apr 8 23:50:56 sticky sshd\[5022\]: Invalid user deploy from 182.72.178.114 port 12265 Apr 8 23:50:56 sticky sshd\[5022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114 Apr 8 23:50:58 sticky sshd\[5022\]: Failed password for invalid user deploy from 182.72.178.114 port 12265 ssh2 ... |
2020-04-09 05:58:38 |
| 157.245.83.211 | attack | firewall-block, port(s): 18082/tcp |
2020-04-09 05:31:43 |
| 180.76.141.184 | attackspam | Apr 8 18:39:58 santamaria sshd\[22353\]: Invalid user test from 180.76.141.184 Apr 8 18:39:58 santamaria sshd\[22353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.184 Apr 8 18:40:00 santamaria sshd\[22353\]: Failed password for invalid user test from 180.76.141.184 port 46762 ssh2 ... |
2020-04-09 05:29:11 |
| 49.235.161.88 | attackbots | Apr 8 sshd[12655]: Invalid user admin from 49.235.161.88 port 55742 |
2020-04-09 05:45:03 |
| 198.199.115.94 | attackbots | Apr 8 23:43:41 vps sshd[100407]: Failed password for invalid user printer from 198.199.115.94 port 37428 ssh2 Apr 8 23:47:22 vps sshd[122941]: Invalid user deploy from 198.199.115.94 port 33358 Apr 8 23:47:22 vps sshd[122941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.115.94 Apr 8 23:47:24 vps sshd[122941]: Failed password for invalid user deploy from 198.199.115.94 port 33358 ssh2 Apr 8 23:51:04 vps sshd[146128]: Invalid user wpyan from 198.199.115.94 port 57516 ... |
2020-04-09 05:51:08 |
| 185.232.65.234 | attack | 81/tcp 88/tcp 1080/tcp... [2020-04-08]14pkt,14pt.(tcp) |
2020-04-09 05:34:06 |
| 14.120.180.223 | attackspambots | Unauthorised access (Apr 8) SRC=14.120.180.223 LEN=40 TTL=53 ID=14846 TCP DPT=8080 WINDOW=41194 SYN Unauthorised access (Apr 8) SRC=14.120.180.223 LEN=40 TTL=53 ID=15219 TCP DPT=8080 WINDOW=60850 SYN |
2020-04-09 05:38:35 |
| 54.38.180.93 | attackbotsspam | Apr 8 23:45:29 MainVPS sshd[31870]: Invalid user admin from 54.38.180.93 port 51104 Apr 8 23:45:29 MainVPS sshd[31870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.180.93 Apr 8 23:45:29 MainVPS sshd[31870]: Invalid user admin from 54.38.180.93 port 51104 Apr 8 23:45:31 MainVPS sshd[31870]: Failed password for invalid user admin from 54.38.180.93 port 51104 ssh2 Apr 8 23:51:05 MainVPS sshd[11167]: Invalid user tfcserver from 54.38.180.93 port 37992 ... |
2020-04-09 05:53:32 |
| 139.99.131.6 | attackbots | Trolling for resource vulnerabilities |
2020-04-09 05:36:43 |
| 222.186.30.167 | attack | Apr 8 23:44:27 vmd38886 sshd\[4883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root Apr 8 23:44:29 vmd38886 sshd\[4883\]: Failed password for root from 222.186.30.167 port 38105 ssh2 Apr 8 23:44:32 vmd38886 sshd\[4883\]: Failed password for root from 222.186.30.167 port 38105 ssh2 |
2020-04-09 05:50:07 |
| 137.74.132.171 | attack | frenzy |
2020-04-09 05:37:05 |
| 178.168.220.172 | attackbots | 04/08/2020-08:35:05.512556 178.168.220.172 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-09 05:32:55 |
| 2604:a880:400:d0::18eb:f001 | attackspambots | 5901/tcp 6001/tcp [2020-04-08]2pkt |
2020-04-09 05:28:44 |
| 37.235.28.42 | attackbots | proto=tcp . spt=45562 . dpt=25 . Found on Dark List de (185) |
2020-04-09 05:22:18 |
| 128.199.171.81 | attackbotsspam | Apr 8 21:04:00 work-partkepr sshd\[29584\]: Invalid user tidb from 128.199.171.81 port 11496 Apr 8 21:04:00 work-partkepr sshd\[29584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.171.81 ... |
2020-04-09 05:27:04 |