City: Taichung
Region: Taichung
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.254.64.0 - 121.254.95.255'
% Abuse contact for '121.254.64.0 - 121.254.95.255' is 'm2310@emax.net.tw'
inetnum: 121.254.64.0 - 121.254.95.255
netname: VEETIME-TW
descr: VEE TIME CORP.
descr: MAN provider
descr: Taichung Taiwan R.O.C
country: TW
admin-c: FC634-AP
tech-c: FC634-AP
abuse-c: AT939-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-irt: IRT-VEETIME-1-TW
last-modified: 2023-11-30T04:16:31Z
source: APNIC
irt: IRT-VEETIME-1-TW
address: VEE TIME CORP.
address: MAN provider
address: Taichung Taiwan R.O.C
e-mail: m2310@emax.net.tw
abuse-mailbox: m2310@emax.net.tw
admin-c: FC634-AP
tech-c: FC634-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:54:20Z
source: APNIC
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: Frank Chung
address: 21F No.6
Ln256 Sec.2 Shih-tun Rd.
Taichung
Taiwan R.O.C.
country: TW
phone: +886-4-23118000
e-mail: frank@emax.net.tw
nic-hdl: FC634-AP
mnt-by: MAINT-TW-MONAD
last-modified: 2013-02-06T07:51:10Z
source: APNIC
% Information related to '121.254.72.0/21AS17809'
route: 121.254.72.0/21
origin: AS17809
descr: VEE TIME CORP.
1F, No. 55, Ay-Shin Road,
Dali Dist, Taichung City 41261,
mnt-by: MAINT-VEETIME-TW
last-modified: 2019-04-29T05:58:58Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.254.76.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27452
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.254.76.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031901 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 04:50:54 CST 2026
;; MSG SIZE rcvd: 107
213.76.254.121.in-addr.arpa domain name pointer 121-254-76-213.veetime.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.76.254.121.in-addr.arpa name = 121-254-76-213.veetime.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 68.132.71.99 | attack | Unauthorized connection attempt detected from IP address 68.132.71.99 to port 8000 [J] |
2020-01-19 19:41:33 |
| 181.174.125.86 | attack | Jan 19 12:19:15 sso sshd[21027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.125.86 Jan 19 12:19:17 sso sshd[21027]: Failed password for invalid user picasso from 181.174.125.86 port 52264 ssh2 ... |
2020-01-19 19:56:22 |
| 73.171.97.127 | attack | Unauthorized connection attempt detected from IP address 73.171.97.127 to port 23 [J] |
2020-01-19 19:40:55 |
| 187.178.29.128 | attackspambots | 1579425381 - 01/19/2020 10:16:21 Host: 187.178.29.128/187.178.29.128 Port: 23 TCP Blocked |
2020-01-19 19:26:48 |
| 188.121.183.254 | attackspambots | Unauthorized connection attempt detected from IP address 188.121.183.254 to port 23 [J] |
2020-01-19 19:52:57 |
| 182.135.63.227 | attackbots | Unauthorized connection attempt detected from IP address 182.135.63.227 to port 1433 [J] |
2020-01-19 19:27:01 |
| 173.179.186.169 | attackspambots | Unauthorized connection attempt detected from IP address 173.179.186.169 to port 23 [J] |
2020-01-19 19:57:01 |
| 195.158.111.136 | attackbots | Unauthorized connection attempt detected from IP address 195.158.111.136 to port 8080 [J] |
2020-01-19 19:50:50 |
| 113.190.192.58 | attack | Unauthorized connection attempt detected from IP address 113.190.192.58 to port 82 [J] |
2020-01-19 19:37:11 |
| 220.244.178.214 | attack | Unauthorized connection attempt detected from IP address 220.244.178.214 to port 23 [J] |
2020-01-19 19:24:01 |
| 36.79.254.136 | attackspam | Unauthorized connection attempt detected from IP address 36.79.254.136 to port 23 [J] |
2020-01-19 19:44:48 |
| 187.214.189.83 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.214.189.83 to port 9000 [J] |
2020-01-19 19:26:32 |
| 94.28.101.166 | attackbots | Unauthorized connection attempt detected from IP address 94.28.101.166 to port 2220 [J] |
2020-01-19 19:39:19 |
| 94.71.43.200 | attack | Unauthorized connection attempt detected from IP address 94.71.43.200 to port 81 [J] |
2020-01-19 19:38:33 |
| 49.233.136.142 | attackspam | Web App Attack |
2020-01-19 19:42:27 |