City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 140.109.0.0 - 140.138.255.255
CIDR: 140.112.0.0/12, 140.136.0.0/15, 140.128.0.0/13, 140.138.0.0/16, 140.109.0.0/16, 140.110.0.0/15
NetName: APNIC-ERX-140-109-0-0
NetHandle: NET-140-109-0-0-1
Parent: NET140 (NET-140-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2003-07-14
Updated: 2009-10-08
Comment: This IP address range is not registered in the ARIN database.
Comment: This range was transferred to the APNIC Whois Database as
Comment: part of the ERX (Early Registration Transfer) project.
Comment: For details, refer to the APNIC Whois Database via
Comment: WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:
Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment: for the Asia Pacific region. APNIC does not operate networks
Comment: using this IP address range and is not able to investigate
Comment: spam or abuse reports relating to these addresses. For more
Comment: help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/140.109.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '140.112.0.0 - 140.112.255.255'
% Abuse contact for '140.112.0.0 - 140.112.255.255' is 'noc@mail.moe.gov.tw'
inetnum: 140.112.0.0 - 140.112.255.255
netname: TANET
descr: Taiwan Academic Network
descr: Ministry of Education computer Center
descr: 12F, No 106, Sec. 2, Heping E. Rd., Taipei
country: TW
admin-c: TA61-AP
tech-c: TA61-AP
abuse-c: AT939-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-irt: IRT-TANET-TW
last-modified: 2025-11-07T01:37:02Z
source: APNIC
irt: IRT-TANET-TW
address: Ministry of Education computer Center
address: 12F, No 106, Sec. 2, Heping E. Rd., Taipei
e-mail: noc@mail.moe.gov.tw
abuse-mailbox: noc@mail.moe.gov.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:51:48Z
source: APNIC
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: TANET ADMIN
nic-hdl: TA61-AP
e-mail: noc@mail.moe.gov.tw
address: 12F, No 106, Sec. 2, Heping E. Rd., Taipei
address: Taipei, 106, R.O.C
phone: +886-2-7712-9079
fax-no: +886-2-2737-7043
country: TW
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-08-28T08:29:03Z
source: APNIC
remarks: (hid:K92-TW)
% Information related to '140.112.0.0 - 140.112.255.255'
inetnum: 140.112.0.0 - 140.112.255.255
netname: T-NTU.EDU.TW-NET
descr: Ministry of Education Computer Center
descr: 12F, No 106, Sec.2,Hoping E. Rd.
descr: Taipei Taiwan
country: TW
admin-c: AN187-TW
tech-c: AN187-TW
mnt-by: MAINT-TW-TWNIC
changed: noc@mail.moe.gov.tw 19900324
status: ASSIGNED NON-PORTABLE
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: ADMIN NTU
address: National Taiwan University
address: No. 1, Sec. 4, Roosevelt Road
address: Taipei Taiwan
country: TW
phone: +886-2-3366-5006
fax-no: +886-2-2363-7204
e-mail: abuse@ntu.edu.tw
nic-hdl: AN187-TW
changed: hostmaster@twnic.net 20090116
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.112.202.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.112.202.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 09:30:41 CST 2026
;; MSG SIZE rcvd: 108
b'Host 132.202.112.140.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 140.112.202.132.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 74.208.160.87 | attack | SSH login attempts. |
2020-09-07 17:18:02 |
| 103.43.185.142 | attackspam | Sep 7 05:17:45 havingfunrightnow sshd[10104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142 Sep 7 05:17:47 havingfunrightnow sshd[10104]: Failed password for invalid user test from 103.43.185.142 port 34856 ssh2 Sep 7 05:31:37 havingfunrightnow sshd[10440]: Failed password for root from 103.43.185.142 port 37820 ssh2 ... |
2020-09-07 16:47:39 |
| 112.85.42.174 | attackspam | $f2bV_matches |
2020-09-07 17:09:19 |
| 190.215.112.122 | attackspam | Sep 7 08:50:10 MainVPS sshd[25820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 user=root Sep 7 08:50:12 MainVPS sshd[25820]: Failed password for root from 190.215.112.122 port 50433 ssh2 Sep 7 08:54:45 MainVPS sshd[2672]: Invalid user pwn3 from 190.215.112.122 port 52318 Sep 7 08:54:45 MainVPS sshd[2672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 Sep 7 08:54:45 MainVPS sshd[2672]: Invalid user pwn3 from 190.215.112.122 port 52318 Sep 7 08:54:46 MainVPS sshd[2672]: Failed password for invalid user pwn3 from 190.215.112.122 port 52318 ssh2 ... |
2020-09-07 16:58:02 |
| 87.251.74.201 | attackspambots | 2020-09-06 04:59:54 Reject access to port(s):3389 1 times a day |
2020-09-07 16:45:56 |
| 174.138.13.133 | attackspam | Sep 7 09:03:40 vps-51d81928 sshd[278806]: Failed password for root from 174.138.13.133 port 49420 ssh2 Sep 7 09:05:51 vps-51d81928 sshd[278845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.13.133 user=root Sep 7 09:05:53 vps-51d81928 sshd[278845]: Failed password for root from 174.138.13.133 port 33654 ssh2 Sep 7 09:08:08 vps-51d81928 sshd[278879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.13.133 user=root Sep 7 09:08:10 vps-51d81928 sshd[278879]: Failed password for root from 174.138.13.133 port 46118 ssh2 ... |
2020-09-07 17:14:25 |
| 150.136.152.190 | attack | Sep 7 02:39:18 ns382633 sshd\[28291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.152.190 user=root Sep 7 02:39:19 ns382633 sshd\[28291\]: Failed password for root from 150.136.152.190 port 50960 ssh2 Sep 7 03:05:11 ns382633 sshd\[753\]: Invalid user lsfadmin from 150.136.152.190 port 42138 Sep 7 03:05:11 ns382633 sshd\[753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.152.190 Sep 7 03:05:13 ns382633 sshd\[753\]: Failed password for invalid user lsfadmin from 150.136.152.190 port 42138 ssh2 |
2020-09-07 16:44:07 |
| 201.163.1.66 | attackbotsspam | 2020-09-07T10:45:02+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-09-07 17:03:44 |
| 51.77.41.246 | attackspam | (sshd) Failed SSH login from 51.77.41.246 (PL/Poland/ip-51-77-41.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 7 04:24:52 server sshd[15019]: Invalid user noeller from 51.77.41.246 port 42520 Sep 7 04:24:54 server sshd[15019]: Failed password for invalid user noeller from 51.77.41.246 port 42520 ssh2 Sep 7 04:36:24 server sshd[19012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.41.246 user=root Sep 7 04:36:26 server sshd[19012]: Failed password for root from 51.77.41.246 port 46008 ssh2 Sep 7 04:39:09 server sshd[19808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.41.246 user=root |
2020-09-07 17:21:01 |
| 89.248.160.150 | attackbotsspam | 89.248.160.150 was recorded 7 times by 4 hosts attempting to connect to the following ports: 8809,8828. Incident counter (4h, 24h, all-time): 7, 38, 16610 |
2020-09-07 17:00:00 |
| 201.182.66.18 | attackspam | Unauthorized connection attempt from IP address 201.182.66.18 on Port 445(SMB) |
2020-09-07 17:10:29 |
| 111.229.78.212 | attackbots | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-09-07 17:07:56 |
| 49.235.209.206 | attackspam | 2020-09-07T10:54:20.405886ks3355764 sshd[18605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.206 user=root 2020-09-07T10:54:22.462767ks3355764 sshd[18605]: Failed password for root from 49.235.209.206 port 47036 ssh2 ... |
2020-09-07 16:58:17 |
| 222.186.15.115 | attack | SSH Brute-force |
2020-09-07 17:20:40 |
| 200.45.147.129 | attack | ... |
2020-09-07 16:42:33 |