City: unknown
Region: unknown
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.12.76.0 - 202.12.79.255'
% Abuse contact for '202.12.76.0 - 202.12.79.255' is 'chris@host.com.tw'
inetnum: 202.12.76.0 - 202.12.79.255
netname: YUANJHEN
descr: Yuan-Jhen Info., Co., Ltd
descr: 12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,
descr: New Taipei City, 235
country: TW
admin-c: YN371-AP
tech-c: YN371-AP
abuse-c: AT939-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-lower: MAINT-TW-TWNIC
mnt-irt: IRT-YUANJHEN-TW
last-modified: 2023-11-30T04:19:09Z
source: APNIC
irt: IRT-YUANJHEN-TW
address: Yuan-Jhen Info., Co., Ltd
address: 12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,
address: New Taipei City, 235
e-mail: chris@host.com.tw
abuse-mailbox: chris@host.com.tw
admin-c: YC2393-AP
tech-c: YC2393-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:55:47Z
source: APNIC
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: YUANJHEN NOC
address: 12F., No.866-11, Zhongzheng Rd., Zhonghe Dist., New Taipei City, 235, R.O.C
country: TW
phone: +886-2-7753-7313
e-mail: abuse@twnoc.net
nic-hdl: YN371-AP
mnt-by: MAINT-TW-TWNIC
last-modified: 2023-02-10T08:13:55Z
source: APNIC
% Information related to '202.12.79.0/24AS131149'
route: 202.12.79.0/24
origin: AS131149
country: TW
descr: Yuan-Jhen Info., Co., Ltd
descr: 12F., No.866-7, Zhongzheng Rd., Zhonghe Dist.,New Taipei City, 235, R.O.C
descr: NewTaipei City
last-modified: 2025-12-31T03:57:52Z
source: APNIC
mnt-by: MAINT-TW-TWNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.12.79.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.12.79.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 22:51:49 CST 2026
;; MSG SIZE rcvd: 106
137.79.12.202.in-addr.arpa domain name pointer 202-12-79-137.static.ip.net.tw.
b'137.79.12.202.in-addr.arpa name = 202-12-79-137.static.ip.net.tw.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.203.76.251 | attack | 2020-06-19T22:42:24.479408abusebot-8.cloudsearch.cf sshd[7491]: Invalid user wwwmirror from 41.203.76.251 port 43364 2020-06-19T22:42:25.230606abusebot-8.cloudsearch.cf sshd[7493]: Invalid user library-koha from 41.203.76.251 port 57196 2020-06-19T22:42:24.486019abusebot-8.cloudsearch.cf sshd[7491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.76.251 2020-06-19T22:42:24.479408abusebot-8.cloudsearch.cf sshd[7491]: Invalid user wwwmirror from 41.203.76.251 port 43364 2020-06-19T22:42:26.741347abusebot-8.cloudsearch.cf sshd[7491]: Failed password for invalid user wwwmirror from 41.203.76.251 port 43364 ssh2 2020-06-19T22:42:25.238929abusebot-8.cloudsearch.cf sshd[7493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.76.251 2020-06-19T22:42:25.230606abusebot-8.cloudsearch.cf sshd[7493]: Invalid user library-koha from 41.203.76.251 port 57196 2020-06-19T22:42:27.630030abusebot-8.cloudsearch.cf ... |
2020-06-20 06:57:27 |
| 193.112.163.159 | attackbotsspam | $f2bV_matches |
2020-06-20 06:55:17 |
| 5.208.160.111 | attackspambots | Email rejected due to spam filtering |
2020-06-20 07:18:27 |
| 61.133.232.254 | attackbotsspam | SSH Invalid Login |
2020-06-20 07:00:19 |
| 113.161.177.242 | attack | 445/tcp 445/tcp 445/tcp... [2020-05-01/06-19]5pkt,1pt.(tcp) |
2020-06-20 06:48:07 |
| 181.188.146.20 | attackspambots | 1433/tcp 445/tcp... [2020-06-06/19]4pkt,2pt.(tcp) |
2020-06-20 06:55:38 |
| 87.251.74.41 | attack | Jun 20 00:49:04 debian-2gb-nbg1-2 kernel: \[14865631.933587\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.41 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=52084 PROTO=TCP SPT=55178 DPT=111 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-20 07:03:49 |
| 195.224.138.61 | attackbotsspam | Invalid user open from 195.224.138.61 port 32984 |
2020-06-20 06:58:25 |
| 151.80.173.36 | attack | SSH Invalid Login |
2020-06-20 06:54:22 |
| 103.9.231.116 | attackspam | 37215/tcp 37215/tcp 37215/tcp... [2020-06-06/19]8pkt,1pt.(tcp) |
2020-06-20 06:50:01 |
| 114.141.132.88 | attackbotsspam | Jun 19 18:38:35 firewall sshd[7979]: Invalid user test from 114.141.132.88 Jun 19 18:38:37 firewall sshd[7979]: Failed password for invalid user test from 114.141.132.88 port 11227 ssh2 Jun 19 18:39:29 firewall sshd[7993]: Invalid user oracle from 114.141.132.88 ... |
2020-06-20 06:47:34 |
| 210.211.101.194 | attackbotsspam | 1433/tcp 445/tcp... [2020-04-23/06-19]6pkt,2pt.(tcp) |
2020-06-20 07:01:50 |
| 94.143.51.3 | attackbotsspam | 445/tcp 445/tcp [2020-05-08/06-19]2pkt |
2020-06-20 06:54:40 |
| 218.92.0.133 | attackbotsspam | Jun 19 19:11:16 NPSTNNYC01T sshd[21666]: Failed password for root from 218.92.0.133 port 38042 ssh2 Jun 19 19:11:29 NPSTNNYC01T sshd[21666]: error: maximum authentication attempts exceeded for root from 218.92.0.133 port 38042 ssh2 [preauth] Jun 19 19:11:34 NPSTNNYC01T sshd[21681]: Failed password for root from 218.92.0.133 port 2955 ssh2 ... |
2020-06-20 07:13:28 |
| 45.40.198.93 | attackbotsspam | 2020-06-19T23:00:32.627793shield sshd\[31701\]: Invalid user servicedesk from 45.40.198.93 port 40340 2020-06-19T23:00:32.631621shield sshd\[31701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.198.93 2020-06-19T23:00:34.916905shield sshd\[31701\]: Failed password for invalid user servicedesk from 45.40.198.93 port 40340 ssh2 2020-06-19T23:04:11.587100shield sshd\[32235\]: Invalid user sunj from 45.40.198.93 port 60948 2020-06-19T23:04:11.590921shield sshd\[32235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.198.93 |
2020-06-20 07:14:40 |