City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.148.220.0 - 202.148.221.255'
% Abuse contact for '202.148.220.0 - 202.148.221.255' is 'soc@imcloud.tw'
inetnum: 202.148.220.0 - 202.148.221.255
netname: SDCL-TW
descr: Sky Digital Co., Ltd.
country: TW
admin-c: SDCL2-AP
tech-c: SDCL2-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-irt: IRT-SDCL-TW-TW
last-modified: 2025-10-21T02:28:26Z
source: APNIC
irt: IRT-SDCL-TW-TW
address: Sky Digital Co., Ltd.
address: Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676, Taiwan (R.O.C.)
phone: +88634271005
e-mail: soc@imcloud.tw
abuse-mailbox: soc@imcloud.tw
admin-c: TR524-AP
tech-c: TR524-AP
auth: # Filtered
remarks: (oid:SDCL-TW)
remarks: soc@imcloud.tw was validated on 2023-06-27
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:46:54Z
source: APNIC
role: Sky Digital Co Ltd administrator
address: Rm. 3, 21F., No. 88, Zhongyang E. Rd., Zhongli Dist., Taoyuan City 320676
country: TW
phone: +88634271005
fax-no: +88634271009
e-mail: abuse@idc-tw.com
admin-c: SDCL2-AP
tech-c: SDCL2-AP
nic-hdl: SDCL2-AP
mnt-by: MAINT-SDCL-TW
last-modified: 2023-07-18T17:00:06Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.148.221.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.148.221.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 21:10:33 CST 2026
;; MSG SIZE rcvd: 108
b'Host 131.221.148.202.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 202.148.221.131.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.129.144.231 | attackspambots | SSH / Telnet Brute Force Attempts on Honeypot |
2020-08-05 08:39:54 |
| 193.27.229.112 | attackspam | Brute forcing RDP port 3389 |
2020-08-05 08:20:42 |
| 94.102.59.107 | attackspam | Attempt to log onto Postfix |
2020-08-05 08:20:09 |
| 190.78.67.98 | attackbots | 1596563576 - 08/04/2020 19:52:56 Host: 190.78.67.98/190.78.67.98 Port: 445 TCP Blocked |
2020-08-05 08:31:03 |
| 109.21.212.151 | attack | Sniffing for wp-login |
2020-08-05 08:18:16 |
| 187.192.138.1 | attack | 20/8/4@13:53:09: FAIL: Alarm-Intrusion address from=187.192.138.1 ... |
2020-08-05 08:24:41 |
| 163.172.93.131 | attackbots | Failed password for root from 163.172.93.131 port 54944 ssh2 |
2020-08-05 08:34:53 |
| 94.102.49.159 | attackspambots | Aug502:03:44server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.52LEN=40TOS=0x00PREC=0x00TTL=249ID=40644PROTO=TCPSPT=57709DPT=17638WINDOW=1024RES=0x00SYNURGP=0Aug502:03:58server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=25432PROTO=TCPSPT=57709DPT=17373WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=16205PROTO=TCPSPT=57709DPT=17851WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.55LEN=40TOS=0x00PREC=0x00TTL=249ID=40984PROTO=TCPSPT=57709DPT=15255WINDOW=1024RES=0x00SYNURGP=0Aug502:04:03server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7 |
2020-08-05 08:09:22 |
| 13.84.35.115 | attackbots | (sshd) Failed SSH login from 13.84.35.115 (US/United States/-): 5 in the last 3600 secs |
2020-08-05 08:13:35 |
| 106.52.135.88 | attack | Aug 4 17:45:12 host sshd\[7232\]: Failed password for root from 106.52.135.88 port 51564 ssh2 Aug 4 17:50:56 host sshd\[8375\]: Failed password for root from 106.52.135.88 port 57380 ssh2 Aug 4 17:56:38 host sshd\[9495\]: Failed password for root from 106.52.135.88 port 34964 ssh2 ... |
2020-08-05 08:21:06 |
| 156.236.72.149 | attack | Aug 5 07:24:41 localhost sshd[971571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.72.149 user=root Aug 5 07:24:43 localhost sshd[971571]: Failed password for root from 156.236.72.149 port 60520 ssh2 ... |
2020-08-05 08:27:54 |
| 117.194.117.145 | attackbots | 1596563603 - 08/04/2020 19:53:23 Host: 117.194.117.145/117.194.117.145 Port: 445 TCP Blocked |
2020-08-05 08:14:35 |
| 187.141.128.42 | attack | Ssh brute force |
2020-08-05 08:43:56 |
| 51.38.71.36 | attackspambots | SSH brutforce |
2020-08-05 08:41:52 |
| 194.152.206.103 | attack | Aug 4 21:04:51 vps647732 sshd[25629]: Failed password for root from 194.152.206.103 port 41981 ssh2 ... |
2020-08-05 08:42:35 |