City: New Taipei City
Region: New Taipei
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.68.0.0 - 219.69.255.255'
% Abuse contact for '219.68.0.0 - 219.69.255.255' is 'ix.eg@homeplus.net.tw'
inetnum: 219.68.0.0 - 219.69.255.255
netname: HOSHIN-MULTIMEDIA
descr: Hoshin Multimedia Center Inc
descr: Cable/ADSL Broadband ISP in Taiwan.
country: TW
org: ORG-HMCI1-AP
admin-c: HIA1-AP
tech-c: HIA1-AP
abuse-c: AH914-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-HOSHIN-TW
mnt-routes: MAINT-HOSHIN-TW
mnt-irt: IRT-HOSHIN-TW
last-modified: 2020-06-22T05:26:57Z
source: APNIC
irt: IRT-HOSHIN-TW
address: 4F, 57, Tung Hsing Rd.,
address: Taipei, Taiwan
e-mail: ix.eg@homeplus.net.tw
abuse-mailbox: ix.eg@homeplus.net.tw
admin-c: HIA1-AP
tech-c: HIA1-AP
auth: # Filtered
remarks: ix.eg@homeplus.net.tw
remarks: ix.eg@homeplus.net.tw was validated on 2025-10-15
mnt-by: MAINT-HOSHIN-TW
last-modified: 2025-11-17T23:08:36Z
source: APNIC
organisation: ORG-HMCI1-AP
org-name: Hoshin Multimedia Center Inc.
org-type: LIR
country: TW
address: 4Fl., No.57, Dongxing RD.,
phone: +886-2-8768-3255-530
fax-no: +886-2-8768-2987
e-mail: ix.eg@homeplus.net.tw
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:45Z
source: APNIC
role: ABUSE HOSHINTW
country: ZZ
address: 4F, 57, Tung Hsing Rd.,
address: Taipei, Taiwan
phone: +000000000
e-mail: ix.eg@homeplus.net.tw
admin-c: HIA1-AP
tech-c: HIA1-AP
nic-hdl: AH914-AP
remarks: Generated from irt object IRT-HOSHIN-TW
remarks: ix.eg@homeplus.net.tw was validated on 2025-10-15
abuse-mailbox: ix.eg@homeplus.net.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-10-15T10:57:49Z
source: APNIC
role: HOSHIN IP Administrators
address: 4F, 57, Tung Hsing Rd.,
address: Taipei, Taiwan
country: TW
phone: +886-2-8768-3255
fax-no: +886-2-8768-2987
e-mail: IX.EG@kbtelecom.net
admin-c: SL424-AP
tech-c: CL244-AP
tech-c: KH92-AP
nic-hdl: HIA1-AP
notify: IX.EG@kbtelecom.net
mnt-by: MAINT-HOSHIN-TW
last-modified: 2015-06-22T07:18:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.68.168.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.68.168.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030502 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 03:30:12 CST 2026
;; MSG SIZE rcvd: 107
193.168.68.219.in-addr.arpa domain name pointer host-219-68-168-193.static.kbtelecom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.168.68.219.in-addr.arpa name = host-219-68-168-193.static.kbtelecom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 34.77.127.43 | attackbotsspam | Jul 17 23:38:20 jumpserver sshd[110607]: Invalid user fucker from 34.77.127.43 port 52630 Jul 17 23:38:22 jumpserver sshd[110607]: Failed password for invalid user fucker from 34.77.127.43 port 52630 ssh2 Jul 17 23:42:07 jumpserver sshd[110698]: Invalid user xsy from 34.77.127.43 port 39836 ... |
2020-07-18 07:45:37 |
| 3.12.221.96 | attackspambots | Triggered: repeated knocking on closed ports. |
2020-07-18 08:09:25 |
| 159.192.140.147 | attackspam | Unauthorized connection attempt from IP address 159.192.140.147 on Port 445(SMB) |
2020-07-18 07:59:19 |
| 45.55.237.182 | attack | Invalid user fuhan from 45.55.237.182 port 57522 |
2020-07-18 08:03:28 |
| 5.62.34.13 | attackbotsspam | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-07-18 07:55:21 |
| 115.153.119.86 | attackbotsspam | Jul 18 00:29:46 localhost postfix/smtpd[245312]: warning: unknown[115.153.119.86]: SASL LOGIN authentication failed: authentication failure Jul 18 00:29:51 localhost postfix/smtpd[245348]: warning: unknown[115.153.119.86]: SASL LOGIN authentication failed: authentication failure Jul 18 00:29:56 localhost postfix/smtpd[245312]: warning: unknown[115.153.119.86]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-18 08:11:40 |
| 190.152.215.77 | attack | Jul 18 00:59:37 datenbank sshd[53599]: Invalid user brd from 190.152.215.77 port 58528 Jul 18 00:59:39 datenbank sshd[53599]: Failed password for invalid user brd from 190.152.215.77 port 58528 ssh2 Jul 18 01:12:59 datenbank sshd[53650]: Invalid user ekta from 190.152.215.77 port 43474 ... |
2020-07-18 08:16:37 |
| 67.205.149.105 | attackspam | Jul 18 01:06:25 home sshd[6263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.149.105 Jul 18 01:06:28 home sshd[6263]: Failed password for invalid user piedad from 67.205.149.105 port 44970 ssh2 Jul 18 01:11:53 home sshd[6877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.149.105 Jul 18 01:11:56 home sshd[6877]: Failed password for invalid user examen from 67.205.149.105 port 60920 ssh2 ... |
2020-07-18 07:48:40 |
| 45.118.156.189 | attackspambots | Unauthorized connection attempt from IP address 45.118.156.189 on Port 445(SMB) |
2020-07-18 07:49:26 |
| 27.189.131.98 | attack | spam (f2b h2) |
2020-07-18 08:09:12 |
| 118.25.47.217 | attackspam | Jul 18 00:16:07 home sshd[32040]: Failed password for backup from 118.25.47.217 port 14749 ssh2 Jul 18 00:19:54 home sshd[32471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.47.217 Jul 18 00:19:56 home sshd[32471]: Failed password for invalid user deployer from 118.25.47.217 port 58181 ssh2 ... |
2020-07-18 07:51:00 |
| 50.4.86.76 | attack | Jul 17 23:49:42 ip-172-31-61-156 sshd[3290]: Failed password for invalid user aaron from 50.4.86.76 port 42242 ssh2 Jul 17 23:49:41 ip-172-31-61-156 sshd[3290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.4.86.76 Jul 17 23:49:41 ip-172-31-61-156 sshd[3290]: Invalid user aaron from 50.4.86.76 Jul 17 23:49:42 ip-172-31-61-156 sshd[3290]: Failed password for invalid user aaron from 50.4.86.76 port 42242 ssh2 Jul 17 23:53:36 ip-172-31-61-156 sshd[3488]: Invalid user kuo from 50.4.86.76 ... |
2020-07-18 08:13:35 |
| 188.117.157.70 | attackbots | Unauthorized connection attempt from IP address 188.117.157.70 on Port 445(SMB) |
2020-07-18 07:42:19 |
| 54.234.254.120 | attack | Jul 17 21:59:46 XXXXXX sshd[23260]: Invalid user memcache from 54.234.254.120 port 60516 |
2020-07-18 08:12:58 |
| 117.4.236.42 | attackbotsspam | Unauthorized connection attempt from IP address 117.4.236.42 on Port 445(SMB) |
2020-07-18 07:56:48 |