City: unknown
Region: unknown
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.20.0.0 - 61.20.255.255'
% Abuse contact for '61.20.0.0 - 61.20.255.255' is 'davidlin1@fareastone.com.tw'
inetnum: 61.20.0.0 - 61.20.255.255
netname: FET
descr: Far EasTone Telecommunication Co., Ltd.
descr: 334 Sze Chuan Road, Sec. 1
descr: Panchiao , Taipei Hsien Taiwan 220
country: tw
admin-c: TT151-AP
tech-c: RH6-AP
mnt-by: MAINT-TW-TWNIC
mnt-lower: MAINT-TW-TWNIC
mnt-routes: MAINT-TW-TWNIC
mnt-irt: IRT-FET-TW
status: ASSIGNED PORTABLE
last-modified: 2026-04-07T06:37:39Z
source: APNIC
irt: IRT-FET-TW
address: Far EasTone Telecommunication Co., Ltd.
address: 334 Sze Chuan Road, Sec. 1
address: Panchiao , Taipei Hsien Taiwan 220
e-mail: davidlin1@fareastone.com.tw
abuse-mailbox: davidlin1@fareastone.com.tw
admin-c: TT151-AP
tech-c: RH6-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:18:22Z
source: APNIC
person: Ryan Hung
nic-hdl: RH6-AP
e-mail: rhung@fareastone.com.tw
address: 334 Sze Chuan Road, Sec. 1
address: Panchiao , Taipei Hsien, 220, R.O.C
phone: +886-2-2950-5330
fax-no: +886-2-2950-5859
country: TW
mnt-by: MAINT-TW-TWNIC
last-modified: 2008-09-04T07:40:36Z
source: APNIC
person: Tony Tsai
nic-hdl: TT151-AP
e-mail: cchtsai@fareastone.com.tw
address: 334 Sze Chuan Road, Sec. 1
address: Panchiao , Taipei Hsien, 220, R.O.C
phone: +886-2-2950-7559
fax-no: +886-2-2950-5859
country: TW
mnt-by: MAINT-TW-TWNIC
last-modified: 2008-09-04T07:41:50Z
source: APNIC
% Information related to '61.20.128.0 - 61.20.191.255'
inetnum: 61.20.128.0 - 61.20.191.255
netname: FETNET-NET
descr: Far EasTone Telecommunication Co., Ltd.
descr: 11F., No. 68, Yuandong Rd., Banqiao Dist.
descr: New Taipei City. Taiwan Taiwan
country: TW
admin-c: KC20-TW
tech-c: RH74-TW
mnt-by: MAINT-TW-TWNIC
changed: ajauw@fareastone.com.tw 20070831
status: ASSIGNED NON-PORTABLE
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: Jeff Ho
address: Far EasTone Telecommunications Co., Ltd.
address: 334, Sze Chuan Road, Sec. 1
address: Panchiao, Taipei County Taiwan
country: TW
phone: +886-2-2950-7572
fax-no: +886-2-2950-5859
e-mail: jfho@fareastone.com.tw
nic-hdl: KC20-TW
changed: hostmaster@twnic.net 20041126
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.20.167.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.20.167.207. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042100 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 22:36:56 CST 2026
;; MSG SIZE rcvd: 106
207.167.20.61.in-addr.arpa domain name pointer 61-20-167-207.adsl.fetnet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
207.167.20.61.in-addr.arpa name = 61-20-167-207.adsl.fetnet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.229.199.67 | attack | Apr 16 00:39:25 santamaria sshd\[31613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67 user=root Apr 16 00:39:27 santamaria sshd\[31613\]: Failed password for root from 111.229.199.67 port 38646 ssh2 Apr 16 00:44:22 santamaria sshd\[31684\]: Invalid user user from 111.229.199.67 Apr 16 00:44:22 santamaria sshd\[31684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67 ... |
2020-04-16 07:41:30 |
| 51.83.75.97 | attack | 2020-04-15T21:39:13.270543shield sshd\[4364\]: Invalid user test from 51.83.75.97 port 39946 2020-04-15T21:39:13.274452shield sshd\[4364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.ip-51-83-75.eu 2020-04-15T21:39:14.776104shield sshd\[4364\]: Failed password for invalid user test from 51.83.75.97 port 39946 ssh2 2020-04-15T21:41:09.325360shield sshd\[4755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.ip-51-83-75.eu user=root 2020-04-15T21:41:11.419363shield sshd\[4755\]: Failed password for root from 51.83.75.97 port 46326 ssh2 |
2020-04-16 07:38:17 |
| 209.17.96.178 | attack | Port Scan: Events[3] countPorts[3]: 80 8443 137 .. |
2020-04-16 07:28:34 |
| 51.161.18.75 | attack | Fail2Ban Ban Triggered |
2020-04-16 07:11:27 |
| 171.34.197.241 | attackspam | Apr 15 17:50:18 ws24vmsma01 sshd[46889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.197.241 Apr 15 17:50:19 ws24vmsma01 sshd[46889]: Failed password for invalid user bot from 171.34.197.241 port 56815 ssh2 ... |
2020-04-16 07:18:54 |
| 59.173.12.106 | attackspambots | failed_logins |
2020-04-16 07:10:41 |
| 177.76.75.31 | attackspambots | Automatic report - Port Scan Attack |
2020-04-16 07:20:44 |
| 51.75.124.215 | attackbots | 5x Failed Password |
2020-04-16 07:10:11 |
| 196.52.43.86 | attackspam | Port Scan: Events[2] countPorts[2]: 83 2121 .. |
2020-04-16 07:26:00 |
| 103.46.139.230 | attackbotsspam | Apr 15 22:15:12 ip-172-31-61-156 sshd[26824]: Invalid user gmodserver from 103.46.139.230 Apr 15 22:15:14 ip-172-31-61-156 sshd[26824]: Failed password for invalid user gmodserver from 103.46.139.230 port 34502 ssh2 Apr 15 22:15:12 ip-172-31-61-156 sshd[26824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.46.139.230 Apr 15 22:15:12 ip-172-31-61-156 sshd[26824]: Invalid user gmodserver from 103.46.139.230 Apr 15 22:15:14 ip-172-31-61-156 sshd[26824]: Failed password for invalid user gmodserver from 103.46.139.230 port 34502 ssh2 ... |
2020-04-16 07:12:35 |
| 194.61.27.249 | attackspam | 04/15/2020-19:09:53.803260 194.61.27.249 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-16 07:16:37 |
| 193.112.252.254 | attack | Apr 15 22:19:59 markkoudstaal sshd[2878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.252.254 Apr 15 22:20:01 markkoudstaal sshd[2878]: Failed password for invalid user fernandazgouridi from 193.112.252.254 port 40870 ssh2 Apr 15 22:23:21 markkoudstaal sshd[3435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.252.254 |
2020-04-16 07:22:58 |
| 92.118.38.83 | attackbots | 'IP reached maximum auth failures' |
2020-04-16 07:24:45 |
| 106.12.182.1 | attackspam | Invalid user guest from 106.12.182.1 port 37328 |
2020-04-16 07:19:25 |
| 106.12.56.143 | attackbotsspam | SSH Invalid Login |
2020-04-16 07:44:51 |