必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kaohsiung

省份(region): Kaohsiung

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '114.140.0.0 - 114.140.255.255'

% Abuse contact for '114.140.0.0 - 114.140.255.255' is 'davidlin1@fareastone.com.tw'

inetnum:        114.140.0.0 - 114.140.255.255
netname:        FETNET-NET
descr:          Far EasTone Telecommunication Co., Ltd.
descr:          334 Sze Chuan Road, Sec. 1
descr:          Panchiao , Taipei Hsien Taiwan 220
country:        TW
admin-c:        TT151-AP
tech-c:         RH6-AP
abuse-c:        AT939-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-TW-TWNIC
mnt-lower:      MAINT-TW-TWNIC
mnt-routes:     MAINT-TW-TWNIC
mnt-irt:        IRT-FET-TW
last-modified:  2023-11-30T03:34:56Z
source:         APNIC

irt:            IRT-FET-TW
address:        Far EasTone Telecommunication Co., Ltd.
address:        334 Sze Chuan Road, Sec. 1
address:        Panchiao , Taipei Hsien Taiwan 220
e-mail:         davidlin1@fareastone.com.tw
abuse-mailbox:  davidlin1@fareastone.com.tw
admin-c:        TT151-AP
tech-c:         RH6-AP
auth:           # Filtered
mnt-by:         MAINT-TW-TWNIC
last-modified:  2025-11-06T07:18:22Z
source:         APNIC

role:           ABUSE TWNICAP
country:        ZZ
address:        3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone:          +000000000
e-mail:         hostmaster@twnic.tw
admin-c:        TWA2-AP
tech-c:         TWA2-AP
nic-hdl:        AT939-AP
remarks:        Generated from irt object IRT-TWNIC-AP
remarks:        hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox:  hostmaster@twnic.tw
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-23T00:02:10Z
source:         APNIC

person:         Ryan Hung
nic-hdl:        RH6-AP
e-mail:         rhung@fareastone.com.tw
address:        334 Sze Chuan Road, Sec. 1
address:        Panchiao , Taipei Hsien, 220, R.O.C
phone:          +886-2-2950-5330
fax-no:         +886-2-2950-5859
country:        TW
mnt-by:         MAINT-TW-TWNIC
last-modified:  2008-09-04T07:40:36Z
source:         APNIC

person:         Tony Tsai
nic-hdl:        TT151-AP
e-mail:         cchtsai@fareastone.com.tw
address:        334 Sze Chuan Road, Sec. 1
address:        Panchiao , Taipei Hsien, 220, R.O.C
phone:          +886-2-2950-7559
fax-no:         +886-2-2950-5859
country:        TW
mnt-by:         MAINT-TW-TWNIC
last-modified:  2008-09-04T07:41:50Z
source:         APNIC

% Information related to '114.140.64.0 - 114.140.127.255'

inetnum:        114.140.64.0 - 114.140.127.255
netname:        FETNET-NET
descr:          Far EasTone Telecommunication Co., Ltd.
descr:          334 Sze Chuan Road, Sec. 1
descr:          Panchiao , Taipei Hsien Taiwan
country:        TW
admin-c:        TT125-TW
tech-c:         RH74-TW
mnt-by:         MAINT-TW-TWNIC
changed:        ajauw@fareastone.com.tw 20081216
status:         ASSIGNED NON-PORTABLE
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

person:         Tony Tsai
address:        Far EasTone Telecommunication Co., Ltd.
address:        No. 68, Yuandong Rd., Banqiao Dist.,
address:        New Taipei City. Taiwan Taiwan
country:        TW
phone:          +886-2-2950-7559
fax-no:         +886-2-2950-5859
e-mail:         cchtsai@fareastone.com.tw
nic-hdl:        TT125-TW
changed:        hostmaster@twnic.net 20260114
remarks:        This information has been partially mirrored by APNIC from
remarks:        TWNIC. To obtain more specific information, please use the
remarks:        TWNIC whois server at whois.twnic.net.
source:         TWNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.140.113.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.140.113.122.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 23:29:34 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
122.113.140.114.in-addr.arpa domain name pointer 114-140-113-122.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.113.140.114.in-addr.arpa	name = 114-140-113-122.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.35.53.121 attackspambots
" "
2019-08-26 15:43:38
123.130.118.19 attack
2019-08-26T06:30:46.258Z CLOSE host=123.130.118.19 port=47258 fd=5 time=40.013 bytes=32
...
2019-08-26 15:53:07
157.230.116.99 attackspam
Aug 26 05:35:44 Ubuntu-1404-trusty-64-minimal sshd\[14949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99  user=root
Aug 26 05:35:46 Ubuntu-1404-trusty-64-minimal sshd\[14949\]: Failed password for root from 157.230.116.99 port 40700 ssh2
Aug 26 05:52:10 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: Invalid user jking from 157.230.116.99
Aug 26 05:52:10 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
Aug 26 05:52:11 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: Failed password for invalid user jking from 157.230.116.99 port 48566 ssh2
2019-08-26 15:52:32
104.140.188.42 attackbots
Honeypot attack, port: 81, PTR: cbfd1.rederatural.com.
2019-08-26 15:42:52
107.21.1.8 attackbots
Automatic report - Banned IP Access
2019-08-26 16:18:41
122.52.233.104 attackbotsspam
Unauthorized connection attempt from IP address 122.52.233.104 on Port 445(SMB)
2019-08-26 15:48:33
54.37.204.154 attack
Aug 26 09:03:12 rpi sshd[21435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154 
Aug 26 09:03:14 rpi sshd[21435]: Failed password for invalid user test from 54.37.204.154 port 39438 ssh2
2019-08-26 15:32:09
121.67.246.142 attackspam
Aug 26 03:54:03 plusreed sshd[2497]: Invalid user gordon from 121.67.246.142
...
2019-08-26 16:04:32
51.254.57.17 attack
Aug 26 09:52:34 OPSO sshd\[22987\]: Invalid user daphne from 51.254.57.17 port 44154
Aug 26 09:52:34 OPSO sshd\[22987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
Aug 26 09:52:37 OPSO sshd\[22987\]: Failed password for invalid user daphne from 51.254.57.17 port 44154 ssh2
Aug 26 09:56:23 OPSO sshd\[23536\]: Invalid user git from 51.254.57.17 port 38852
Aug 26 09:56:23 OPSO sshd\[23536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
2019-08-26 15:59:19
106.13.140.110 attackbots
$f2bV_matches
2019-08-26 15:51:33
111.21.99.227 attackspambots
2019-08-26T07:31:08.654934abusebot-8.cloudsearch.cf sshd\[26041\]: Invalid user anto from 111.21.99.227 port 52858
2019-08-26 16:01:39
182.61.105.89 attackspam
Aug 26 09:39:12 localhost sshd\[1705\]: Invalid user portal_client from 182.61.105.89 port 39980
Aug 26 09:39:12 localhost sshd\[1705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89
Aug 26 09:39:14 localhost sshd\[1705\]: Failed password for invalid user portal_client from 182.61.105.89 port 39980 ssh2
2019-08-26 15:46:02
159.89.134.64 attackspam
Aug 26 03:11:15 raspberrypi sshd\[15997\]: Invalid user joefmchat from 159.89.134.64Aug 26 03:11:17 raspberrypi sshd\[15997\]: Failed password for invalid user joefmchat from 159.89.134.64 port 40420 ssh2Aug 26 03:25:04 raspberrypi sshd\[16513\]: Invalid user fabian from 159.89.134.64
...
2019-08-26 16:16:18
37.187.6.235 attack
Failed password for invalid user admin1 from 37.187.6.235 port 50258 ssh2
Invalid user db2 from 37.187.6.235 port 41168
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.6.235
Failed password for invalid user db2 from 37.187.6.235 port 41168 ssh2
Invalid user pick from 37.187.6.235 port 60320
2019-08-26 16:02:32
173.24.14.150 attackbots
Honeypot attack, port: 23, PTR: 173-24-14-150.client.mchsi.com.
2019-08-26 15:30:13

最近上报的IP列表

37.188.212.42 8.210.202.117 95.216.194.80 78.159.131.56
46.101.100.23 2606:4700:10::6816:1016 2606:4700:10::6816:4674 27.220.145.179
36.54.111.11 66.132.172.136 74.7.242.63 2606:4700:10::6816:2570
2606:4700:10::6814:7424 2606:4700:10::6814:5110 2606:4700:10::6814:7256 187.46.82.171
185.93.89.191 185.93.89.190 2606:4700:10::6816:4773 202.127.52.45