城市(city): Taipei
省份(region): Taipei
国家(country): Taiwan, China
运营商(isp): Chunghwa
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '114.24.0.0 - 114.27.255.255'
% Abuse contact for '114.24.0.0 - 114.27.255.255' is 'abuse@hinet.net'
inetnum: 114.24.0.0 - 114.27.255.255
netname: HINET-NET
descr: Data Communication Business Group,
descr: Chunghwa Telecom Co.,Ltd.
descr: No.21, Sec.1, Xinyi Rd., Taipei City
descr: 10048, Taiwan
country: TW
admin-c: HN27-AP
tech-c: HN27-AP
abuse-c: AT939-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-TW-TWNIC
mnt-irt: IRT-HINET-1-TW
last-modified: 2023-11-30T03:46:57Z
source: APNIC
irt: IRT-HINET-1-TW
address: Data Communication Business Group,
address: Chunghwa Telecom Co.,Ltd.
address: No.21, Sec.1, Xinyi Rd., Taipei City
address: 10048, Taiwan
e-mail: abuse@hinet.net
abuse-mailbox: abuse@hinet.net
admin-c: HN27-AP
tech-c: HN27-AP
auth: # Filtered
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-18T00:37:21Z
source: APNIC
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: HINET Network-Adm
address: CHTD, Chunghwa Telecom Co., Ltd.
address: No. 21, Sec. 21, Hsin-Yi Rd.,
address: Taipei Taiwan 100
country: TW
phone: +886 2 2322 3495
phone: +886 2 2322 3442
phone: +886 2 2344 3007
fax-no: +886 2 2344 2513
fax-no: +886 2 2395 5671
e-mail: network-adm@hinet.net
nic-hdl: HN27-AP
remarks: (hid:HN184-TW)
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-08-28T07:34:45Z
source: APNIC
% Information related to '114.25.0.0 - 114.25.255.255'
inetnum: 114.25.0.0 - 114.25.255.255
netname: HINET-NET
descr: Chunghwa Telecom Co.,Ltd.
descr: No.21-3, Sec. 1, Xinyi Rd., Taipei 10048, Taiwan, R.O.C.
descr: Taipei Taiwan
country: TW
admin-c: HN184-TW
tech-c: HN184-TW
mnt-by: MAINT-TW-TWNIC
changed: network-adm@hinet.net 20080421
status: ASSIGNED NON-PORTABLE
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: HINET Network-Adm
address: Changhua Telecom Co., Ltd.
address: No. 21, Sec. 21, Hsin-Yi Rd.
address: Taipei Taiwan
country: TW
phone: +886-2-2322-3495
fax-no: +886-2-2344-2513
e-mail: network-adm@hinet.net
nic-hdl: HN184-TW
changed: hostmaster@twnic.net 20130307
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.25.99.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.25.99.76. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012400 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 25 00:30:13 CST 2026
;; MSG SIZE rcvd: 105
76.99.25.114.in-addr.arpa domain name pointer 114-25-99-76.dynamic-ip.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
76.99.25.114.in-addr.arpa name = 114-25-99-76.dynamic-ip.hinet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 197.210.64.142 | attackbots | 1579266093 - 01/17/2020 14:01:33 Host: 197.210.64.142/197.210.64.142 Port: 445 TCP Blocked |
2020-01-18 00:25:04 |
| 159.89.201.218 | attack | 2020-01-17T10:40:54.703693xentho-1 sshd[598391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.218 user=root 2020-01-17T10:40:56.943337xentho-1 sshd[598391]: Failed password for root from 159.89.201.218 port 50496 ssh2 2020-01-17T10:42:57.597527xentho-1 sshd[598424]: Invalid user brady from 159.89.201.218 port 34194 2020-01-17T10:42:57.604773xentho-1 sshd[598424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.218 2020-01-17T10:42:57.597527xentho-1 sshd[598424]: Invalid user brady from 159.89.201.218 port 34194 2020-01-17T10:42:59.729149xentho-1 sshd[598424]: Failed password for invalid user brady from 159.89.201.218 port 34194 ssh2 2020-01-17T10:44:50.137840xentho-1 sshd[598470]: Invalid user jeffrey from 159.89.201.218 port 44224 2020-01-17T10:44:50.144442xentho-1 sshd[598470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.218 ... |
2020-01-18 00:05:14 |
| 180.183.19.214 | attackspambots | Unauthorized connection attempt from IP address 180.183.19.214 on Port 445(SMB) |
2020-01-18 00:10:06 |
| 37.114.180.40 | attackbotsspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-17 23:56:48 |
| 37.49.231.105 | attackspambots | Fail2Ban Ban Triggered |
2020-01-17 23:49:49 |
| 46.38.144.57 | attack | Jan 17 11:22:55 web1 postfix/smtpd[8372]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure ... |
2020-01-18 00:27:25 |
| 131.72.222.136 | attackbotsspam | Unauthorized connection attempt detected from IP address 131.72.222.136 to port 445 |
2020-01-18 00:04:18 |
| 37.114.132.202 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-18 00:00:15 |
| 115.178.202.247 | spam | Hallo |
2020-01-18 00:20:19 |
| 187.57.235.254 | attackspam | Unauthorized connection attempt from IP address 187.57.235.254 on Port 445(SMB) |
2020-01-18 00:07:00 |
| 5.123.99.212 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-18 00:22:40 |
| 112.85.42.94 | attackbotsspam | Jan 17 15:47:43 game-panel sshd[16738]: Failed password for root from 112.85.42.94 port 57601 ssh2 Jan 17 15:47:45 game-panel sshd[16738]: Failed password for root from 112.85.42.94 port 57601 ssh2 Jan 17 15:51:59 game-panel sshd[16826]: Failed password for root from 112.85.42.94 port 36094 ssh2 |
2020-01-17 23:55:02 |
| 222.186.173.215 | attack | Jan 17 16:50:45 * sshd[14328]: Failed password for root from 222.186.173.215 port 46428 ssh2 Jan 17 16:50:48 * sshd[14328]: Failed password for root from 222.186.173.215 port 46428 ssh2 |
2020-01-17 23:54:07 |
| 15.200.76.48 | attackspam | $f2bV_matches |
2020-01-18 00:23:51 |
| 197.210.47.103 | attack | 1579266097 - 01/17/2020 14:01:37 Host: 197.210.47.103/197.210.47.103 Port: 445 TCP Blocked |
2020-01-18 00:09:21 |