城市(city): Taipei
省份(region): Taipei
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '118.232.0.0 - 118.233.255.255'
% Abuse contact for '118.232.0.0 - 118.233.255.255' is 'adm@kbro.com.tw'
inetnum: 118.232.0.0 - 118.233.255.255
netname: KBRO-NET
descr: kbro CO. Ltd.
descr: 9F., No.260, Sec. 2, Bade Rd., Songshan Dist.,
descr: Taipei City 105, Taiwan (R.O.C.)
country: TW
admin-c: KA290-AP
tech-c: KA290-AP
abuse-c: AT939-AP
status: ALLOCATED PORTABLE
notify: hostmaster@twnic.net.tw
notify: adm@kbro.com.tw
mnt-by: MAINT-TW-TWNIC
mnt-lower: MAINT-TW-TWNIC
mnt-routes: MAINT-TW-TWNIC
mnt-irt: IRT-TUNGHO-TW
last-modified: 2025-11-07T01:34:29Z
source: APNIC
irt: IRT-TUNGHO-TW
address: kbro CO. Ltd.
address: 9F., No.260, Sec. 2, Bade Rd., Songshan Dist., Taipei City 105, Taiwan (R.O.C.)
address: Taipei
phone: +886-2-6611-1688 ext. 15126
e-mail: adm@kbro.com.tw
abuse-mailbox: adm@kbro.com.tw
admin-c: TR589-AP
tech-c: TR589-AP
remarks: (oid:TUNGHO)
mnt-by: MAINT-TW-TWNIC
last-modified: 2025-11-06T07:53:02Z
source: APNIC
auth: # Filtered
role: ABUSE TWNICAP
country: ZZ
address: 3F., No. 123, Sec. 4, Bade Rd., Songshan Dist., Taipei 105, Taiwan
phone: +000000000
e-mail: hostmaster@twnic.tw
admin-c: TWA2-AP
tech-c: TWA2-AP
nic-hdl: AT939-AP
remarks: Generated from irt object IRT-TWNIC-AP
remarks: hostmaster@twnic.tw was validated on 2025-05-23
abuse-mailbox: hostmaster@twnic.tw
mnt-by: APNIC-ABUSE
last-modified: 2025-05-23T00:02:10Z
source: APNIC
person: Kbro adm
address: 9F., No.260, Sec. 2, Bade Rd., Songshan Dist.,
address: Taipei City 105, Taiwan (R.O.C.)
country: TW
phone: +886-2-6611-1688 ext. 15126
e-mail: adm@kbro.com.tw
nic-hdl: KA290-AP
mnt-by: MAINT-TW-TWNIC
fax-no: +886-2-6611-2115
last-modified: 2025-08-28T08:29:45Z
source: APNIC
remarks: (hid:VL99-TW)
% Information related to '118.232.192.0 - 118.232.255.255'
inetnum: 118.232.192.0 - 118.232.255.255
netname: KBRO-NET
descr: kbro CO. Ltd.
descr: 9F., No.260, Sec. 2, Bade Rd., Songshan Dist., Taipei City 105, Taiwan (R.O.C.)
descr: Taipei Taiwan
country: TW
admin-c: VL99-TW
tech-c: VL107-TW
mnt-by: MAINT-TW-TWNIC
changed: adm@kbro.com.tw 20071211
status: ASSIGNED NON-PORTABLE
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: abuse abuse
address: kbro CO. Ltd.
address: 9F., No.260, Sec. 2, Bade Rd., Songshan Dist., Taipei City 105, Taiwan (R.O.C.)
address: Taipei City Taiwan
country: TW
phone: +886-2-6611-1688 ext. 15126
fax-no: +886-2-6611-2115
e-mail: abuse@kbro.com.tw
nic-hdl: VL107-TW
changed: hostmaster@twnic.net 20210915
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
person: Kbro adm
address: kbro CO. Ltd.
address: 8F., No.260, Sec. 2, Bade Rd., Songshan Dist., Taipei City 105, Taiwan (R.O.C.)
address: Taipei Taiwan
country: TW
phone: +886-2-6611-1688 ext. 15126
fax-no: +886-2-6611-2115
e-mail: adm@kbro.com.tw
nic-hdl: VL99-TW
changed: hostmaster@twnic.net 20170518
remarks: This information has been partially mirrored by APNIC from
remarks: TWNIC. To obtain more specific information, please use the
remarks: TWNIC whois server at whois.twnic.net.
source: TWNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.232.255.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.232.255.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020500 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 17:48:23 CST 2026
;; MSG SIZE rcvd: 107
Host 41.255.232.118.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 41.255.232.118.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.157.69.209 | attackspam | Port scan: Attack repeated for 24 hours |
2020-08-28 03:38:03 |
| 129.204.181.118 | attackbotsspam | Aug 27 14:30:03 rush sshd[21571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.181.118 Aug 27 14:30:05 rush sshd[21571]: Failed password for invalid user spread from 129.204.181.118 port 50992 ssh2 Aug 27 14:31:41 rush sshd[21626]: Failed password for root from 129.204.181.118 port 37312 ssh2 ... |
2020-08-28 03:34:59 |
| 23.30.221.181 | attackspam | Aug 27 14:51:14 PorscheCustomer sshd[23418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.30.221.181 Aug 27 14:51:16 PorscheCustomer sshd[23418]: Failed password for invalid user sdu from 23.30.221.181 port 58662 ssh2 Aug 27 14:57:28 PorscheCustomer sshd[23525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.30.221.181 ... |
2020-08-28 03:31:50 |
| 45.134.179.57 | attackspambots | [H1.VM6] Blocked by UFW |
2020-08-28 03:31:21 |
| 35.195.98.218 | attackbots | Repeated brute force against a port |
2020-08-28 03:29:29 |
| 14.243.165.11 | attackbotsspam | [portscan] Port scan |
2020-08-28 03:25:54 |
| 182.74.86.27 | attackbotsspam | Aug 27 20:36:57 root sshd[5972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.86.27 Aug 27 20:36:59 root sshd[5972]: Failed password for invalid user admin from 182.74.86.27 port 38578 ssh2 Aug 27 20:38:53 root sshd[6213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.86.27 ... |
2020-08-28 03:00:55 |
| 85.209.0.251 | attackspam | SSH Bruteforce Attempt on Honeypot |
2020-08-28 03:07:22 |
| 134.209.57.3 | attackspam | 2020-08-27T16:19:59.391963mail.standpoint.com.ua sshd[9467]: Invalid user yy from 134.209.57.3 port 36998 2020-08-27T16:19:59.395063mail.standpoint.com.ua sshd[9467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.57.3 2020-08-27T16:19:59.391963mail.standpoint.com.ua sshd[9467]: Invalid user yy from 134.209.57.3 port 36998 2020-08-27T16:20:01.566211mail.standpoint.com.ua sshd[9467]: Failed password for invalid user yy from 134.209.57.3 port 36998 ssh2 2020-08-27T16:23:02.175215mail.standpoint.com.ua sshd[9886]: Invalid user vps from 134.209.57.3 port 54926 ... |
2020-08-28 03:14:07 |
| 45.142.120.93 | attack | 2020-08-27 20:41:39 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=madge@no-server.de\) 2020-08-27 20:41:47 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=sklad@no-server.de\) 2020-08-27 20:42:06 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=sklad@no-server.de\) 2020-08-27 20:42:10 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=sklad@no-server.de\) 2020-08-27 20:42:18 dovecot_login authenticator failed for \(User\) \[45.142.120.93\]: 535 Incorrect authentication data \(set_id=sklad@no-server.de\) ... |
2020-08-28 03:06:49 |
| 27.72.105.41 | attackspambots | 2020-08-27T13:13:20.324072abusebot-7.cloudsearch.cf sshd[10308]: Invalid user public from 27.72.105.41 port 44244 2020-08-27T13:13:20.330459abusebot-7.cloudsearch.cf sshd[10308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.41 2020-08-27T13:13:20.324072abusebot-7.cloudsearch.cf sshd[10308]: Invalid user public from 27.72.105.41 port 44244 2020-08-27T13:13:22.055314abusebot-7.cloudsearch.cf sshd[10308]: Failed password for invalid user public from 27.72.105.41 port 44244 ssh2 2020-08-27T13:18:49.174041abusebot-7.cloudsearch.cf sshd[10407]: Invalid user user from 27.72.105.41 port 61526 2020-08-27T13:18:49.178603abusebot-7.cloudsearch.cf sshd[10407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.41 2020-08-27T13:18:49.174041abusebot-7.cloudsearch.cf sshd[10407]: Invalid user user from 27.72.105.41 port 61526 2020-08-27T13:18:51.404914abusebot-7.cloudsearch.cf sshd[10407]: Failed passw ... |
2020-08-28 03:08:01 |
| 111.229.148.198 | attackbotsspam | Invalid user nick from 111.229.148.198 port 50136 |
2020-08-28 03:39:19 |
| 45.173.28.1 | attackspam | Aug 27 16:37:45 ns381471 sshd[28306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.173.28.1 Aug 27 16:37:47 ns381471 sshd[28306]: Failed password for invalid user arif from 45.173.28.1 port 45232 ssh2 |
2020-08-28 03:04:32 |
| 180.76.238.183 | attack | 2020-08-27T14:57:26+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-08-28 03:33:02 |
| 112.85.42.227 | attackbots | Aug 27 15:08:29 NPSTNNYC01T sshd[6378]: Failed password for root from 112.85.42.227 port 62745 ssh2 Aug 27 15:08:31 NPSTNNYC01T sshd[6378]: Failed password for root from 112.85.42.227 port 62745 ssh2 Aug 27 15:08:33 NPSTNNYC01T sshd[6378]: Failed password for root from 112.85.42.227 port 62745 ssh2 ... |
2020-08-28 03:26:45 |