城市(city): Tokyo
省份(region): Tokyo
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '118.0.0.0 - 118.15.255.255'
% Abuse contact for '118.0.0.0 - 118.15.255.255' is 'hostmaster@nic.ad.jp'
inetnum: 118.0.0.0 - 118.15.255.255
netname: OCN
descr: NTT DOCOMO BUSINESS,Inc.
descr: OTEMACHI PLACE WEST TOWER 2-3-1 Otemachi Chiyoda-ku, Tokyo 100-8019 Japan
country: JP
admin-c: JNIC1-AP
tech-c: JNIC1-AP
status: ALLOCATED PORTABLE
remarks: Email address for spam or abuse complaints: abuse@ocn.ad.jp
mnt-by: MAINT-JPNIC
mnt-irt: IRT-JPNIC-JP
mnt-lower: MAINT-JPNIC
last-modified: 2025-09-04T00:00:06Z
source: APNIC
irt: IRT-JPNIC-JP
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, japan
e-mail: hostmaster@nic.ad.jp
abuse-mailbox: hostmaster@nic.ad.jp
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
admin-c: JNIC1-AP
tech-c: JNIC1-AP
auth: # Filtered
remarks: hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by: MAINT-JPNIC
last-modified: 2025-09-04T01:00:00Z
source: APNIC
role: Japan Network Information Center
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, Japan
country: JP
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
e-mail: hostmaster@nic.ad.jp
admin-c: JI13-AP
tech-c: JE53-AP
nic-hdl: JNIC1-AP
mnt-by: MAINT-JPNIC
last-modified: 2022-01-05T03:04:02Z
source: APNIC
% Information related to '118.14.128.0 - 118.14.255.255'
inetnum: 118.14.128.0 - 118.14.255.255
netname: OCN
descr: Open Computer Network
country: JP
admin-c: JP00009614
tech-c: JP00009427
last-modified: 2021-11-15T18:41:26Z
remarks: This information has been partially mirrored by APNIC from
remarks: JPNIC. To obtain more specific information, please use the
remarks: JPNIC WHOIS Gateway at
remarks: http://www.nic.ad.jp/en/db/whois/en-gateway.html or
remarks: whois.nic.ad.jp for WHOIS client. (The WHOIS client
remarks: defaults to Japanese output, use the /e switch for English
remarks: output)
source: JPNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.14.235.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.14.235.243. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051701 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 18 05:04:05 CST 2026
;; MSG SIZE rcvd: 107
243.235.14.118.in-addr.arpa domain name pointer p757244-mobac01.tokyo.ocn.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
243.235.14.118.in-addr.arpa name = p757244-mobac01.tokyo.ocn.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.168.36.86 | attack | 2019-11-22T06:22:15.384241shield sshd\[11845\]: Invalid user website4 from 180.168.36.86 port 2994 2019-11-22T06:22:15.388813shield sshd\[11845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86 2019-11-22T06:22:17.667092shield sshd\[11845\]: Failed password for invalid user website4 from 180.168.36.86 port 2994 ssh2 2019-11-22T06:26:29.524052shield sshd\[12428\]: Invalid user www-data from 180.168.36.86 port 2995 2019-11-22T06:26:29.528092shield sshd\[12428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86 |
2019-11-22 16:50:08 |
| 190.210.42.209 | attack | 2019-11-22T06:59:38.560154abusebot-2.cloudsearch.cf sshd\[6467\]: Invalid user ssh from 190.210.42.209 port 8065 |
2019-11-22 16:36:54 |
| 106.12.32.48 | attackbots | Nov 22 09:23:02 server sshd\[22966\]: Invalid user sprader from 106.12.32.48 port 33006 Nov 22 09:23:02 server sshd\[22966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48 Nov 22 09:23:03 server sshd\[22966\]: Failed password for invalid user sprader from 106.12.32.48 port 33006 ssh2 Nov 22 09:27:11 server sshd\[6530\]: Invalid user asdffdsa from 106.12.32.48 port 38060 Nov 22 09:27:11 server sshd\[6530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48 |
2019-11-22 17:02:37 |
| 180.124.29.70 | attackbots | Telnetd brute force attack detected by fail2ban |
2019-11-22 16:39:39 |
| 139.155.5.132 | attack | Nov 22 09:19:32 sauna sshd[164247]: Failed password for root from 139.155.5.132 port 56342 ssh2 Nov 22 09:23:51 sauna sshd[164288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.5.132 ... |
2019-11-22 17:01:23 |
| 200.2.146.126 | attackspambots | Nov 21 04:10:39 xb0 sshd[2882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.2.146.126 user=ftp Nov 21 04:10:40 xb0 sshd[2882]: Failed password for ftp from 200.2.146.126 port 33030 ssh2 Nov 21 04:10:40 xb0 sshd[2882]: Received disconnect from 200.2.146.126: 11: Bye Bye [preauth] Nov 21 04:32:52 xb0 sshd[8534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.2.146.126 user=mysql Nov 21 04:32:53 xb0 sshd[8534]: Failed password for mysql from 200.2.146.126 port 51746 ssh2 Nov 21 04:32:54 xb0 sshd[8534]: Received disconnect from 200.2.146.126: 11: Bye Bye [preauth] Nov 21 04:36:57 xb0 sshd[5791]: Failed password for invalid user offernes from 200.2.146.126 port 60938 ssh2 Nov 21 04:36:57 xb0 sshd[5791]: Received disconnect from 200.2.146.126: 11: Bye Bye [preauth] Nov 21 04:40:52 xb0 sshd[2918]: Failed password for invalid user cecilius from 200.2.146.126 port 41906 ssh2 Nov 21 04:........ ------------------------------- |
2019-11-22 16:57:53 |
| 51.38.238.165 | attackbots | Nov 22 09:46:36 SilenceServices sshd[4262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165 Nov 22 09:46:39 SilenceServices sshd[4262]: Failed password for invalid user comrade from 51.38.238.165 port 53028 ssh2 Nov 22 09:50:05 SilenceServices sshd[5364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165 |
2019-11-22 16:51:03 |
| 179.189.190.166 | attackspam | Automatic report - Port Scan Attack |
2019-11-22 16:39:02 |
| 2001:4cc8:1:1:250:56ff:fe8d:ba40 | attackspambots | xmlrpc attack |
2019-11-22 16:26:55 |
| 178.156.202.190 | attack | HTTP: ChinaChopper Checkin 2 |
2019-11-22 16:43:47 |
| 196.216.206.2 | attackbotsspam | Nov 22 05:01:24 firewall sshd[28025]: Invalid user mohanraj from 196.216.206.2 Nov 22 05:01:26 firewall sshd[28025]: Failed password for invalid user mohanraj from 196.216.206.2 port 36734 ssh2 Nov 22 05:05:48 firewall sshd[28101]: Invalid user 123456 from 196.216.206.2 ... |
2019-11-22 16:46:19 |
| 112.64.170.178 | attackspambots | $f2bV_matches |
2019-11-22 17:05:35 |
| 129.211.35.94 | attack | fail2ban honeypot |
2019-11-22 16:42:24 |
| 154.92.130.234 | attack | Nov 22 10:49:43 www sshd\[170676\]: Invalid user smmsp from 154.92.130.234 Nov 22 10:49:43 www sshd\[170676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.130.234 Nov 22 10:49:46 www sshd\[170676\]: Failed password for invalid user smmsp from 154.92.130.234 port 37306 ssh2 ... |
2019-11-22 16:58:42 |
| 185.176.27.6 | attack | Nov 22 09:28:46 mc1 kernel: \[5697572.077898\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=23728 PROTO=TCP SPT=42749 DPT=59866 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 22 09:29:32 mc1 kernel: \[5697617.843893\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=48139 PROTO=TCP SPT=42749 DPT=26143 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 22 09:30:30 mc1 kernel: \[5697676.185266\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=45869 PROTO=TCP SPT=42749 DPT=2777 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-22 16:31:14 |