城市(city): Sapporo
省份(region): Hokkaidō
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '180.0.0.0 - 180.63.255.255'
% Abuse contact for '180.0.0.0 - 180.63.255.255' is 'hostmaster@nic.ad.jp'
inetnum: 180.0.0.0 - 180.63.255.255
netname: OCN
descr: NTT DOCOMO BUSINESS,Inc.
descr: OTEMACHI PLACE WEST TOWER 2-3-1 Otemachi Chiyoda-ku, Tokyo 100-8019 Japan
country: JP
admin-c: JNIC1-AP
tech-c: JNIC1-AP
status: ALLOCATED PORTABLE
remarks: Email address for spam or abuse complaints: abuse@ocn.ad.jp
mnt-by: MAINT-JPNIC
mnt-irt: IRT-JPNIC-JP
mnt-lower: MAINT-JPNIC
last-modified: 2025-09-04T00:00:10Z
source: APNIC
irt: IRT-JPNIC-JP
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, japan
e-mail: hostmaster@nic.ad.jp
abuse-mailbox: hostmaster@nic.ad.jp
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
admin-c: JNIC1-AP
tech-c: JNIC1-AP
auth: # Filtered
remarks: hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by: MAINT-JPNIC
last-modified: 2025-09-04T01:00:00Z
source: APNIC
role: Japan Network Information Center
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, Japan
country: JP
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
e-mail: hostmaster@nic.ad.jp
admin-c: JI13-AP
tech-c: JE53-AP
nic-hdl: JNIC1-AP
mnt-by: MAINT-JPNIC
last-modified: 2022-01-05T03:04:02Z
source: APNIC
% Information related to '180.1.0.0 - 180.1.127.255'
inetnum: 180.1.0.0 - 180.1.127.255
netname: OCN
descr: Open Computer Network
country: JP
admin-c: JP00009614
tech-c: JP00009427
last-modified: 2021-11-15T18:41:26Z
remarks: This information has been partially mirrored by APNIC from
remarks: JPNIC. To obtain more specific information, please use the
remarks: JPNIC WHOIS Gateway at
remarks: http://www.nic.ad.jp/en/db/whois/en-gateway.html or
remarks: whois.nic.ad.jp for WHOIS client. (The WHOIS client
remarks: defaults to Japanese output, use the /e switch for English
remarks: output)
source: JPNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.1.127.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;180.1.127.189. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 19:54:54 CST 2026
;; MSG SIZE rcvd: 106
Host 189.127.1.180.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 189.127.1.180.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 204.48.31.119 | attackbotsspam | [portscan] Port scan |
2020-01-02 23:45:46 |
| 94.130.55.1 | attackspambots | SSH login attempts with user root at 2020-01-02. |
2020-01-02 23:56:35 |
| 82.146.40.2 | attackspambots | SSH login attempts with user root at 2020-01-02. |
2020-01-03 00:08:45 |
| 89.65.49.3 | attack | web Attack on Website at 2020-01-02. |
2020-01-03 00:02:00 |
| 118.126.97.230 | attack | Jan 2 14:48:33 zeus sshd[11666]: Failed password for root from 118.126.97.230 port 47500 ssh2 Jan 2 14:52:46 zeus sshd[11864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.97.230 Jan 2 14:52:48 zeus sshd[11864]: Failed password for invalid user briles from 118.126.97.230 port 41736 ssh2 |
2020-01-02 23:44:39 |
| 177.69.190.97 | attackspambots | Automatically reported by fail2ban report script (netz-treff) |
2020-01-03 00:15:29 |
| 86.38.171.8 | attack | web Attack on Wordpress site at 2020-01-02. |
2020-01-03 00:05:15 |
| 129.226.129.144 | attack | 2020-01-02T10:27:50.468227xentho-1 sshd[383766]: Invalid user 12 from 129.226.129.144 port 34268 2020-01-02T10:27:50.474652xentho-1 sshd[383766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144 2020-01-02T10:27:50.468227xentho-1 sshd[383766]: Invalid user 12 from 129.226.129.144 port 34268 2020-01-02T10:27:52.521555xentho-1 sshd[383766]: Failed password for invalid user 12 from 129.226.129.144 port 34268 ssh2 2020-01-02T10:29:50.524241xentho-1 sshd[383809]: Invalid user p@ssw0rd from 129.226.129.144 port 52068 2020-01-02T10:29:50.532135xentho-1 sshd[383809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144 2020-01-02T10:29:50.524241xentho-1 sshd[383809]: Invalid user p@ssw0rd from 129.226.129.144 port 52068 2020-01-02T10:29:52.719406xentho-1 sshd[383809]: Failed password for invalid user p@ssw0rd from 129.226.129.144 port 52068 ssh2 2020-01-02T10:31:52.263713xentho-1 sshd[3838 ... |
2020-01-02 23:48:07 |
| 88.224.134.2 | attackspambots | web Attack on Wordpress site at 2020-01-02. |
2020-01-03 00:03:14 |
| 85.209.0.2 | attackbotsspam | SSH login attempts with user root at 2020-01-02. |
2020-01-03 00:05:40 |
| 51.83.98.104 | attack | Jan 2 14:57:07 work-partkepr sshd\[2727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104 user=root Jan 2 14:57:09 work-partkepr sshd\[2727\]: Failed password for root from 51.83.98.104 port 57490 ssh2 ... |
2020-01-02 23:50:20 |
| 64.202.187.152 | attack | Unauthorized connection attempt detected from IP address 64.202.187.152 to port 22 |
2020-01-03 00:26:20 |
| 95.52.160.9 | attackbots | web Attack on Website at 2020-01-02. |
2020-01-02 23:54:51 |
| 112.85.42.181 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root Failed password for root from 112.85.42.181 port 4517 ssh2 Failed password for root from 112.85.42.181 port 4517 ssh2 Failed password for root from 112.85.42.181 port 4517 ssh2 Failed password for root from 112.85.42.181 port 4517 ssh2 |
2020-01-03 00:22:01 |
| 87.62.96.1 | attackbots | SSH login attempts with user root at 2020-01-02. |
2020-01-03 00:04:07 |