Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nagoya

Region: Aiti (Aichi)

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '111.96.0.0 - 111.111.255.255'

% Abuse contact for '111.96.0.0 - 111.111.255.255' is 'hostmaster@nic.ad.jp'

inetnum:        111.96.0.0 - 111.111.255.255
netname:        KDDI
descr:          KDDI CORPORATION
descr:          Garden Air Tower,3-10-10,Iidabashi,Chiyoda-ku,Tokyo,102-8460,Japan
country:        JP
admin-c:        JNIC1-AP
tech-c:         JNIC1-AP
status:         ALLOCATED PORTABLE
remarks:        Email address for spam or abuse complaints : abuse@dion.ne.jp
mnt-by:         MAINT-JPNIC
mnt-irt:        IRT-JPNIC-JP
mnt-lower:      MAINT-JPNIC
last-modified:  2024-04-17T02:59:31Z
source:         APNIC

irt:            IRT-JPNIC-JP
address:        Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address:        Chiyoda-ku, Tokyo 101-0047, japan
e-mail:         hostmaster@nic.ad.jp
abuse-mailbox:  hostmaster@nic.ad.jp
phone:          +81-3-5297-2311
fax-no:         +81-3-5297-2312
admin-c:        JNIC1-AP
tech-c:         JNIC1-AP
auth:           # Filtered
remarks:        hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by:         MAINT-JPNIC
last-modified:  2025-09-04T01:00:00Z
source:         APNIC

role:           Japan Network Information Center
address:        Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address:        Chiyoda-ku, Tokyo 101-0047, Japan
country:        JP
phone:          +81-3-5297-2311
fax-no:         +81-3-5297-2312
e-mail:         hostmaster@nic.ad.jp
admin-c:        JI13-AP
tech-c:         JE53-AP
nic-hdl:        JNIC1-AP
mnt-by:         MAINT-JPNIC
last-modified:  2022-01-05T03:04:02Z
source:         APNIC

% Information related to '111.107.67.0 - 111.107.67.255'

inetnum:        111.107.67.0 - 111.107.67.255
netname:        KDDI-NET
descr:          KDDI CORPORATION
country:        JP
admin-c:        JP00000127
tech-c:         JP00000181
last-modified:  2014-01-31T02:11:05Z
remarks:        This information has been partially mirrored by APNIC from
remarks:        JPNIC. To obtain more specific information, please use the
remarks:        JPNIC WHOIS Gateway at
remarks:        http://www.nic.ad.jp/en/db/whois/en-gateway.html or
remarks:        whois.nic.ad.jp for WHOIS client. (The WHOIS client
remarks:        defaults to Japanese output, use the /e switch for English
remarks:        output)
source:         JPNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.107.67.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.107.67.127.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 31 16:20:30 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 127.67.107.111.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.67.107.111.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.3.46.92 attackbotsspam
Automatic report - XMLRPC Attack
2020-03-31 19:52:18
191.215.146.161 attack
2020-03-31T10:21:08.590045shield sshd\[18766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191-215-146-161.user3p.veloxzone.com.br  user=root
2020-03-31T10:21:10.515568shield sshd\[18766\]: Failed password for root from 191.215.146.161 port 64897 ssh2
2020-03-31T10:26:32.870763shield sshd\[19997\]: Invalid user www from 191.215.146.161 port 10209
2020-03-31T10:26:32.879978shield sshd\[19997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191-215-146-161.user3p.veloxzone.com.br
2020-03-31T10:26:35.287842shield sshd\[19997\]: Failed password for invalid user www from 191.215.146.161 port 10209 ssh2
2020-03-31 19:55:52
23.212.129.121 attackspam
port
2020-03-31 19:35:12
92.63.194.108 attackbots
Mar 31 01:51:45 web9 sshd\[26117\]: Invalid user admin from 92.63.194.108
Mar 31 01:51:45 web9 sshd\[26117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.108
Mar 31 01:51:47 web9 sshd\[26117\]: Failed password for invalid user admin from 92.63.194.108 port 35545 ssh2
Mar 31 01:52:04 web9 sshd\[26200\]: Invalid user admin from 92.63.194.108
Mar 31 01:52:04 web9 sshd\[26200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.108
2020-03-31 20:01:40
58.187.163.132 attack
1585626559 - 03/31/2020 05:49:19 Host: 58.187.163.132/58.187.163.132 Port: 445 TCP Blocked
2020-03-31 19:32:24
106.13.38.246 attackspambots
$f2bV_matches
2020-03-31 19:54:53
218.245.1.169 attackspambots
fail2ban
2020-03-31 19:49:00
139.59.79.56 attackspambots
Mar 31 12:22:30 vpn01 sshd[31630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.56
Mar 31 12:22:31 vpn01 sshd[31630]: Failed password for invalid user mysql from 139.59.79.56 port 33010 ssh2
...
2020-03-31 19:51:59
79.137.33.20 attackbotsspam
2020-03-31T13:21:20.643061centos sshd[20373]: Failed password for invalid user rx from 79.137.33.20 port 35231 ssh2
2020-03-31T13:31:13.878945centos sshd[21053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20  user=root
2020-03-31T13:31:15.411011centos sshd[21053]: Failed password for root from 79.137.33.20 port 50017 ssh2
...
2020-03-31 20:03:04
94.176.189.11 attack
SpamScore above: 10.0
2020-03-31 20:11:42
114.67.113.90 attackbots
SSH login attempts brute force.
2020-03-31 19:54:07
12.199.167.154 attackbots
Unauthorized connection attempt detected from IP address 12.199.167.154 to port 5555
2020-03-31 19:57:52
89.252.191.109 attackspam
Repeated RDP login failures. Last user: 1
2020-03-31 19:56:43
92.63.194.104 attackspam
Mar 31 01:51:33 web9 sshd\[26079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104  user=root
Mar 31 01:51:34 web9 sshd\[26079\]: Failed password for root from 92.63.194.104 port 39411 ssh2
Mar 31 01:51:51 web9 sshd\[26127\]: Invalid user guest from 92.63.194.104
Mar 31 01:51:51 web9 sshd\[26127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104
Mar 31 01:51:53 web9 sshd\[26127\]: Failed password for invalid user guest from 92.63.194.104 port 33597 ssh2
2020-03-31 20:08:24
51.77.140.36 attackspam
(sshd) Failed SSH login from 51.77.140.36 (FR/France/36.ip-51-77-140.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 13:48:13 srv sshd[12283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36  user=root
Mar 31 13:48:15 srv sshd[12283]: Failed password for root from 51.77.140.36 port 48868 ssh2
Mar 31 14:02:11 srv sshd[12692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36  user=root
Mar 31 14:02:14 srv sshd[12692]: Failed password for root from 51.77.140.36 port 47740 ssh2
Mar 31 14:06:45 srv sshd[12865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36  user=root
2020-03-31 20:13:02

Recently Reported IPs

0.104.233.219 104.248.45.214 138.197.183.250 209.38.211.43
46.101.127.41 211.175.22.21 165.227.162.253 165.227.158.182
142.93.161.105 167.172.110.232 167.172.177.68 165.232.125.139
164.92.174.223 66.249.77.97 184.73.104.41 156.238.226.251
47.92.241.103 20.64.105.242 110.19.100.45 39.99.132.30