City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.72.16.0 - 112.72.31.255'
% No abuse contact registered for 112.72.16.0 - 112.72.31.255
inetnum: 112.72.16.0 - 112.72.31.255
netname: JCNETWORK
descr: jungwoocomnet
descr: 1056-11, KYONGGI Gwonseon-dong Gwonseon-gu, Suwon-si Gyeonggi-do
descr: ***********************************
descr: Allocated to KRNIC Member.
descr: If you would like to find assignment
descr: information in detail please refer to
descr: the KRNIC Whois Database at:
descr: "http://whois.nida.or.kr/english/index.html"
descr: ************************************
country: KR
admin-c: BJ235-AP
tech-c: BJ235-AP
status: Allocated Portable
remarks: www.jungwoocom.net
mnt-by: MNT-KRNIC-AP
mnt-lower: MNT-KRNIC-AP
last-modified: 2008-12-24T01:20:06Z
source: APNIC
person: Boungwoo Jung
nic-hdl: BJ235-AP
e-mail: comnetjw@hanmir.com
address: 1056-11, KYONGGI Gwonseon-dong Gwonseon-gu, Suwon-si Gyeonggi-do, 441-824
phone: +82-31-221-7722
fax-no: +82-31-221-7742
country: KR
mnt-by: MNT-KRNIC-AP
last-modified: 2008-09-04T07:50:09Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.72.31.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.72.31.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 10:43:08 CST 2026
;; MSG SIZE rcvd: 105
Host 80.31.72.112.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.31.72.112.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.188.52.48 | attackbotsspam | 20/4/12@23:55:41: FAIL: Alarm-Network address from=14.188.52.48 ... |
2020-04-13 15:15:50 |
| 96.84.240.89 | attackbots | Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-04-13 15:37:44 |
| 129.211.70.33 | attackbotsspam | Apr 13 08:07:36 server sshd[63032]: Failed password for invalid user vps from 129.211.70.33 port 55462 ssh2 Apr 13 08:11:16 server sshd[63953]: Failed password for invalid user radio from 129.211.70.33 port 47023 ssh2 Apr 13 08:14:53 server sshd[64878]: Failed password for root from 129.211.70.33 port 38583 ssh2 |
2020-04-13 15:19:13 |
| 172.105.28.38 | attackspam | trying to access non-authorized port |
2020-04-13 15:12:04 |
| 3.84.115.189 | attackbots | 5x Failed Password |
2020-04-13 15:41:09 |
| 183.88.217.46 | attackspambots | Dovecot Invalid User Login Attempt. |
2020-04-13 15:19:39 |
| 36.22.187.34 | attack | Unauthorized SSH login attempts |
2020-04-13 15:32:03 |
| 122.51.215.154 | attack | Apr 13 08:01:51 host01 sshd[23764]: Failed password for root from 122.51.215.154 port 44126 ssh2 Apr 13 08:06:12 host01 sshd[24552]: Failed password for root from 122.51.215.154 port 47248 ssh2 ... |
2020-04-13 15:25:20 |
| 182.148.179.253 | attack | Apr 13 05:47:23 srv01 sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253 user=root Apr 13 05:47:25 srv01 sshd[14433]: Failed password for root from 182.148.179.253 port 42706 ssh2 Apr 13 05:54:12 srv01 sshd[14757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253 user=root Apr 13 05:54:14 srv01 sshd[14757]: Failed password for root from 182.148.179.253 port 53100 ssh2 Apr 13 05:55:10 srv01 sshd[14802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253 user=root Apr 13 05:55:11 srv01 sshd[14802]: Failed password for root from 182.148.179.253 port 36576 ssh2 ... |
2020-04-13 15:35:48 |
| 118.89.153.96 | attackbotsspam | Apr 13 07:56:51 host01 sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.153.96 Apr 13 07:56:53 host01 sshd[22807]: Failed password for invalid user rpc from 118.89.153.96 port 32900 ssh2 Apr 13 08:01:40 host01 sshd[23705]: Failed password for root from 118.89.153.96 port 55130 ssh2 ... |
2020-04-13 15:03:49 |
| 80.211.114.30 | attack | Wordpress malicious attack:[sshd] |
2020-04-13 15:04:53 |
| 222.186.175.23 | attackbotsspam | Apr 13 04:25:49 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2 Apr 13 04:25:54 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2 Apr 13 04:25:56 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2 ... |
2020-04-13 15:31:21 |
| 128.199.220.232 | attack | $f2bV_matches |
2020-04-13 15:27:34 |
| 81.246.63.226 | attack | $f2bV_matches |
2020-04-13 15:04:32 |
| 212.81.57.120 | attack | SpamScore above: 10.0 |
2020-04-13 15:04:18 |