City: unknown
Region: Sizuoka (Shizuoka)
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '126.64.0.0 - 126.127.255.255'
% Abuse contact for '126.64.0.0 - 126.127.255.255' is 'abuse@e.softbank.co.jp'
inetnum: 126.64.0.0 - 126.127.255.255
netname: BBTEC
descr: Japan Nation-wide Network of Softbank Corp.
country: JP
org: ORG-SC4-AP
admin-c: SA421-AP
tech-c: SA421-AP
abuse-c: AS2391-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-JP-BBTECH
mnt-routes: MAINT-JP-BBTECH
mnt-irt: IRT-SOFTBANK-JP
last-modified: 2023-07-12T22:54:51Z
source: APNIC
irt: IRT-SOFTBANK-JP
address: Tokyo Portcity Takeshiba Office Tower 21F
address: 1-7-1, Kaigan
address: Minatoku,Tokyo, Japan
e-mail: abuse@e.softbank.co.jp
abuse-mailbox: abuse@e.softbank.co.jp
admin-c: KF291-AP
tech-c: KF291-AP
auth: # Filtered
remarks: abuse@e.softbank.co.jp was validated on 2025-11-05
mnt-by: MAINT-JP-BBTECH
last-modified: 2026-01-06T10:49:11Z
source: APNIC
organisation: ORG-SC4-AP
org-name: SOFTBANK Corp.
org-type: LIR
country: JP
address: Tokyo Portcity Takeshiba Office Tower 22F
address: 1-7-1, Kaigan
phone: +81-3-6889-6365
e-mail: GRP-nic-admin@g.softbank.co.jp
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:51Z
source: APNIC
role: ABUSE SOFTBANKJP
country: ZZ
address: Tokyo Portcity Takeshiba Office Tower 21F
address: 1-7-1, Kaigan
address: Minatoku,Tokyo, Japan
phone: +000000000
e-mail: abuse@e.softbank.co.jp
admin-c: KF291-AP
tech-c: KF291-AP
nic-hdl: AS2391-AP
remarks: Generated from irt object IRT-SOFTBANK-JP
remarks: abuse@e.softbank.co.jp was validated on 2025-11-05
abuse-mailbox: abuse@e.softbank.co.jp
mnt-by: APNIC-ABUSE
last-modified: 2025-11-05T01:56:02Z
source: APNIC
role: SoftbankBB ABUSE
address: Tokyo Portcity Takeshiba Office Tower 22F, 1-7-1, Kaigan, Minatoku,Tokyo
country: JP
phone: +81-3-6688-5120
e-mail: abuse@e.softbank.co.jp
remarks: Please send spam report,virus alart
remarks: or any other abuse report
remarks: to abuse@e.softbank.co.jp
remarks: Any other Information, Notice,
remarks: Please send to hostmaster@bbtec.net
admin-c: KF291-AP
tech-c: KF291-AP
nic-hdl: SA421-AP
mnt-by: MAINT-JP-BBTECH
last-modified: 2024-03-26T02:44:48Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.87.114.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;126.87.114.240. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 01:01:08 CST 2026
;; MSG SIZE rcvd: 107
240.114.87.126.in-addr.arpa domain name pointer softbank126087114240.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
240.114.87.126.in-addr.arpa name = softbank126087114240.bbtec.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.211.218.202 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-11 13:27:12 |
| 121.40.206.215 | attackspambots | Automatic report - Banned IP Access |
2019-10-11 13:25:44 |
| 60.170.38.229 | attackbots | Unauthorised access (Oct 11) SRC=60.170.38.229 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=36077 TCP DPT=23 WINDOW=47601 SYN |
2019-10-11 14:04:44 |
| 139.59.89.7 | attackspam | 2019-10-11T06:58:22.569123 sshd[3878]: Invalid user Adrien!23 from 139.59.89.7 port 46366 2019-10-11T06:58:22.583100 sshd[3878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.89.7 2019-10-11T06:58:22.569123 sshd[3878]: Invalid user Adrien!23 from 139.59.89.7 port 46366 2019-10-11T06:58:24.544553 sshd[3878]: Failed password for invalid user Adrien!23 from 139.59.89.7 port 46366 ssh2 2019-10-11T07:02:54.446426 sshd[3966]: Invalid user QWERT@12345 from 139.59.89.7 port 58410 ... |
2019-10-11 13:48:43 |
| 213.251.41.52 | attackbots | Oct 11 05:51:39 game-panel sshd[9164]: Failed password for root from 213.251.41.52 port 48948 ssh2 Oct 11 05:55:11 game-panel sshd[9250]: Failed password for root from 213.251.41.52 port 59346 ssh2 |
2019-10-11 13:59:36 |
| 35.244.2.177 | attack | fail2ban honeypot |
2019-10-11 14:19:32 |
| 118.178.181.130 | attack | fail2ban honeypot |
2019-10-11 13:49:02 |
| 45.74.166.231 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.74.166.231/ US - 1H : (239) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN19397 IP : 45.74.166.231 CIDR : 45.74.160.0/20 PREFIX COUNT : 133 UNIQUE IP COUNT : 181248 WYKRYTE ATAKI Z ASN19397 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-11 05:55:39 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-11 14:17:39 |
| 104.248.58.71 | attackspambots | Oct 11 05:51:40 venus sshd\[28672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71 user=root Oct 11 05:51:43 venus sshd\[28672\]: Failed password for root from 104.248.58.71 port 57898 ssh2 Oct 11 05:55:25 venus sshd\[28722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71 user=root ... |
2019-10-11 13:58:34 |
| 45.136.109.250 | attack | Oct 11 07:36:53 mc1 kernel: \[2058601.968769\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=53729 PROTO=TCP SPT=44076 DPT=6784 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 11 07:43:48 mc1 kernel: \[2059017.087896\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12482 PROTO=TCP SPT=44076 DPT=6556 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 11 07:45:46 mc1 kernel: \[2059135.239152\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=1987 PROTO=TCP SPT=44076 DPT=6836 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-11 13:50:40 |
| 154.8.185.122 | attackbotsspam | Oct 11 03:52:15 www_kotimaassa_fi sshd[11627]: Failed password for root from 154.8.185.122 port 41724 ssh2 ... |
2019-10-11 13:55:28 |
| 180.253.224.12 | attackbotsspam | 19/10/10@23:56:12: FAIL: Alarm-Intrusion address from=180.253.224.12 ... |
2019-10-11 13:54:40 |
| 113.118.204.37 | attackspambots | Oct 11 05:55:41 ns3367391 proftpd[12695]: 127.0.0.1 (113.118.204.37[113.118.204.37]) - USER anonymous: no such user found from 113.118.204.37 [113.118.204.37] to 37.187.78.186:21 Oct 11 05:55:42 ns3367391 proftpd[12698]: 127.0.0.1 (113.118.204.37[113.118.204.37]) - USER yourdailypornmovies: no such user found from 113.118.204.37 [113.118.204.37] to 37.187.78.186:21 ... |
2019-10-11 14:16:06 |
| 45.115.99.38 | attackspambots | Oct 11 05:51:20 vmanager6029 sshd\[31955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38 user=root Oct 11 05:51:22 vmanager6029 sshd\[31955\]: Failed password for root from 45.115.99.38 port 37932 ssh2 Oct 11 05:56:00 vmanager6029 sshd\[32005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38 user=root |
2019-10-11 14:01:24 |
| 36.234.205.214 | attackbots | 19/10/10@23:55:41: FAIL: IoT-Telnet address from=36.234.205.214 ... |
2019-10-11 14:16:26 |