City: Nagareyama
Region: Tiba (Chiba)
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 130.87.0.0 - 130.87.255.255
CIDR: 130.87.0.0/16
NetName: APNIC-ERX-130-87-0-0
NetHandle: NET-130-87-0-0-1
Parent: NET130 (NET-130-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2003-11-12
Updated: 2018-02-02
Comment: This IP address range is not registered in the ARIN database. This range was transferred to the APNIC Whois Database as part of the ERX (Early Registration Transfer) project. For details, refer to the APNIC Whois Database via WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl ** IMPORTANT NOTE: APNIC is the Regional Internet Registry for the Asia Pacific region. APNIC does not operate networks using this IP address range and is not able to investigate spam or abuse reports relating to these addresses. For more help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/130.87.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '130.87.0.0 - 130.87.255.255'
% Abuse contact for '130.87.0.0 - 130.87.255.255' is 'hostmaster@nic.ad.jp'
inetnum: 130.87.0.0 - 130.87.255.255
netname: JP-HEPNET
country: JP
descr: National Laboratory for High Energy Physics (KEK)
admin-c: SS4026-AP
tech-c: SS4026-AP
status: ASSIGNED PORTABLE
mnt-by: MAINT-JPNIC
mnt-irt: IRT-JPNIC-JP
last-modified: 2021-03-24T10:04:05Z
source: APNIC
irt: IRT-JPNIC-JP
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, japan
e-mail: hostmaster@nic.ad.jp
abuse-mailbox: hostmaster@nic.ad.jp
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
admin-c: JNIC1-AP
tech-c: JNIC1-AP
auth: # Filtered
remarks: hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by: MAINT-JPNIC
last-modified: 2025-09-04T01:00:00Z
source: APNIC
person: Soh Suzuki
nic-hdl: SS4026-AP
e-mail: soh.suzuki@kek.jp
address: Oho 1-1, Tsukuba, Ibaraki 305-0801, Japan
phone: +81-29-879-6007
country: JP
mnt-by: MAINT-JPNIC
last-modified: 2021-03-24T09:44:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.87.122.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.87.122.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 01:29:06 CST 2026
;; MSG SIZE rcvd: 107
Host 194.122.87.130.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.122.87.130.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 40.115.113.251 | attackspam | Repeated RDP login failures. Last user: admin |
2020-04-24 05:59:42 |
| 122.137.241.234 | attack | Port probing on unauthorized port 23 |
2020-04-24 05:56:51 |
| 222.186.31.204 | attack | Apr 24 00:11:24 plex sshd[31097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.204 user=root Apr 24 00:11:25 plex sshd[31097]: Failed password for root from 222.186.31.204 port 48736 ssh2 |
2020-04-24 06:15:20 |
| 181.48.139.118 | attackspam | Invalid user hv from 181.48.139.118 port 49884 |
2020-04-24 06:17:50 |
| 101.78.183.226 | attackspam | Apr 23 18:37:39 tux postfix/smtpd[8270]: connect from edm01.ecfriend.com[101.78.183.226] Apr x@x Apr 23 18:37:40 tux postfix/smtpd[8270]: disconnect from edm01.ecfriend.com[101.78.183.226] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=101.78.183.226 |
2020-04-24 05:58:06 |
| 189.126.168.43 | attack | firewall-block, port(s): 1433/tcp |
2020-04-24 06:19:22 |
| 45.141.86.145 | attack | Attempting to brute-force a VPN connection |
2020-04-24 06:29:46 |
| 183.16.103.30 | attack | Spam_report |
2020-04-24 05:56:00 |
| 129.211.99.254 | attackbots | SSH Brute-Force Attack |
2020-04-24 05:59:57 |
| 222.128.20.226 | attack | Apr 23 20:57:32 vmd17057 sshd[30875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.20.226 Apr 23 20:57:34 vmd17057 sshd[30875]: Failed password for invalid user manuel from 222.128.20.226 port 32832 ssh2 ... |
2020-04-24 06:11:40 |
| 92.63.194.79 | attack | VNC brute force attack detected by fail2ban |
2020-04-24 06:03:31 |
| 45.136.108.85 | attackspambots | Apr 19 22:28:22 : SSH login attempts with invalid user |
2020-04-24 06:13:59 |
| 79.143.30.85 | attack | Apr 23 19:46:39 vpn01 sshd[7103]: Failed password for root from 79.143.30.85 port 33730 ssh2 Apr 23 19:53:43 vpn01 sshd[7234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.30.85 ... |
2020-04-24 06:13:35 |
| 125.77.30.167 | attackbots | firewall-block, port(s): 60001/tcp |
2020-04-24 06:25:43 |
| 104.40.2.239 | attackspam | RDP Bruteforce |
2020-04-24 06:07:34 |