City: Tokyo
Region: Tokyo
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.122.128.0 - 134.122.255.255
CIDR: 134.122.128.0/17
NetName: APNIC
NetHandle: NET-134-122-128-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2019-11-11
Updated: 2019-11-11
Ref: https://rdap.arin.net/registry/ip/134.122.128.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '134.122.192.0 - 134.122.255.255'
% Abuse contact for '134.122.192.0 - 134.122.255.255' is 'cs.mail@ctgserver.com'
inetnum: 134.122.192.0 - 134.122.255.255
netname: CTG192-255-JP
descr: CTG Server Ltd.
country: HK
admin-c: BCPL4-AP
tech-c: BCPL4-AP
abuse-c: AC2487-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-RCPL-SG
mnt-irt: IRT-CTG-HK
last-modified: 2024-11-13T03:03:04Z
source: APNIC
irt: IRT-CTG-HK
address: 202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
e-mail: cs.mail@ctgserver.com
abuse-mailbox: cs.mail@ctgserver.com
admin-c: RCPL3-AP
tech-c: RCPL3-AP
auth: # Filtered
remarks: cs.mail@ctgserver.com
remarks: cs.mail@ctgserver.com was validated on 2025-07-31
mnt-by: MAINT-RCPL-SG
last-modified: 2025-11-18T00:34:04Z
source: APNIC
role: ABUSE CTGHK
country: ZZ
address: 202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
phone: +000000000
e-mail: cs.mail@ctgserver.com
admin-c: RCPL3-AP
tech-c: RCPL3-AP
nic-hdl: AC2487-AP
remarks: Generated from irt object IRT-CTG-HK
remarks: cs.mail@ctgserver.com was validated on 2025-07-31
abuse-mailbox: cs.mail@ctgserver.com
mnt-by: APNIC-ABUSE
last-modified: 2025-07-31T03:16:34Z
source: APNIC
role: BGP CONSULTANCY PTE LTD administrator
address: 399 Chai Wan Road, Chai Wan, Hong Kong
country: HK
phone: +603-7806-1316
e-mail: abuse@rackip.com
admin-c: RCPL3-AP
tech-c: RCPL3-AP
nic-hdl: BCPL4-AP
mnt-by: MAINT-RCPL-SG
last-modified: 2017-03-14T09:18:17Z
source: APNIC
% Information related to '134.122.194.0/24AS152194'
route: 134.122.194.0/24
origin: AS152194
descr: RACKIP CONSULTANCY PTE. LTD.
No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by: MAINT-RCPL-SG
last-modified: 2024-03-23T14:02:59Z
source: APNIC
% Information related to '134.122.194.0/24AS64050'
route: 134.122.194.0/24
origin: AS64050
descr: RACKIP CONSULTANCY PTE. LTD.
No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by: MAINT-RCPL-SG
last-modified: 2020-05-20T05:23:42Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.122.194.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.122.194.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012902 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 13:01:10 CST 2026
;; MSG SIZE rcvd: 108
Host 131.194.122.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 131.194.122.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.251.81.163 | attackspam | 23/tcp 23/tcp 23/tcp... [2019-10-30]25pkt,1pt.(tcp) |
2019-10-30 23:16:50 |
| 94.177.240.65 | attackspam | 22/tcp [2019-10-30]1pkt |
2019-10-30 22:46:48 |
| 188.18.53.48 | attackbotsspam | Sniffing for wp-login |
2019-10-30 23:09:59 |
| 86.107.12.15 | attack | 445/tcp 445/tcp [2019-10-30]2pkt |
2019-10-30 22:30:04 |
| 182.74.125.2 | attackspam | 445/tcp [2019-10-30]1pkt |
2019-10-30 23:02:48 |
| 222.186.175.169 | attackbots | Oct 30 11:34:45 firewall sshd[21229]: Failed password for root from 222.186.175.169 port 12406 ssh2 Oct 30 11:34:45 firewall sshd[21229]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 12406 ssh2 [preauth] Oct 30 11:34:45 firewall sshd[21229]: Disconnecting: Too many authentication failures [preauth] ... |
2019-10-30 22:39:09 |
| 144.91.91.200 | attackspambots | 52869/tcp 52869/tcp 52869/tcp [2019-10-30]3pkt |
2019-10-30 22:33:52 |
| 133.130.119.178 | attackspambots | Oct 30 11:52:50 work-partkepr sshd\[16408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.178 user=root Oct 30 11:52:51 work-partkepr sshd\[16408\]: Failed password for root from 133.130.119.178 port 46904 ssh2 ... |
2019-10-30 22:37:15 |
| 61.19.22.217 | attack | Oct 30 14:27:07 hcbbdb sshd\[3506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.217 user=root Oct 30 14:27:09 hcbbdb sshd\[3506\]: Failed password for root from 61.19.22.217 port 36224 ssh2 Oct 30 14:32:03 hcbbdb sshd\[4025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.217 user=root Oct 30 14:32:06 hcbbdb sshd\[4025\]: Failed password for root from 61.19.22.217 port 46984 ssh2 Oct 30 14:36:48 hcbbdb sshd\[4510\]: Invalid user Findlay from 61.19.22.217 |
2019-10-30 22:41:10 |
| 218.92.0.199 | attack | Oct 30 14:59:17 venus sshd\[23762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199 user=root Oct 30 14:59:19 venus sshd\[23762\]: Failed password for root from 218.92.0.199 port 55567 ssh2 Oct 30 14:59:21 venus sshd\[23762\]: Failed password for root from 218.92.0.199 port 55567 ssh2 ... |
2019-10-30 23:06:33 |
| 49.235.65.48 | attack | Oct 30 04:04:21 web1 sshd\[15655\]: Invalid user eric2456 from 49.235.65.48 Oct 30 04:04:21 web1 sshd\[15655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48 Oct 30 04:04:23 web1 sshd\[15655\]: Failed password for invalid user eric2456 from 49.235.65.48 port 38696 ssh2 Oct 30 04:10:24 web1 sshd\[16210\]: Invalid user niao123 from 49.235.65.48 Oct 30 04:10:24 web1 sshd\[16210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.65.48 |
2019-10-30 22:57:35 |
| 88.12.15.22 | attackbots | Oct 30 15:13:07 master sshd[12976]: Failed password for invalid user support from 88.12.15.22 port 56172 ssh2 |
2019-10-30 23:10:32 |
| 117.2.234.162 | attack | 8728/tcp [2019-10-30]1pkt |
2019-10-30 22:52:53 |
| 124.13.147.167 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-30 23:11:13 |
| 218.161.112.40 | attack | 23/tcp [2019-10-30]1pkt |
2019-10-30 22:39:28 |