City: Tokyo
Region: Tokyo
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.0.32.0 - 14.0.63.255'
% Abuse contact for '14.0.32.0 - 14.0.63.255' is 'irt@nic.or.kr'
inetnum: 14.0.32.0 - 14.0.63.255
netname: CDNETWORKS
descr: CDNetworks
country: KR
admin-c: IM408-AP
tech-c: IM408-AP
status: ALLOCATED PORTABLE
mnt-by: MNT-KRNIC-AP
mnt-irt: IRT-KRNIC-KR
last-modified: 2025-03-28T01:26:02Z
source: APNIC
irt: IRT-KRNIC-KR
address: 9, Jinheung-gil, Naju-si, Jeollanam-do
e-mail: irt@nic.or.kr
abuse-mailbox: irt@nic.or.kr
admin-c: IM574-AP
tech-c: IM574-AP
auth: # Filtered
remarks: irt@nic.or.kr was validated on 2020-04-09
mnt-by: MNT-KRNIC-AP
last-modified: 2025-09-04T01:00:01Z
source: APNIC
person: IP Manager
address: Seoul Jung-gu Mareunnae-ro 34
country: KR
phone: +82-2-3441-0378
e-mail: gnoc@cdnetworks.com
nic-hdl: IM408-AP
mnt-by: MNT-KRNIC-AP
last-modified: 2022-07-29T02:00:02Z
source: APNIC
% Information related to '14.0.32.0 - 14.0.63.255'
inetnum: 14.0.32.0 - 14.0.63.255
netname: CDNETWORKS-KR
descr: CDNetworks
country: KR
admin-c: YK603-KR
tech-c: YK603-KR
status: ALLOCATED PORTABLE
mnt-by: MNT-KRNIC-AP
mnt-irt: IRT-KRNIC-KR
changed: hostmaster@nic.or.kr 20240912
remarks: This information has been partially mirrored by APNIC from
remarks: KRNIC. To obtain more specific information, please use the
remarks: KRNIC whois server at whois.kisa.or.kr.
source: KRNIC
person: IP Manager
address: Seoul Jung-gu Mareunnae-ro 34
address: 7F
country: KR
phone: +82-2-3441-0378
e-mail: gnoc@cdnetworks.com
nic-hdl: YK603-KR
mnt-by: MNT-KRNIC-AP
changed: hostmaster@nic.or.kr 20240912
remarks: This information has been partially mirrored by APNIC from
remarks: KRNIC. To obtain more specific information, please use the
remarks: KRNIC whois server at whois.kisa.or.kr.
source: KRNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.0.39.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.0.39.15. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050600 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 17:57:29 CST 2026
;; MSG SIZE rcvd: 103
Host 15.39.0.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 15.39.0.14.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 189.199.112.116 | attackspam | Spam Timestamp : 25-Jun-19 17:31 _ BlockList Provider combined abuse _ (1226) |
2019-06-26 06:50:55 |
| 190.85.50.62 | attackbotsspam | 445/tcp 445/tcp [2019-05-28/06-25]2pkt |
2019-06-26 06:47:47 |
| 104.236.94.202 | attackspambots | Jun 25 19:11:20 h2177944 sshd\[19420\]: Invalid user shuan from 104.236.94.202 port 40148 Jun 25 19:11:20 h2177944 sshd\[19420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.94.202 Jun 25 19:11:22 h2177944 sshd\[19420\]: Failed password for invalid user shuan from 104.236.94.202 port 40148 ssh2 Jun 25 19:14:19 h2177944 sshd\[19462\]: Invalid user vagrant from 104.236.94.202 port 39852 ... |
2019-06-26 06:20:09 |
| 88.149.181.240 | attackbots | detected by Fail2Ban |
2019-06-26 06:49:53 |
| 94.99.97.185 | attackbots | Spam Timestamp : 25-Jun-19 17:47 _ BlockList Provider combined abuse _ (1230) |
2019-06-26 06:46:13 |
| 36.112.130.77 | attack | Jun 25 16:38:02 debian sshd\[14132\]: Invalid user english from 36.112.130.77 port 26238 Jun 25 16:38:02 debian sshd\[14132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.130.77 Jun 25 16:38:04 debian sshd\[14132\]: Failed password for invalid user english from 36.112.130.77 port 26238 ssh2 ... |
2019-06-26 06:24:54 |
| 157.230.29.180 | attackbots | Automatic report - Web App Attack |
2019-06-26 06:32:08 |
| 113.161.90.97 | attackbotsspam | 445/tcp 445/tcp 445/tcp [2019-05-15/06-25]3pkt |
2019-06-26 06:25:53 |
| 192.200.108.162 | attackbots | Unauthorized connection attempt from IP address 192.200.108.162 on Port 445(SMB) |
2019-06-26 06:49:21 |
| 181.46.85.3 | attack | 2019-06-25T19:14:28.346920 X postfix/smtpd[48229]: NOQUEUE: reject: RCPT from unknown[181.46.85.3]: 554 5.7.1 Service unavailable; Client host [181.46.85.3] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.46.85.3; from= |
2019-06-26 06:15:18 |
| 92.126.192.75 | attack | Unauthorized connection attempt from IP address 92.126.192.75 on Port 445(SMB) |
2019-06-26 06:21:02 |
| 216.218.206.67 | attackspambots | "April 2019" |
2019-06-26 06:38:01 |
| 120.209.31.231 | attack | 'IP reached maximum auth failures for a one day block' |
2019-06-26 06:53:09 |
| 104.131.95.150 | attackspambots | Automatic report - Web App Attack |
2019-06-26 06:44:06 |
| 94.247.241.70 | attackbotsspam | Trying to deliver email spam, but blocked by RBL |
2019-06-26 06:15:46 |