City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '163.44.64.0 - 163.44.191.255'
% Abuse contact for '163.44.64.0 - 163.44.191.255' is 'hostmaster@nic.ad.jp'
inetnum: 163.44.64.0 - 163.44.191.255
netname: interQ
descr: GMO Internet Group, Inc.
descr: SAINTcity,3-1-1,kyomachi,Kokurakita-ku,Kitakyushu-shi,Fukuoka,802-0002,Japan
country: JP
remarks: Email address for spam or abuse complaints : abuse@internet.gmo
admin-c: JNIC1-AP
tech-c: JNIC1-AP
mnt-by: MAINT-JPNIC
mnt-lower: MAINT-JPNIC
mnt-irt: IRT-JPNIC-JP
status: ALLOCATED PORTABLE
last-modified: 2026-03-10T01:53:24Z
source: APNIC
irt: IRT-JPNIC-JP
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, japan
e-mail: hostmaster@nic.ad.jp
abuse-mailbox: hostmaster@nic.ad.jp
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
admin-c: JNIC1-AP
tech-c: JNIC1-AP
auth: # Filtered
remarks: hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by: MAINT-JPNIC
last-modified: 2025-09-04T01:00:00Z
source: APNIC
role: Japan Network Information Center
address: Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address: Chiyoda-ku, Tokyo 101-0047, Japan
country: JP
phone: +81-3-5297-2311
fax-no: +81-3-5297-2312
e-mail: hostmaster@nic.ad.jp
admin-c: JI13-AP
tech-c: JE53-AP
nic-hdl: JNIC1-AP
mnt-by: MAINT-JPNIC
last-modified: 2022-01-05T03:04:02Z
source: APNIC
% Information related to '163.44.110.0 - 163.44.111.255'
inetnum: 163.44.110.0 - 163.44.111.255
netname: CNODE-C3J1
descr: GMO Internet, Inc.
country: JP
admin-c: JP00080271
tech-c: JP00080271
last-modified: 2025-07-23T02:44:07Z
remarks: This information has been partially mirrored by APNIC from
remarks: JPNIC. To obtain more specific information, please use the
remarks: JPNIC WHOIS Gateway at
remarks: http://www.nic.ad.jp/en/db/whois/en-gateway.html or
remarks: whois.nic.ad.jp for WHOIS client. (The WHOIS client
remarks: defaults to Japanese output, use the /e switch for English
remarks: output)
source: JPNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.44.110.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.44.110.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 12:01:43 CST 2026
;; MSG SIZE rcvd: 107
249.110.44.163.in-addr.arpa domain name pointer v163-44-110-249.zyom.static.cnode.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.110.44.163.in-addr.arpa name = v163-44-110-249.zyom.static.cnode.jp.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.96.12.154 | attack | 8080/tcp 7002/tcp 7001/tcp... [2019-06-29]9pkt,9pt.(tcp) |
2019-06-29 18:22:29 |
| 27.210.156.19 | attack | 23/tcp [2019-06-29]1pkt |
2019-06-29 17:45:09 |
| 185.176.27.30 | attackspambots | firewall-block, port(s): 15693/tcp |
2019-06-29 18:26:02 |
| 142.167.42.239 | attackspam | 5555/tcp [2019-06-29]1pkt |
2019-06-29 18:07:36 |
| 129.158.74.141 | attackspambots | 2019-06-29T11:33:49.6265071240 sshd\[15233\]: Invalid user caleb from 129.158.74.141 port 48706 2019-06-29T11:33:49.6308951240 sshd\[15233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.74.141 2019-06-29T11:33:51.7459191240 sshd\[15233\]: Failed password for invalid user caleb from 129.158.74.141 port 48706 ssh2 ... |
2019-06-29 18:21:51 |
| 220.92.36.32 | attack | 5555/tcp [2019-06-29]1pkt |
2019-06-29 17:48:58 |
| 59.115.175.146 | attack | 37215/tcp [2019-06-29]1pkt |
2019-06-29 17:53:43 |
| 165.22.96.224 | attackspam | Jun 29 10:40:09 bouncer sshd\[4724\]: Invalid user nginx from 165.22.96.224 port 48798 Jun 29 10:40:09 bouncer sshd\[4724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.96.224 Jun 29 10:40:11 bouncer sshd\[4724\]: Failed password for invalid user nginx from 165.22.96.224 port 48798 ssh2 ... |
2019-06-29 18:29:59 |
| 94.23.248.69 | attack | Automatic report - Web App Attack |
2019-06-29 18:02:36 |
| 167.60.195.165 | attackbotsspam | Honeypot attack, port: 445, PTR: r167-60-195-165.dialup.adsl.anteldata.net.uy. |
2019-06-29 17:40:32 |
| 80.82.70.137 | attack | Port Scan 3389 |
2019-06-29 17:53:09 |
| 198.108.67.98 | attackbotsspam | 2220/tcp 9091/tcp 8085/tcp... [2019-04-28/06-29]122pkt,118pt.(tcp) |
2019-06-29 18:21:18 |
| 118.25.36.160 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-06-29 18:05:54 |
| 42.99.180.135 | attack | Jun 29 11:37:45 vtv3 sshd\[1955\]: Invalid user myuser1 from 42.99.180.135 port 40254 Jun 29 11:37:45 vtv3 sshd\[1955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135 Jun 29 11:37:46 vtv3 sshd\[1955\]: Failed password for invalid user myuser1 from 42.99.180.135 port 40254 ssh2 Jun 29 11:40:36 vtv3 sshd\[3676\]: Invalid user zachary from 42.99.180.135 port 38636 Jun 29 11:40:36 vtv3 sshd\[3676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135 Jun 29 11:51:34 vtv3 sshd\[9533\]: Invalid user sybase from 42.99.180.135 port 56470 Jun 29 11:51:34 vtv3 sshd\[9533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135 Jun 29 11:51:36 vtv3 sshd\[9533\]: Failed password for invalid user sybase from 42.99.180.135 port 56470 ssh2 Jun 29 11:53:30 vtv3 sshd\[10501\]: Invalid user proba from 42.99.180.135 port 45330 Jun 29 11:53:30 vtv3 sshd\[10501\]: pam_u |
2019-06-29 18:11:54 |
| 117.230.129.138 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-06-29 17:44:38 |