City: unknown
Region: Totigi (Tochigi)
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
[ JPNIC database provides information regarding IP address and ASN. Its use ]
[ is restricted to network administration purposes. For further information, ]
[ use 'whois -h whois.nic.ad.jp help'. To only display English output, ]
[ add '/e' at the end of command, e.g. 'whois -h whois.nic.ad.jp xxx/e'. ]
Network Information:
a. [Network Number] 211.121.192.0/18
b. [Network Name] ODN
g. [Organization] Open Data Network(JAPAN TELECOM CO.,LTD.)
m. [Administrative Contact] JP00035900
n. [Technical Contact] JP00035900
o. [Abuse]
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.192.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.192.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.193.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.193.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.194.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.194.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.195.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.195.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.196.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.196.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.197.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.197.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.200.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.200.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.201.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.201.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.202.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.202.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.203.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.203.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.204.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.204.0/24
p. [Nameserver] ns1.dhs.jtidc.jp/211.121.207.0/24
p. [Nameserver] ns2.dhs.jtidc.jp/211.121.207.0/24
p. [Nameserver] ns2.odn.ne.jp/211.121.198.0-211.121.199.255
p. [Nameserver] ns4.odn.ne.jp/211.121.198.0-211.121.199.255
p. [Nameserver] ns2.odn.ne.jp/211.121.205.0-211.121.206.255
p. [Nameserver] ns4.odn.ne.jp/211.121.205.0-211.121.206.255
p. [Nameserver] ns2.odn.ne.jp/211.121.208.0-211.121.255.255
p. [Nameserver] ns4.odn.ne.jp/211.121.208.0-211.121.255.255
[Assigned Date] 2000/06/27
[Return Date]
[Last Update] 2013/08/07 16:20:04(JST)
Less Specific Info.
----------
SoftBank Corp.
[Allocation] 211.121.0.0/16
More Specific Info.
----------
No match!!
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.121.247.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.121.247.232. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 24 01:30:16 CST 2026
;; MSG SIZE rcvd: 108
232.247.121.211.in-addr.arpa domain name pointer HDOfx-103p7-232.ppp11.odn.ad.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
232.247.121.211.in-addr.arpa name = HDOfx-103p7-232.ppp11.odn.ad.jp.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.21.66.6 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2019-08-27 03:08:56 |
| 31.129.185.250 | attackspambots | Unauthorized connection attempt from IP address 31.129.185.250 on Port 445(SMB) |
2019-08-27 03:20:52 |
| 200.94.150.22 | attackspam | Unauthorized connection attempt from IP address 200.94.150.22 on Port 445(SMB) |
2019-08-27 03:35:12 |
| 95.254.96.222 | attackbotsspam | Unauthorized connection attempt from IP address 95.254.96.222 on Port 445(SMB) |
2019-08-27 03:09:20 |
| 41.130.216.145 | attack | Unauthorized connection attempt from IP address 41.130.216.145 on Port 445(SMB) |
2019-08-27 03:19:05 |
| 199.87.154.255 | attack | Reported by AbuseIPDB proxy server. |
2019-08-27 03:06:38 |
| 165.22.182.168 | attackspam | Aug 26 04:53:26 php2 sshd\[2994\]: Invalid user vincintz from 165.22.182.168 Aug 26 04:53:26 php2 sshd\[2994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168 Aug 26 04:53:27 php2 sshd\[2994\]: Failed password for invalid user vincintz from 165.22.182.168 port 44638 ssh2 Aug 26 04:57:35 php2 sshd\[3349\]: Invalid user nagios from 165.22.182.168 Aug 26 04:57:35 php2 sshd\[3349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168 |
2019-08-27 03:03:34 |
| 45.80.64.246 | attackspambots | ssh intrusion attempt |
2019-08-27 03:18:34 |
| 49.151.192.223 | attackspam | Unauthorized connection attempt from IP address 49.151.192.223 on Port 445(SMB) |
2019-08-27 03:47:42 |
| 103.224.167.88 | attackbots | Caught in portsentry honeypot |
2019-08-27 03:52:15 |
| 93.51.232.116 | attackbotsspam | Unauthorized connection attempt from IP address 93.51.232.116 on Port 445(SMB) |
2019-08-27 03:13:07 |
| 183.88.1.189 | attack | Unauthorized connection attempt from IP address 183.88.1.189 on Port 445(SMB) |
2019-08-27 03:30:44 |
| 153.36.242.143 | attackspam | Aug 26 09:12:49 php1 sshd\[29487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root Aug 26 09:12:51 php1 sshd\[29487\]: Failed password for root from 153.36.242.143 port 52060 ssh2 Aug 26 09:12:57 php1 sshd\[29497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root Aug 26 09:13:00 php1 sshd\[29497\]: Failed password for root from 153.36.242.143 port 33239 ssh2 Aug 26 09:13:09 php1 sshd\[29512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root |
2019-08-27 03:16:55 |
| 80.210.21.156 | attack | Unauthorized connection attempt from IP address 80.210.21.156 on Port 445(SMB) |
2019-08-27 03:44:53 |
| 180.249.202.26 | attackbots | Unauthorized connection attempt from IP address 180.249.202.26 on Port 445(SMB) |
2019-08-27 03:46:00 |