City: unknown
Region: unknown
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '218.112.0.0 - 218.143.255.255'
% Abuse contact for '218.112.0.0 - 218.143.255.255' is 'abuse@e.softbank.co.jp'
inetnum: 218.112.0.0 - 218.143.255.255
netname: BBTECH
descr: Japan Nation-wide Network of SoftBank Corp.
country: JP
org: ORG-SC4-AP
admin-c: SA421-AP
tech-c: SA421-AP
abuse-c: AS2391-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-JP-BBTECH
mnt-routes: MAINT-JP-BBTECH
mnt-irt: IRT-SOFTBANK-JP
last-modified: 2020-10-20T00:56:35Z
source: APNIC
irt: IRT-SOFTBANK-JP
address: Tokyo Portcity Takeshiba Office Tower 21F
address: 1-7-1, Kaigan
address: Minatoku,Tokyo, Japan
e-mail: abuse@e.softbank.co.jp
abuse-mailbox: abuse@e.softbank.co.jp
admin-c: KF291-AP
tech-c: KF291-AP
auth: # Filtered
remarks: abuse@e.softbank.co.jp was validated on 2025-11-05
mnt-by: MAINT-JP-BBTECH
last-modified: 2026-01-06T10:49:11Z
source: APNIC
organisation: ORG-SC4-AP
org-name: SOFTBANK Corp.
org-type: LIR
country: JP
address: Tokyo Portcity Takeshiba Office Tower 22F
address: 1-7-1, Kaigan
phone: +81-3-6889-6365
e-mail: GRP-nic-admin@g.softbank.co.jp
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:51Z
source: APNIC
role: ABUSE SOFTBANKJP
country: ZZ
address: Tokyo Portcity Takeshiba Office Tower 21F
address: 1-7-1, Kaigan
address: Minatoku,Tokyo, Japan
phone: +000000000
e-mail: abuse@e.softbank.co.jp
admin-c: KF291-AP
tech-c: KF291-AP
nic-hdl: AS2391-AP
remarks: Generated from irt object IRT-SOFTBANK-JP
remarks: abuse@e.softbank.co.jp was validated on 2025-11-05
abuse-mailbox: abuse@e.softbank.co.jp
mnt-by: APNIC-ABUSE
last-modified: 2025-11-05T01:56:02Z
source: APNIC
role: SoftbankBB ABUSE
address: Tokyo Portcity Takeshiba Office Tower 22F, 1-7-1, Kaigan, Minatoku,Tokyo
country: JP
phone: +81-3-6688-5120
e-mail: abuse@e.softbank.co.jp
remarks: Please send spam report,virus alart
remarks: or any other abuse report
remarks: to abuse@e.softbank.co.jp
remarks: Any other Information, Notice,
remarks: Please send to hostmaster@bbtec.net
admin-c: KF291-AP
tech-c: KF291-AP
nic-hdl: SA421-AP
mnt-by: MAINT-JP-BBTECH
last-modified: 2024-03-26T02:44:48Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.134.69.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;218.134.69.181. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 06:49:59 CST 2026
;; MSG SIZE rcvd: 107
181.69.134.218.in-addr.arpa domain name pointer softbank218134069181.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
181.69.134.218.in-addr.arpa name = softbank218134069181.bbtec.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.234.91.113 | attackspambots | Sep 21 13:05:50 xtremcommunity sshd\[326951\]: Invalid user temp from 62.234.91.113 port 36629 Sep 21 13:05:50 xtremcommunity sshd\[326951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.113 Sep 21 13:05:52 xtremcommunity sshd\[326951\]: Failed password for invalid user temp from 62.234.91.113 port 36629 ssh2 Sep 21 13:11:51 xtremcommunity sshd\[327147\]: Invalid user gmodserver from 62.234.91.113 port 57025 Sep 21 13:11:51 xtremcommunity sshd\[327147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.113 ... |
2019-09-22 01:14:07 |
| 76.73.206.93 | attackspambots | 2019-09-21T16:53:23.982241abusebot-5.cloudsearch.cf sshd\[21829\]: Invalid user zai from 76.73.206.93 port 16583 |
2019-09-22 01:17:17 |
| 117.50.38.202 | attackspam | Sep 21 18:05:26 dedicated sshd[6036]: Invalid user tr from 117.50.38.202 port 53440 |
2019-09-22 01:24:18 |
| 171.236.92.54 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:49:30,660 INFO [amun_request_handler] PortScan Detected on Port: 445 (171.236.92.54) |
2019-09-22 01:11:03 |
| 200.107.154.3 | attackspam | Sep 21 07:06:00 php1 sshd\[30778\]: Invalid user mysqladmin from 200.107.154.3 Sep 21 07:06:00 php1 sshd\[30778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.3 Sep 21 07:06:03 php1 sshd\[30778\]: Failed password for invalid user mysqladmin from 200.107.154.3 port 27896 ssh2 Sep 21 07:11:30 php1 sshd\[31347\]: Invalid user netika from 200.107.154.3 Sep 21 07:11:30 php1 sshd\[31347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.3 |
2019-09-22 01:23:03 |
| 37.6.119.54 | attackbotsspam | Unauthorised access (Sep 21) SRC=37.6.119.54 LEN=40 TTL=50 ID=8782 TCP DPT=8080 WINDOW=41407 SYN |
2019-09-22 01:03:30 |
| 80.211.245.183 | attackbots | Sep 21 17:35:19 vps647732 sshd[5644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.183 Sep 21 17:35:21 vps647732 sshd[5644]: Failed password for invalid user admin from 80.211.245.183 port 55040 ssh2 ... |
2019-09-22 01:27:46 |
| 114.67.68.30 | attack | $f2bV_matches |
2019-09-22 00:59:06 |
| 207.180.226.111 | attackspam | (from hilda6699@rambler.ru) This is my first time go to see at here and i am genuinely happy to read everthing at single place. recommend news voleyball |
2019-09-22 01:11:30 |
| 179.180.200.255 | attackspam | Sep 21 15:32:19 eventyay sshd[22866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.180.200.255 Sep 21 15:32:21 eventyay sshd[22866]: Failed password for invalid user agus from 179.180.200.255 port 56844 ssh2 Sep 21 15:38:42 eventyay sshd[23011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.180.200.255 ... |
2019-09-22 01:38:17 |
| 132.232.4.33 | attackspambots | Sep 21 17:50:42 eventyay sshd[25697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 Sep 21 17:50:45 eventyay sshd[25697]: Failed password for invalid user snadendla from 132.232.4.33 port 47660 ssh2 Sep 21 17:57:58 eventyay sshd[25849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 ... |
2019-09-22 01:48:56 |
| 189.203.233.206 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 12:41:28,832 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.203.233.206) |
2019-09-22 01:49:18 |
| 45.141.84.10 | attack | 2019-09-21T12:54:00Z - RDP login failed multiple times. (45.141.84.10) |
2019-09-22 01:47:06 |
| 52.50.232.130 | attackbots | Sep 21 20:33:16 www sshd\[30168\]: Invalid user pink from 52.50.232.130 Sep 21 20:33:16 www sshd\[30168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.50.232.130 Sep 21 20:33:18 www sshd\[30168\]: Failed password for invalid user pink from 52.50.232.130 port 55710 ssh2 ... |
2019-09-22 01:42:42 |
| 77.79.190.82 | attackbotsspam | DATE:2019-09-21 14:54:21, IP:77.79.190.82, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-09-22 01:31:58 |