City: Tokyo
Region: Tokyo
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 48.192.0.0 - 48.221.255.255
CIDR: 48.192.0.0/12, 48.216.0.0/14, 48.208.0.0/13, 48.220.0.0/15
NetName: RIPE
NetHandle: NET-48-192-0-0-1
Parent: NET48 (NET-48-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2023-10-02
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/48.192.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.210.15.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.210.15.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110401 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 06:00:03 CST 2025
;; MSG SIZE rcvd: 105
Host 48.15.210.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.15.210.48.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.203.34.76 | attackspam | Jun 20 11:09:45 vmd26974 sshd[24502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.34.76 Jun 20 11:09:47 vmd26974 sshd[24502]: Failed password for invalid user scan from 159.203.34.76 port 49602 ssh2 ... |
2020-06-20 19:14:08 |
| 1.52.105.21 | attack | Unauthorized connection attempt from IP address 1.52.105.21 on Port 445(SMB) |
2020-06-20 19:16:59 |
| 59.125.248.139 | attack | (imapd) Failed IMAP login from 59.125.248.139 (TW/Taiwan/59-125-248-139.HINET-IP.hinet.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 20 12:37:38 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user= |
2020-06-20 19:31:33 |
| 120.92.35.5 | attack | Jun 19 23:46:31 propaganda sshd[46116]: Connection from 120.92.35.5 port 9414 on 10.0.0.160 port 22 rdomain "" Jun 19 23:46:32 propaganda sshd[46116]: Connection closed by 120.92.35.5 port 9414 [preauth] |
2020-06-20 19:18:48 |
| 14.170.108.218 | attackspambots | Unauthorized connection attempt from IP address 14.170.108.218 on Port 445(SMB) |
2020-06-20 19:37:34 |
| 103.207.98.108 | attack | Unauthorized connection attempt from IP address 103.207.98.108 on Port 445(SMB) |
2020-06-20 19:22:30 |
| 42.116.147.184 | attackspambots | Unauthorized connection attempt from IP address 42.116.147.184 on Port 445(SMB) |
2020-06-20 19:15:48 |
| 112.85.42.181 | attackspam | Jun 20 08:21:43 firewall sshd[16335]: Failed password for root from 112.85.42.181 port 56656 ssh2 Jun 20 08:21:46 firewall sshd[16335]: Failed password for root from 112.85.42.181 port 56656 ssh2 Jun 20 08:21:49 firewall sshd[16335]: Failed password for root from 112.85.42.181 port 56656 ssh2 ... |
2020-06-20 19:23:56 |
| 14.231.238.247 | attack | Unauthorized connection attempt from IP address 14.231.238.247 on Port 445(SMB) |
2020-06-20 19:19:06 |
| 216.126.59.61 | attack | Jun 20 09:54:58 vmd48417 sshd[3818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.59.61 |
2020-06-20 19:08:51 |
| 103.200.113.73 | attackbotsspam | Jun 18 18:15:15 zulu1842 sshd[20626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.200.113.73 user=r.r Jun 18 18:15:17 zulu1842 sshd[20626]: Failed password for r.r from 103.200.113.73 port 18416 ssh2 Jun 18 18:15:17 zulu1842 sshd[20626]: Received disconnect from 103.200.113.73: 11: Bye Bye [preauth] Jun 18 18:27:11 zulu1842 sshd[22042]: Invalid user zyb from 103.200.113.73 Jun 18 18:27:11 zulu1842 sshd[22042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.200.113.73 Jun 18 18:27:14 zulu1842 sshd[22042]: Failed password for invalid user zyb from 103.200.113.73 port 41624 ssh2 Jun 18 18:27:14 zulu1842 sshd[22042]: Received disconnect from 103.200.113.73: 11: Bye Bye [preauth] Jun 18 18:31:30 zulu1842 sshd[22518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.200.113.73 user=r.r Jun 18 18:31:32 zulu1842 sshd[22518]: Failed password ........ ------------------------------- |
2020-06-20 19:28:57 |
| 88.214.26.97 | attackbots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-20T10:11:17Z and 2020-06-20T11:12:23Z |
2020-06-20 19:12:48 |
| 58.87.77.174 | attackbotsspam | (sshd) Failed SSH login from 58.87.77.174 (CN/China/-): 5 in the last 3600 secs |
2020-06-20 19:15:31 |
| 221.122.119.50 | attackspambots | Invalid user matthew from 221.122.119.50 port 41649 |
2020-06-20 19:36:59 |
| 46.218.7.227 | attackbotsspam | Jun 20 07:22:22 vps10825 sshd[13088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227 Jun 20 07:22:24 vps10825 sshd[13088]: Failed password for invalid user wy from 46.218.7.227 port 39475 ssh2 ... |
2020-06-20 19:44:52 |