Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '60.96.0.0 - 60.127.255.255'

% Abuse contact for '60.96.0.0 - 60.127.255.255' is 'abuse@e.softbank.co.jp'

inetnum:        60.96.0.0 - 60.127.255.255
netname:        BBTEC
descr:          Japan Nation-wide Network of Softbank Corp.
country:        JP
org:            ORG-SC4-AP
admin-c:        SA421-AP
tech-c:         SA421-AP
abuse-c:        AS2391-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-JP-BBTECH
mnt-routes:     MAINT-JP-BBTECH
mnt-irt:        IRT-SOFTBANK-JP
last-modified:  2024-09-20T04:27:31Z
source:         APNIC

irt:            IRT-SOFTBANK-JP
address:        Tokyo Portcity Takeshiba Office Tower 21F
address:        1-7-1, Kaigan
address:        Minatoku,Tokyo, Japan
e-mail:         abuse@e.softbank.co.jp
abuse-mailbox:  abuse@e.softbank.co.jp
admin-c:        KF291-AP
tech-c:         KF291-AP
auth:           # Filtered
remarks:        abuse@e.softbank.co.jp was validated on 2025-11-05
mnt-by:         MAINT-JP-BBTECH
last-modified:  2026-01-06T10:49:11Z
source:         APNIC

organisation:   ORG-SC4-AP
org-name:       SOFTBANK Corp.
org-type:       LIR
country:        JP
address:        Tokyo Portcity Takeshiba Office Tower 22F
address:        1-7-1, Kaigan
phone:          +81-3-6889-6365
e-mail:         GRP-nic-admin@g.softbank.co.jp
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:51Z
source:         APNIC

role:           ABUSE SOFTBANKJP
country:        ZZ
address:        Tokyo Portcity Takeshiba Office Tower 21F
address:        1-7-1, Kaigan
address:        Minatoku,Tokyo, Japan
phone:          +000000000
e-mail:         abuse@e.softbank.co.jp
admin-c:        KF291-AP
tech-c:         KF291-AP
nic-hdl:        AS2391-AP
remarks:        Generated from irt object IRT-SOFTBANK-JP
remarks:        abuse@e.softbank.co.jp was validated on 2025-11-05
abuse-mailbox:  abuse@e.softbank.co.jp
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-05T01:56:02Z
source:         APNIC

role:           SoftbankBB ABUSE
address:        Tokyo Portcity Takeshiba Office Tower 22F,  1-7-1, Kaigan, Minatoku,Tokyo
country:        JP
phone:          +81-3-6688-5120
e-mail:         abuse@e.softbank.co.jp
remarks:        Please send spam report,virus alart
remarks:        or any other abuse report
remarks:        to  abuse@e.softbank.co.jp
remarks:        Any other Information, Notice,
remarks:        Please send to hostmaster@bbtec.net
admin-c:        KF291-AP
tech-c:         KF291-AP
nic-hdl:        SA421-AP
mnt-by:         MAINT-JP-BBTECH
last-modified:  2024-03-26T02:44:48Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 60.104.99.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;60.104.99.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050502 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 10:30:31 CST 2026
;; MSG SIZE  rcvd: 105
Host info
20.99.104.60.in-addr.arpa domain name pointer softbank060104099020.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.99.104.60.in-addr.arpa	name = softbank060104099020.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.238.113.126 attackspam
srv02 Mass scanning activity detected Target: 25723  ..
2020-07-01 01:02:11
185.170.114.25 attackspambots
Jun 30 17:51:47 odroid64 sshd\[4869\]: User sshd from 185.170.114.25 not allowed because not listed in AllowUsers
Jun 30 17:51:47 odroid64 sshd\[4869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.170.114.25  user=sshd
...
2020-07-01 00:54:14
46.38.150.153 attackspambots
2020-06-30 16:01:14 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=smtp15@mail.csmailer.org)
2020-06-30 16:01:41 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=b2btest@mail.csmailer.org)
2020-06-30 16:02:08 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=xsh@mail.csmailer.org)
2020-06-30 16:02:39 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=anes@mail.csmailer.org)
2020-06-30 16:03:02 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=mpr@mail.csmailer.org)
...
2020-07-01 00:28:28
223.205.246.89 attackbots
Lines containing failures of 223.205.246.89
Jun 30 14:10:55 shared03 sshd[6818]: Did not receive identification string from 223.205.246.89 port 49274
Jun 30 14:10:59 shared03 sshd[6906]: Invalid user system from 223.205.246.89 port 14474
Jun 30 14:10:59 shared03 sshd[6906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.205.246.89
Jun 30 14:11:01 shared03 sshd[6906]: Failed password for invalid user system from 223.205.246.89 port 14474 ssh2
Jun 30 14:11:02 shared03 sshd[6906]: Connection closed by invalid user system 223.205.246.89 port 14474 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.205.246.89
2020-07-01 00:28:44
103.76.83.81 attackspambots
20/6/30@08:21:21: FAIL: Alarm-Network address from=103.76.83.81
...
2020-07-01 00:40:10
103.205.5.157 attackbotsspam
 TCP (SYN) 103.205.5.157:55412 -> port 24720, len 44
2020-07-01 00:52:23
158.181.180.188 attackbots
Jun 30 05:09:29 spidey sshd[30014]: Invalid user system from 158.181.180.188 port 56213
Jun 30 05:09:29 spidey sshd[30016]: Invalid user system from 158.181.180.188 port 56221
Jun 30 05:09:29 spidey sshd[30018]: Invalid user system from 158.181.180.188 port 56244


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=158.181.180.188
2020-07-01 00:19:50
111.229.15.130 attackspam
Jun 30 13:46:28 rush sshd[19742]: Failed password for root from 111.229.15.130 port 50305 ssh2
Jun 30 13:49:20 rush sshd[19864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.15.130
Jun 30 13:49:22 rush sshd[19864]: Failed password for invalid user testftp from 111.229.15.130 port 39080 ssh2
...
2020-07-01 00:17:37
202.154.180.51 attack
 TCP (SYN) 202.154.180.51:44951 -> port 30497, len 44
2020-07-01 00:52:53
51.124.49.66 attackbotsspam
Jun 30 17:09:11 cdc sshd[20334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.124.49.66  user=root
Jun 30 17:09:13 cdc sshd[20334]: Failed password for invalid user root from 51.124.49.66 port 40359 ssh2
2020-07-01 00:45:40
123.28.153.19 attackspambots
Jun 30 06:21:38 Host-KLAX-C postfix/smtpd[10037]: lost connection after EHLO from unknown[123.28.153.19]
...
2020-07-01 00:41:56
104.248.144.208 attack
104.248.144.208 - - [30/Jun/2020:13:44:09 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [30/Jun/2020:13:44:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1924 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [30/Jun/2020:13:44:15 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-01 00:47:22
96.126.126.239 attack
Lines containing failures of 96.126.126.239
Jun 30 13:40:02 mc postfix/smtpd[14837]: connect from anzeige.phplist.com[96.126.126.239]
Jun 30 13:40:03 mc postfix/smtpd[14837]: Anonymous TLS connection established from anzeige.phplist.com[96.126.126.239]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames)
Jun 30 13:40:38 mc postgrey[16463]: action=greylist, reason=new, client_name=anzeige.phplist.com, client_address=96.126.126.239, sender=x@x recipient=x@x
Jun 30 13:40:39 mc postfix/smtpd[14837]: disconnect from anzeige.phplist.com[96.126.126.239] ehlo=2 starttls=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=6/8
Jun 30 13:40:44 mc postfix/smtpd[14837]: connect from anzeige.phplist.com[96.126.126.239]
Jun 30 13:40:45 mc postfix/smtpd[14837]: Anonymous TLS connection established from anzeige.phplist.com[96.126.126.239]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames)
Jun 30 13:40:45 mc postgrey[16463]: action=g........
------------------------------
2020-07-01 01:05:22
111.229.136.177 attackbots
Bruteforce detected by fail2ban
2020-07-01 00:44:18
129.226.53.203 attackbotsspam
Multiple SSH authentication failures from 129.226.53.203
2020-07-01 00:47:05

Recently Reported IPs

183.36.179.228 94.0.176.234 3.250.60.142 22.28.238.254
131.13.207.219 14.119.64.156 2606:4700:10::6816:2593 7.66.159.37
2606:4700:10::6814:5776 135.234.160.246 103.180.20.214 104.245.98.156
13.107.139.11 111.142.111.41 67.67.67.93 111.111.62.62
111.111.36.36 49.155.49.62 17.248.163.136 17.252.203.237