Whois information
NetRange: 74.118.192.0 - 74.118.195.255
CIDR: 74.118.192.0/22
NetName: FL-527
NetHandle: NET-74-118-192-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS25820
Organization: Fiber Logic Inc. (FL-527)
RegDate: 2018-09-19
Updated: 2024-10-15
Comment: Geofeed https://deploy.sioru.net/geofeed/feed.csv
Comment: Abuse desk: abuse@sioru.com or https://www.it7.net/contact/
Ref: https://rdap.arin.net/registry/ip/74.118.192.0
OrgName: Fiber Logic Inc.
OrgId: FL-527
Address: 4974 Kingsway Ave
Address: Suite 668
City: Burnaby
StateProv: BC
PostalCode: V5H 4M9
Country: CA
RegDate: 2018-08-03
Updated: 2024-11-25
Comment: Abuse desk: abuse@sioru.com
Ref: https://rdap.arin.net/registry/entity/FL-527
OrgNOCHandle: NOC12969-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-260-5757
OrgNOCEmail: arin-noc@sioru.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12969-ARIN
OrgTechHandle: TECHN1201-ARIN
OrgTechName: Technical Contact
OrgTechPhone: +1-408-260-5757
OrgTechEmail: arin-tech@sioru.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN1201-ARIN
OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-260-5757
OrgAbuseEmail: abuse@sioru.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3623-ARIN
NetRange: 74.118.192.0 - 74.118.195.255
CIDR: 74.118.192.0/22
NetName: FL-74-118-192-0-22
NetHandle: NET-74-118-192-0-2
Parent: FL-527 (NET-74-118-192-0-1)
NetType: Reassigned
OriginAS:
Customer: Fiber Logic Inc (C07565943)
RegDate: 2020-06-15
Updated: 2020-06-15
Comment: Abuse incidents please send to abuse@sioru.com
Ref: https://rdap.arin.net/registry/ip/74.118.192.0
CustName: Fiber Logic Inc
Address: 2-1-7, Higashi-shinagawa Shinagawa-ku
City: Tokyo
StateProv:
PostalCode:
Country: JP
RegDate: 2020-06-15
Updated: 2020-06-15
Ref: https://rdap.arin.net/registry/entity/C07565943
OrgNOCHandle: NOC12969-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-260-5757
OrgNOCEmail: arin-noc@sioru.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12969-ARIN
OrgTechHandle: TECHN1201-ARIN
OrgTechName: Technical Contact
OrgTechPhone: +1-408-260-5757
OrgTechEmail: arin-tech@sioru.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN1201-ARIN
OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-260-5757
OrgAbuseEmail: abuse@sioru.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3623-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 74.118.194.152 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by doug :
Just spotted a cascade of weird POST requests in the logs tonite. They tried loggin into our admin endpoint over 40 times in less then 3 mins. I dunno if its an automated script or some newbie hackin around but cant let this slide. gonna tighten the firewall rules and maybe block known bad ranges first. funny how they forget change the user agent string or varry the request headers. Lets see if they pivot to TOR or give up before i brew another pot of coffee.