City: Santa Clara
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 104.164.0.0 - 104.165.255.255
CIDR: 104.164.0.0/15
NetName: EGNL-1
NetHandle: NET-104-164-0-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: EGIHosting (EGNL-1)
RegDate: 2014-07-22
Updated: 2023-05-09
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/104.164.0.0
OrgName: EGIHosting
OrgId: EGNL-1
Address: 3223 Kenneth Street
City: Santa Clara
StateProv: CA
PostalCode: 95054
Country: US
RegDate: 2007-07-23
Updated: 2025-04-01
Comment: http://egihosting.com
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/EGNL-1
OrgTechHandle: CHENJ-ARIN
OrgTechName: Chen, James
OrgTechPhone: +1-408-228-4448
OrgTechEmail: james@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/CHENJ-ARIN
OrgTechHandle: HERNA1269-ARIN
OrgTechName: Hernandez, Aaron
OrgTechPhone: +1-408-228-4448
OrgTechEmail: aaron@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/HERNA1269-ARIN
OrgTechHandle: TRANH54-ARIN
OrgTechName: Tran, Hung
OrgTechPhone: +1-408-581-1984
OrgTechEmail: htran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANH54-ARIN
OrgNOCHandle: NOC2660-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-888-808-8806
OrgNOCEmail: noc@egihosting.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgRoutingHandle: NOC2660-ARIN
OrgRoutingName: Network Operations Center
OrgRoutingPhone: +1-888-808-8806
OrgRoutingEmail: noc@egihosting.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgAbuseHandle: ABUSE1715-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-888-808-8806
OrgAbuseEmail: abuse@egihosting.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1715-ARIN
OrgTechHandle: KUMAR396-ARIN
OrgTechName: kumar, Indhira
OrgTechPhone: +1-408-228-4448
OrgTechEmail: indra.kumar@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KUMAR396-ARIN
OrgTechHandle: TRANR22-ARIN
OrgTechName: Tran, Ryan
OrgTechPhone: +1-408-228-4448
OrgTechEmail: rtran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANR22-ARIN
OrgTechHandle: SIMKI10-ARIN
OrgTechName: Simkiss, John
OrgTechPhone: +1-408-228-4448
OrgTechEmail: jas3@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/SIMKI10-ARIN
OrgTechHandle: KTBIJ-ARIN
OrgTechName: KT, Bijoy
OrgTechPhone: +1-888-808-8806
OrgTechEmail: egni@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KTBIJ-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.173.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.164.173.83. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025112901 1800 900 604800 86400
;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 29 22:34:27 CST 2025
;; MSG SIZE rcvd: 107
Host 83.173.164.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 83.173.164.104.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.52.43.109 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-02-29 06:18:59 |
| 5.94.210.126 | attackbots | Automatic report - Port Scan Attack |
2020-02-29 06:01:41 |
| 141.98.10.137 | attackspam | Feb 28 22:58:04 karger postfix/smtpd[2460]: warning: unknown[141.98.10.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 28 23:13:13 karger postfix/smtpd[5696]: warning: unknown[141.98.10.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 28 23:14:48 karger postfix/smtpd[5696]: warning: unknown[141.98.10.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-02-29 06:16:30 |
| 178.128.121.180 | attackbots | Feb 28 22:50:15 silence02 sshd[4706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180 Feb 28 22:50:17 silence02 sshd[4706]: Failed password for invalid user john from 178.128.121.180 port 56158 ssh2 Feb 28 22:59:33 silence02 sshd[5225]: Failed password for mysql from 178.128.121.180 port 40108 ssh2 |
2020-02-29 06:18:12 |
| 125.212.233.50 | attackbotsspam | 2020-02-28T19:45:13.906503shield sshd\[2974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root 2020-02-28T19:45:15.939441shield sshd\[2974\]: Failed password for root from 125.212.233.50 port 59840 ssh2 2020-02-28T19:51:25.162371shield sshd\[4388\]: Invalid user chef from 125.212.233.50 port 40306 2020-02-28T19:51:25.166757shield sshd\[4388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 2020-02-28T19:51:27.270926shield sshd\[4388\]: Failed password for invalid user chef from 125.212.233.50 port 40306 ssh2 |
2020-02-29 06:01:11 |
| 2.35.124.159 | attack | Feb 28 14:20:36 master sshd[21370]: Failed password for invalid user qdxx from 2.35.124.159 port 57419 ssh2 |
2020-02-29 06:00:09 |
| 218.92.0.204 | attackbotsspam | 2020-02-28T16:57:57.034405xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:57:55.623043xentho-1 sshd[183478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root 2020-02-28T16:57:57.034405xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:57:59.807735xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:57:55.623043xentho-1 sshd[183478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root 2020-02-28T16:57:57.034405xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:57:59.807735xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:58:03.304068xentho-1 sshd[183478]: Failed password for root from 218.92.0.204 port 52879 ssh2 2020-02-28T16:59:38.753022xent ... |
2020-02-29 06:13:50 |
| 181.40.73.86 | attack | 2020-02-28T21:52:19.624330shield sshd\[770\]: Invalid user ovhuser from 181.40.73.86 port 33625 2020-02-28T21:52:19.633017shield sshd\[770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86 2020-02-28T21:52:21.584358shield sshd\[770\]: Failed password for invalid user ovhuser from 181.40.73.86 port 33625 ssh2 2020-02-28T21:59:36.399640shield sshd\[3072\]: Invalid user sql from 181.40.73.86 port 5350 2020-02-28T21:59:36.405615shield sshd\[3072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86 |
2020-02-29 06:16:06 |
| 94.102.53.10 | attackbots | 02/28/2020-17:29:30.222143 94.102.53.10 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-29 06:29:32 |
| 111.231.132.94 | attack | Feb 28 22:53:34 sd-53420 sshd\[14492\]: Invalid user mmr from 111.231.132.94 Feb 28 22:53:34 sd-53420 sshd\[14492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.132.94 Feb 28 22:53:36 sd-53420 sshd\[14492\]: Failed password for invalid user mmr from 111.231.132.94 port 44740 ssh2 Feb 28 22:59:29 sd-53420 sshd\[14940\]: User root from 111.231.132.94 not allowed because none of user's groups are listed in AllowGroups Feb 28 22:59:29 sd-53420 sshd\[14940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.132.94 user=root ... |
2020-02-29 06:21:20 |
| 92.118.38.58 | attack | Feb 28 23:30:02 v22019058497090703 postfix/smtpd[416]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 28 23:30:35 v22019058497090703 postfix/smtpd[416]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 28 23:31:05 v22019058497090703 postfix/smtpd[833]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-02-29 06:32:01 |
| 139.59.62.42 | attackspambots | Brute-force attempt banned |
2020-02-29 06:02:22 |
| 142.93.211.52 | attackbotsspam | Feb 28 11:51:56 web1 sshd\[14010\]: Invalid user newuser from 142.93.211.52 Feb 28 11:51:56 web1 sshd\[14010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52 Feb 28 11:51:58 web1 sshd\[14010\]: Failed password for invalid user newuser from 142.93.211.52 port 48318 ssh2 Feb 28 11:59:42 web1 sshd\[14743\]: Invalid user nagios from 142.93.211.52 Feb 28 11:59:42 web1 sshd\[14743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52 |
2020-02-29 06:12:42 |
| 115.73.16.235 | attackbots | " " |
2020-02-29 06:29:14 |
| 187.151.203.230 | attackspambots | Port probing on unauthorized port 23 |
2020-02-29 05:56:36 |