City: Monticello
Region: Arkansas
Country: United States
Internet Service Provider: Evolve Broadband
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 104.222.48.0 - 104.222.63.255
CIDR: 104.222.48.0/20
NetName: VYVE-BROADBAND
NetHandle: NET-104-222-48-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Vyve Broadband (VBL-52)
RegDate: 2014-10-20
Updated: 2019-09-27
Ref: https://rdap.arin.net/registry/ip/104.222.48.0
OrgName: Vyve Broadband
OrgId: VBL-52
Address: Four International Drive
Address: Suite 330
City: Rye Brook
StateProv: NY
PostalCode: 10573
Country: US
RegDate: 2019-02-07
Updated: 2025-12-29
Comment: https://geofile.vyvebb.com/geofile
Ref: https://rdap.arin.net/registry/entity/VBL-52
OrgTechHandle: NETWO1827-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-855-367-8983
OrgTechEmail: networkengineering@vyvebb.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO1827-ARIN
OrgAbuseHandle: VYVEA1-ARIN
OrgAbuseName: Vyve-Abuse
OrgAbusePhone: +1-855-367-8983
OrgAbuseEmail: abuse@vyvebb.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/VYVEA1-ARIN
# end
# start
NetRange: 104.222.48.0 - 104.222.63.255
CIDR: 104.222.48.0/20
NetName: MONAR
NetHandle: NET-104-222-48-0-2
Parent: VYVE-BROADBAND (NET-104-222-48-0-1)
NetType: Reassigned
OriginAS:
Customer: Vyve Broadband (C07432715)
RegDate: 2019-09-30
Updated: 2019-09-30
Ref: https://rdap.arin.net/registry/ip/104.222.48.0
CustName: Vyve Broadband
Address: 1920 US-425
City: Monticello
StateProv: AR
PostalCode: 71655
Country: US
RegDate: 2019-09-30
Updated: 2019-09-30
Ref: https://rdap.arin.net/registry/entity/C07432715
OrgTechHandle: NETWO1827-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-855-367-8983
OrgTechEmail: networkengineering@vyvebb.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO1827-ARIN
OrgAbuseHandle: VYVEA1-ARIN
OrgAbuseName: Vyve-Abuse
OrgAbusePhone: +1-855-367-8983
OrgAbuseEmail: abuse@vyvebb.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/VYVEA1-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.222.48.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.222.48.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 19:13:42 CST 2026
;; MSG SIZE rcvd: 106
50.48.222.104.in-addr.arpa domain name pointer host-104-222-48-50.vyvebroadband.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.48.222.104.in-addr.arpa name = host-104-222-48-50.vyvebroadband.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.43.127.236 | attack | port 23 |
2020-03-22 20:12:40 |
| 74.115.176.1 | attackbots | Unauthorised access (Mar 22) SRC=74.115.176.1 LEN=52 TTL=110 ID=8221 DF TCP DPT=445 WINDOW=8192 SYN |
2020-03-22 20:45:45 |
| 104.196.127.133 | attack | Wordpress attack |
2020-03-22 20:31:57 |
| 92.118.37.55 | attackbotsspam | Mar 22 13:18:59 debian-2gb-nbg1-2 kernel: \[7138633.133864\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.55 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19983 PROTO=TCP SPT=52438 DPT=16610 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-22 20:21:51 |
| 83.239.186.54 | attackbots | Automatic report - Port Scan Attack |
2020-03-22 20:29:11 |
| 24.30.91.171 | attackspambots | port 23 |
2020-03-22 20:25:24 |
| 51.38.71.191 | attack | 2020-03-22T10:52:59.497127abusebot-7.cloudsearch.cf sshd[15425]: Invalid user news from 51.38.71.191 port 59084 2020-03-22T10:52:59.501618abusebot-7.cloudsearch.cf sshd[15425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-51-38-71.eu 2020-03-22T10:52:59.497127abusebot-7.cloudsearch.cf sshd[15425]: Invalid user news from 51.38.71.191 port 59084 2020-03-22T10:53:02.008520abusebot-7.cloudsearch.cf sshd[15425]: Failed password for invalid user news from 51.38.71.191 port 59084 ssh2 2020-03-22T10:58:23.849930abusebot-7.cloudsearch.cf sshd[15794]: Invalid user d from 51.38.71.191 port 49960 2020-03-22T10:58:23.855644abusebot-7.cloudsearch.cf sshd[15794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-51-38-71.eu 2020-03-22T10:58:23.849930abusebot-7.cloudsearch.cf sshd[15794]: Invalid user d from 51.38.71.191 port 49960 2020-03-22T10:58:26.169114abusebot-7.cloudsearch.cf sshd[15794]: Failed passw ... |
2020-03-22 20:46:45 |
| 185.245.41.25 | attackspam | B: ssh repeated attack for invalid user |
2020-03-22 20:10:34 |
| 61.95.233.61 | attack | IP blocked |
2020-03-22 20:09:55 |
| 134.209.194.217 | attackbots | Mar 22 12:23:06 * sshd[21620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.194.217 Mar 22 12:23:08 * sshd[21620]: Failed password for invalid user distribution from 134.209.194.217 port 59814 ssh2 |
2020-03-22 20:22:48 |
| 133.130.123.76 | attackspam | Mar 22 02:48:38 ws19vmsma01 sshd[186574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.123.76 Mar 22 02:48:40 ws19vmsma01 sshd[186574]: Failed password for invalid user uploader from 133.130.123.76 port 60430 ssh2 ... |
2020-03-22 20:45:19 |
| 222.186.173.215 | attackbots | Mar 22 09:28:11 firewall sshd[27868]: Failed password for root from 222.186.173.215 port 39772 ssh2 Mar 22 09:28:21 firewall sshd[27868]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 39772 ssh2 [preauth] Mar 22 09:28:21 firewall sshd[27868]: Disconnecting: Too many authentication failures [preauth] ... |
2020-03-22 20:38:56 |
| 45.238.122.160 | attackspambots | 2020-03-2204:47:211jFra4-00043d-Gx\<=info@whatsup2013.chH=\(localhost\)[14.186.182.29]:34632P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3647id=9E9B2D7E75A18F3CE0E5AC14D03BB09C@whatsup2013.chT="iamChristina"forynflyg@gmail.comjonathan_stevenson1@hotmail.com2020-03-2204:45:001jFrXn-0003sR-Do\<=info@whatsup2013.chH=045-238-122-160.provecom.com.br\(localhost\)[45.238.122.160]:38099P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=313482D1DA0E20934F4A03BB7FA3DD33@whatsup2013.chT="iamChristina"forzzrxt420@gmail.comdemcatz@yahoo.com2020-03-2204:47:261jFra9-000442-Gu\<=info@whatsup2013.chH=fixed-187-190-45-120.totalplay.net\(localhost\)[187.190.45.120]:57389P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=7277C192994D63D00C0940F83CF509FE@whatsup2013.chT="iamChristina"forjvcan@aol.comtjgj84@gmail.com2020-03-2204:45:101jFrXx-0003tS-BI\<=info@whatsup2013.chH=\(localhost\)[ |
2020-03-22 20:41:46 |
| 179.222.96.70 | attack | Mar 22 06:54:11 plusreed sshd[3658]: Invalid user nagios from 179.222.96.70 ... |
2020-03-22 20:46:06 |
| 51.38.71.174 | attackspambots | Mar 22 11:48:37 XXX sshd[54188]: Invalid user jm from 51.38.71.174 port 57354 |
2020-03-22 20:28:02 |