City: unknown
Region: Idaho
Country: United States
Internet Service Provider: Softcom Internet Communications, Inc
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 104.36.80.0 - 104.36.87.255
CIDR: 104.36.80.0/21
NetName: NET-104-36-80-0-1
NetHandle: NET-104-36-80-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: anyNode (CL-614)
RegDate: 2014-05-28
Updated: 2020-11-23
Comment: Also DBA Webhosting Holdings LLC.
Ref: https://rdap.arin.net/registry/ip/104.36.80.0
OrgName: anyNode
OrgId: CL-614
Address: 2001 6th Ave
City: Seattle
StateProv: WA
PostalCode: 98121
Country: US
RegDate: 2014-03-17
Updated: 2024-11-25
Comment: https://servercrate.com
Ref: https://rdap.arin.net/registry/entity/CL-614
OrgNOCHandle: NOC32640-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-844-334-3131
OrgNOCEmail: noc@webhostingholdings.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32640-ARIN
OrgTechHandle: NOC32640-ARIN
OrgTechName: NOC
OrgTechPhone: +1-844-334-3131
OrgTechEmail: noc@webhostingholdings.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32640-ARIN
OrgAbuseHandle: NOC32640-ARIN
OrgAbuseName: NOC
OrgAbusePhone: +1-844-334-3131
OrgAbuseEmail: noc@webhostingholdings.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NOC32640-ARIN
# end
# start
NetRange: 104.36.84.0 - 104.36.87.255
CIDR: 104.36.84.0/22
NetName: REDOUBT-ANY-01
NetHandle: NET-104-36-84-0-1
Parent: NET-104-36-80-0-1 (NET-104-36-80-0-1)
NetType: Reallocated
OriginAS:
Organization: Redoubt Networks (RNL-50)
RegDate: 2023-03-06
Updated: 2023-09-26
Comment: Geofeed https://geofeed.crunchbits.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/104.36.84.0
OrgName: Redoubt Networks
OrgId: RNL-50
Address: 23403 E Mission Ave
Address: Ste 119
City: Liberty Lake
StateProv: WA
PostalCode: 99019
Country: US
RegDate: 2021-12-08
Updated: 2025-10-12
Ref: https://rdap.arin.net/registry/entity/RNL-50
OrgTechHandle: CZUMB2-ARIN
OrgTechName: Czumbil, Romeo
OrgTechPhone: +1-610-994-3046
OrgTechEmail: romeo.czumbil@tierpoint.com
OrgTechRef: https://rdap.arin.net/registry/entity/CZUMB2-ARIN
OrgAbuseHandle: CBABU-ARIN
OrgAbuseName: CB ABUSE
OrgAbusePhone: +1-509-606-1337
OrgAbuseEmail: abuse@crunchbits.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CBABU-ARIN
OrgTechHandle: COONB3-ARIN
OrgTechName: Coon, Brendan
OrgTechPhone: +1-509-606-1337
OrgTechEmail: brendan@crunchbits.com
OrgTechRef: https://rdap.arin.net/registry/entity/COONB3-ARIN
OrgTechHandle: CBNOC2-ARIN
OrgTechName: CB NOC
OrgTechPhone: +1-509-606-1337
OrgTechEmail: noc@crunchbits.com
OrgTechRef: https://rdap.arin.net/registry/entity/CBNOC2-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.36.84.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.36.84.108. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041400 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 18:30:37 CST 2026
;; MSG SIZE rcvd: 106
108.84.36.104.in-addr.arpa domain name pointer 108.84.36.104.crunchbits.us.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
108.84.36.104.in-addr.arpa name = 108.84.36.104.crunchbits.us.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 223.17.59.41 | attackspambots | Honeypot attack, port: 5555, PTR: 41-59-17-223-on-nets.com. |
2020-02-08 14:26:26 |
| 80.66.81.143 | attackbots | $f2bV_matches |
2020-02-08 15:01:51 |
| 91.121.45.5 | attack | Feb 8 05:53:23 ns382633 sshd\[10546\]: Invalid user ues from 91.121.45.5 port 55229 Feb 8 05:53:23 ns382633 sshd\[10546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.45.5 Feb 8 05:53:25 ns382633 sshd\[10546\]: Failed password for invalid user ues from 91.121.45.5 port 55229 ssh2 Feb 8 05:58:06 ns382633 sshd\[11379\]: Invalid user ues from 91.121.45.5 port 11519 Feb 8 05:58:06 ns382633 sshd\[11379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.45.5 |
2020-02-08 14:19:43 |
| 213.184.249.95 | attackbots | Feb 8 06:04:29 web8 sshd\[3697\]: Invalid user dwi from 213.184.249.95 Feb 8 06:04:29 web8 sshd\[3697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95 Feb 8 06:04:32 web8 sshd\[3697\]: Failed password for invalid user dwi from 213.184.249.95 port 46572 ssh2 Feb 8 06:08:35 web8 sshd\[6056\]: Invalid user igu from 213.184.249.95 Feb 8 06:08:35 web8 sshd\[6056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95 |
2020-02-08 14:21:05 |
| 222.186.30.209 | attackspambots | Feb 8 07:21:35 163-172-32-151 sshd[7381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209 user=root Feb 8 07:21:37 163-172-32-151 sshd[7381]: Failed password for root from 222.186.30.209 port 12020 ssh2 ... |
2020-02-08 14:22:49 |
| 185.143.223.173 | attackspambots | Feb 8 07:19:00 grey postfix/smtpd\[12853\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.173\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.173\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.173\]\; from=\ |
2020-02-08 15:27:57 |
| 178.233.5.52 | attackbots | Feb 8 05:58:02 serwer sshd\[29571\]: Invalid user juo from 178.233.5.52 port 36906 Feb 8 05:58:02 serwer sshd\[29571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.233.5.52 Feb 8 05:58:04 serwer sshd\[29571\]: Failed password for invalid user juo from 178.233.5.52 port 36906 ssh2 ... |
2020-02-08 14:19:20 |
| 147.50.3.30 | attackbotsspam | Feb 4 11:52:09 itv-usvr-01 sshd[9628]: Invalid user info1 from 147.50.3.30 Feb 4 11:52:09 itv-usvr-01 sshd[9628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.3.30 Feb 4 11:52:09 itv-usvr-01 sshd[9628]: Invalid user info1 from 147.50.3.30 Feb 4 11:52:11 itv-usvr-01 sshd[9628]: Failed password for invalid user info1 from 147.50.3.30 port 33572 ssh2 Feb 4 11:55:59 itv-usvr-01 sshd[9742]: Invalid user zxc123 from 147.50.3.30 |
2020-02-08 14:28:13 |
| 66.191.91.115 | attackspambots | Automatic report - SSH Brute-Force Attack |
2020-02-08 15:13:07 |
| 212.118.253.115 | attackbotsspam | TCP Port Scanning |
2020-02-08 14:27:46 |
| 188.165.250.228 | attackspam | Feb 7 20:16:40 auw2 sshd\[3899\]: Invalid user epb from 188.165.250.228 Feb 7 20:16:40 auw2 sshd\[3899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns380620.ip-188-165-250.eu Feb 7 20:16:42 auw2 sshd\[3899\]: Failed password for invalid user epb from 188.165.250.228 port 57799 ssh2 Feb 7 20:19:26 auw2 sshd\[4158\]: Invalid user erf from 188.165.250.228 Feb 7 20:19:26 auw2 sshd\[4158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns380620.ip-188-165-250.eu |
2020-02-08 15:22:17 |
| 179.179.78.184 | attack | Automatic report - Port Scan Attack |
2020-02-08 15:14:51 |
| 83.66.75.132 | attackbots | Automatic report - Port Scan Attack |
2020-02-08 14:24:26 |
| 159.203.13.141 | attackbotsspam | Feb 8 07:24:03 legacy sshd[17313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.141 Feb 8 07:24:04 legacy sshd[17313]: Failed password for invalid user eqt from 159.203.13.141 port 48350 ssh2 Feb 8 07:27:11 legacy sshd[17500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.141 ... |
2020-02-08 15:28:30 |
| 123.18.15.123 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-08 15:26:57 |