City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 127.0.0.0 - 127.255.255.255
CIDR: 127.0.0.0/8
NetName: SPECIAL-IPV4-LOOPBACK-IANA-RESERVED
NetHandle: NET-127-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2024-05-24
Comment: Addresses starting with "127." are used when one program needs to talk to another program running on the same machine using the Internet
Comment: Protocol. 127.0.0.1 is the most commonly used address and is called the "loopback" address.
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Standard document, RFC 1122, which can
Comment: be found here:
Comment: http://datatracker.ietf.org/doc/rfc1122
Ref: https://rdap.arin.net/registry/ip/127.0.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.142.205.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;127.142.205.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042702 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 12:47:30 CST 2026
;; MSG SIZE rcvd: 108
Host 212.205.142.127.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 212.205.142.127.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 79.166.243.62 | attackspam | Unauthorized connection attempt detected from IP address 79.166.243.62 to port 23 |
2020-04-13 02:41:27 |
| 95.170.152.247 | attackspam | Unauthorized connection attempt detected from IP address 95.170.152.247 to port 445 |
2020-04-13 02:34:47 |
| 197.200.160.76 | attackspam | Unauthorized connection attempt detected from IP address 197.200.160.76 to port 23 |
2020-04-13 02:16:03 |
| 41.230.61.3 | attackbotsspam | Unauthorized connection attempt detected from IP address 41.230.61.3 to port 88 |
2020-04-13 02:08:37 |
| 187.107.17.107 | attack | Unauthorized connection attempt detected from IP address 187.107.17.107 to port 5358 |
2020-04-13 02:22:14 |
| 194.1.193.217 | attack | 0,39-02/33 [bc04/m110] PostRequest-Spammer scoring: Lusaka01 |
2020-04-13 02:17:31 |
| 78.87.200.221 | attack | Unauthorized connection attempt detected from IP address 78.87.200.221 to port 23 |
2020-04-13 02:43:12 |
| 190.37.87.106 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.37.87.106 to port 23 |
2020-04-13 02:18:19 |
| 52.174.50.120 | attack | Apr 12 17:15:54 work-partkepr sshd\[13418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.174.50.120 user=root Apr 12 17:15:57 work-partkepr sshd\[13418\]: Failed password for root from 52.174.50.120 port 1537 ssh2 ... |
2020-04-13 02:07:01 |
| 90.63.50.70 | attack | Unauthorized connection attempt detected from IP address 90.63.50.70 to port 23 |
2020-04-13 02:37:25 |
| 187.147.180.42 | attack | Unauthorized connection attempt detected from IP address 187.147.180.42 to port 5555 |
2020-04-13 02:21:50 |
| 24.119.52.56 | attackbotsspam | Unauthorized connection attempt detected from IP address 24.119.52.56 to port 23 |
2020-04-13 02:09:54 |
| 78.165.78.210 | attackbots | Unauthorized connection attempt detected from IP address 78.165.78.210 to port 23 |
2020-04-13 02:04:33 |
| 189.187.121.38 | attack | Unauthorized connection attempt detected from IP address 189.187.121.38 to port 8000 |
2020-04-13 02:18:45 |
| 189.159.155.216 | attackspambots | Unauthorized connection attempt detected from IP address 189.159.155.216 to port 23 |
2020-04-13 02:19:45 |