City: West Lafayette
Region: Indiana
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 128.210.0.0 - 128.210.255.255
CIDR: 128.210.0.0/16
NetName: PURDUE-CCNET
NetHandle: NET-128-210-0-0-1
Parent: NET128 (NET-128-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Purdue University (PURDUE-Z)
RegDate: 1987-03-12
Updated: 2022-10-20
Ref: https://rdap.arin.net/registry/ip/128.210.0.0
OrgName: Purdue University
OrgId: PURDUE-Z
Address: Information Technology
Address: 155 S. Grant Street
City: West Lafayette
StateProv: IN
PostalCode: 47907-2114
Country: US
RegDate: 2022-10-09
Updated: 2026-03-18
Ref: https://rdap.arin.net/registry/entity/PURDUE-Z
OrgDNSHandle: PURDU-ARIN
OrgDNSName: Purdue Hostmaster
OrgDNSPhone: +1-765-496-7272
OrgDNSEmail: hostmaster@purdue.edu
OrgDNSRef: https://rdap.arin.net/registry/entity/PURDU-ARIN
OrgNOCHandle: PNOC-ARIN
OrgNOCName: Purdue Network Operations Center
OrgNOCPhone: +1-765-494-4000
OrgNOCEmail: noc@purdue.edu
OrgNOCRef: https://rdap.arin.net/registry/entity/PNOC-ARIN
OrgTechHandle: CASEB10-ARIN
OrgTechName: Case, Brandon
OrgTechPhone: +1-765-496-7096
OrgTechEmail: caseb@purdue.edu
OrgTechRef: https://rdap.arin.net/registry/entity/CASEB10-ARIN
OrgRoutingHandle: PNOC-ARIN
OrgRoutingName: Purdue Network Operations Center
OrgRoutingPhone: +1-765-494-4000
OrgRoutingEmail: noc@purdue.edu
OrgRoutingRef: https://rdap.arin.net/registry/entity/PNOC-ARIN
OrgTechHandle: BAC22-ARIN
OrgTechName: Clayton, Bradley Al
OrgTechPhone: +1-765-494-5937
OrgTechEmail: bac@purdue.edu
OrgTechRef: https://rdap.arin.net/registry/entity/BAC22-ARIN
OrgTechHandle: JUSTI129-ARIN
OrgTechName: McIntyre, Justin A
OrgTechPhone: +1-765-496-7272
OrgTechEmail: mcintyrj@purdue.edu
OrgTechRef: https://rdap.arin.net/registry/entity/JUSTI129-ARIN
OrgTechHandle: PURDU-ARIN
OrgTechName: Purdue Hostmaster
OrgTechPhone: +1-765-496-7272
OrgTechEmail: hostmaster@purdue.edu
OrgTechRef: https://rdap.arin.net/registry/entity/PURDU-ARIN
OrgAbuseHandle: PUISP-ARIN
OrgAbuseName: Purdue University STEAM-CIRT
OrgAbusePhone: +1-765-496-1666
OrgAbuseEmail: abuse@purdue.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/PUISP-ARIN
OrgTechHandle: SCHNE483-ARIN
OrgTechName: Schneider, Mark
OrgTechPhone: +1-765-496-6981
OrgTechEmail: xanawatt@kitauji.net
OrgTechRef: https://rdap.arin.net/registry/entity/SCHNE483-ARIN
RAbuseHandle: PUISP-ARIN
RAbuseName: Purdue University STEAM-CIRT
RAbusePhone: +1-765-496-1666
RAbuseEmail: abuse@purdue.edu
RAbuseRef: https://rdap.arin.net/registry/entity/PUISP-ARIN
RTechHandle: PURDU-ARIN
RTechName: Purdue Hostmaster
RTechPhone: +1-765-496-7272
RTechEmail: hostmaster@purdue.edu
RTechRef: https://rdap.arin.net/registry/entity/PURDU-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.210.47.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;128.210.47.106. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040303 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 11:32:23 CST 2026
;; MSG SIZE rcvd: 107
Host 106.47.210.128.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 106.47.210.128.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.85.42.176 | attackspam | Feb 13 11:41:32 nextcloud sshd\[4579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Feb 13 11:41:34 nextcloud sshd\[4579\]: Failed password for root from 112.85.42.176 port 43518 ssh2 Feb 13 11:41:55 nextcloud sshd\[4992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root |
2020-02-13 18:43:14 |
| 98.209.188.19 | attack | Feb 13 08:43:32 server sshd\[32293\]: Invalid user ts from 98.209.188.19 Feb 13 08:43:32 server sshd\[32293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-209-188-19.hsd1.mi.comcast.net Feb 13 08:43:33 server sshd\[32293\]: Failed password for invalid user ts from 98.209.188.19 port 56980 ssh2 Feb 13 08:55:20 server sshd\[1904\]: Invalid user hadoop from 98.209.188.19 Feb 13 08:55:20 server sshd\[1904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-209-188-19.hsd1.mi.comcast.net ... |
2020-02-13 19:10:31 |
| 37.49.231.163 | attack | Feb 13 11:11:56 h2177944 kernel: \[4786688.365003\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12600 PROTO=TCP SPT=41597 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 13 11:11:56 h2177944 kernel: \[4786688.365018\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12600 PROTO=TCP SPT=41597 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 13 11:39:14 h2177944 kernel: \[4788326.674143\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24463 PROTO=TCP SPT=49395 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 13 11:39:14 h2177944 kernel: \[4788326.674159\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24463 PROTO=TCP SPT=49395 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 13 11:47:04 h2177944 kernel: \[4788796.741228\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117 |
2020-02-13 18:52:34 |
| 77.232.117.129 | attack | 20/2/13@00:40:30: FAIL: Alarm-Network address from=77.232.117.129 ... |
2020-02-13 19:06:22 |
| 128.199.95.163 | attackspambots | Feb 12 21:38:09 home sshd[20743]: Invalid user dennisent from 128.199.95.163 port 35612 Feb 12 21:38:09 home sshd[20743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.163 Feb 12 21:38:09 home sshd[20743]: Invalid user dennisent from 128.199.95.163 port 35612 Feb 12 21:38:12 home sshd[20743]: Failed password for invalid user dennisent from 128.199.95.163 port 35612 ssh2 Feb 12 21:42:18 home sshd[20762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.163 user=root Feb 12 21:42:19 home sshd[20762]: Failed password for root from 128.199.95.163 port 53176 ssh2 Feb 12 21:43:34 home sshd[20772]: Invalid user ritt from 128.199.95.163 port 36336 Feb 12 21:43:34 home sshd[20772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.163 Feb 12 21:43:34 home sshd[20772]: Invalid user ritt from 128.199.95.163 port 36336 Feb 12 21:43:36 home sshd[20772]: Failed password fo |
2020-02-13 19:04:46 |
| 60.174.92.50 | attackbots | IMAP brute force ... |
2020-02-13 19:05:27 |
| 191.34.96.49 | attack | Automatic report - Port Scan Attack |
2020-02-13 19:27:33 |
| 61.177.172.158 | attack | 2020-02-13T10:53:12.260098shield sshd\[26496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158 user=root 2020-02-13T10:53:14.534321shield sshd\[26496\]: Failed password for root from 61.177.172.158 port 35268 ssh2 2020-02-13T10:53:16.995408shield sshd\[26496\]: Failed password for root from 61.177.172.158 port 35268 ssh2 2020-02-13T10:53:19.203223shield sshd\[26496\]: Failed password for root from 61.177.172.158 port 35268 ssh2 2020-02-13T10:58:54.426899shield sshd\[26992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158 user=root |
2020-02-13 19:17:39 |
| 194.166.255.53 | attack | Feb 13 12:58:15 www sshd\[55840\]: Invalid user denis from 194.166.255.53Feb 13 12:58:17 www sshd\[55840\]: Failed password for invalid user denis from 194.166.255.53 port 45276 ssh2Feb 13 13:08:06 www sshd\[55874\]: Failed password for root from 194.166.255.53 port 55630 ssh2 ... |
2020-02-13 19:22:46 |
| 203.147.66.254 | attack | Attempts against Email Servers |
2020-02-13 19:08:37 |
| 101.205.152.175 | attackspambots | unauthorized connection attempt |
2020-02-13 19:20:29 |
| 37.17.251.246 | attackbotsspam | Feb 13 05:48:01 vps647732 sshd[21668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.17.251.246 Feb 13 05:48:02 vps647732 sshd[21668]: Failed password for invalid user farrell from 37.17.251.246 port 40275 ssh2 ... |
2020-02-13 18:50:58 |
| 99.153.45.121 | attackspambots | Feb 13 11:44:07 localhost sshd\[23387\]: Invalid user homerj from 99.153.45.121 port 44990 Feb 13 11:44:07 localhost sshd\[23387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.153.45.121 Feb 13 11:44:09 localhost sshd\[23387\]: Failed password for invalid user homerj from 99.153.45.121 port 44990 ssh2 |
2020-02-13 19:05:11 |
| 202.175.46.170 | attackspam | <6 unauthorized SSH connections |
2020-02-13 19:01:03 |
| 106.54.164.208 | attackbots | Invalid user recruit from 106.54.164.208 port 49702 |
2020-02-13 19:25:27 |