City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 128.216.0.0 - 128.216.255.255
CIDR: 128.216.0.0/16
NetName: CC-PRNET
NetHandle: NET-128-216-0-0-1
Parent: NET128 (NET-128-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: United States Department of Defense (DoD) (USDDD)
RegDate: 1987-03-23
Updated: 2025-08-18
Ref: https://rdap.arin.net/registry/ip/128.216.0.0
OrgName: United States Department of Defense (DoD)
OrgId: USDDD
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate: 2007-01-12
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/USDDD
OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName: Network DoD
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName: Network DoD
OrgNOCPhone: +1-844-347-2457
OrgNOCEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
# end
# start
NetRange: 128.216.0.0 - 128.216.255.255
CIDR: 128.216.0.0/16
NetName: CC-PRNET
NetHandle: NET-128-216-0-0-2
Parent: CC-PRNET (NET-128-216-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Air Force Systems Networking (7ESG)
RegDate: 2025-08-18
Updated: 2025-08-18
Ref: https://rdap.arin.net/registry/ip/128.216.0.0
OrgName: Air Force Systems Networking
OrgId: 7ESG
Address: 501 EAST MOORE DR. BLDG 884 RM 1100 GUNTHER ANNEX
City: MAXWELL AFB
StateProv: AL
PostalCode: 36114
Country: US
RegDate: 2008-06-05
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/7ESG
OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.216.180.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;128.216.180.23. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 19:43:14 CST 2026
;; MSG SIZE rcvd: 107
Host 23.180.216.128.in-addr.arpa not found: 2(SERVFAIL)
server can't find 128.216.180.23.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 170.244.225.59 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-02 15:37:03 |
| 157.245.184.68 | attackbots | Jun 2 05:48:22 nas sshd[27853]: Failed password for root from 157.245.184.68 port 56680 ssh2 Jun 2 05:50:03 nas sshd[27898]: Failed password for root from 157.245.184.68 port 53288 ssh2 ... |
2020-06-02 15:24:31 |
| 107.189.10.235 | attackbots | /posting.php?mode=post&f=4 |
2020-06-02 15:46:47 |
| 149.202.164.82 | attackbots | <6 unauthorized SSH connections |
2020-06-02 15:51:33 |
| 106.13.175.9 | attack | 2020-06-02T05:43:52.112887struts4.enskede.local sshd\[661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.175.9 user=root 2020-06-02T05:43:54.935378struts4.enskede.local sshd\[661\]: Failed password for root from 106.13.175.9 port 36174 ssh2 2020-06-02T05:47:44.428673struts4.enskede.local sshd\[679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.175.9 user=root 2020-06-02T05:47:47.025450struts4.enskede.local sshd\[679\]: Failed password for root from 106.13.175.9 port 54832 ssh2 2020-06-02T05:51:04.013971struts4.enskede.local sshd\[689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.175.9 user=root ... |
2020-06-02 15:36:06 |
| 46.105.149.168 | attack | Jun 2 06:19:05 piServer sshd[22228]: Failed password for root from 46.105.149.168 port 40454 ssh2 Jun 2 06:22:33 piServer sshd[22561]: Failed password for root from 46.105.149.168 port 45348 ssh2 ... |
2020-06-02 15:25:00 |
| 124.160.96.249 | attackbots | Jun 2 05:36:33 Ubuntu-1404-trusty-64-minimal sshd\[26695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 user=root Jun 2 05:36:35 Ubuntu-1404-trusty-64-minimal sshd\[26695\]: Failed password for root from 124.160.96.249 port 59051 ssh2 Jun 2 05:48:01 Ubuntu-1404-trusty-64-minimal sshd\[32315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 user=root Jun 2 05:48:04 Ubuntu-1404-trusty-64-minimal sshd\[32315\]: Failed password for root from 124.160.96.249 port 53316 ssh2 Jun 2 05:50:57 Ubuntu-1404-trusty-64-minimal sshd\[1632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 user=root |
2020-06-02 15:38:47 |
| 166.170.220.240 | attackbotsspam | Brute forcing email accounts |
2020-06-02 15:52:29 |
| 77.239.148.134 | attackbots | spam |
2020-06-02 15:42:09 |
| 106.13.232.67 | attackspambots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-06-02 15:15:08 |
| 200.109.216.159 | attackspam | Brute forcing RDP port 3389 |
2020-06-02 15:48:38 |
| 220.246.32.14 | attackbotsspam | 220.246.32.14 - - \[02/Jun/2020:05:51:29 +0200\] "POST /wp-login.php HTTP/1.0" 200 5508 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 220.246.32.14 - - \[02/Jun/2020:05:51:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 5345 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 220.246.32.14 - - \[02/Jun/2020:05:51:37 +0200\] "POST /wp-login.php HTTP/1.0" 200 5344 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-06-02 15:14:54 |
| 120.29.108.204 | attackspambots | Jun 2 06:35:05 andromeda sshd\[46251\]: Invalid user admin from 120.29.108.204 port 56420 Jun 2 06:35:05 andromeda sshd\[46251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.108.204 Jun 2 06:35:07 andromeda sshd\[46251\]: Failed password for invalid user admin from 120.29.108.204 port 56420 ssh2 |
2020-06-02 15:50:26 |
| 41.40.13.204 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-02 15:29:43 |
| 118.126.88.254 | attackbots | Jun 2 05:51:08 |
2020-06-02 15:32:54 |