City: Guatemala City
Region: Guatemala
Country: Guatemala
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 129.222.0.0 - 129.222.255.255
CIDR: 129.222.0.0/16
NetName: SPACEX-STARLINK-IPV4
NetHandle: NET-129-222-0-0-1
Parent: NET129 (NET-129-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: SpaceX Services, Inc. (SS-2296)
RegDate: 2021-12-06
Updated: 2021-12-07
Ref: https://rdap.arin.net/registry/ip/129.222.0.0
OrgName: SpaceX Services, Inc.
OrgId: SS-2296
Address: 1 Rocket Rd
City: Hawthorne
StateProv: CA
PostalCode: 90250
Country: US
RegDate: 2019-06-24
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SS-2296
OrgNOCHandle: STARL42-ARIN
OrgNOCName: Starlink NOC
OrgNOCPhone: +1-310-363-6000
OrgNOCEmail: starlink-noc@spacex.com
OrgNOCRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgDNSHandle: STARL42-ARIN
OrgDNSName: Starlink NOC
OrgDNSPhone: +1-310-363-6000
OrgDNSEmail: starlink-noc@spacex.com
OrgDNSRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgAbuseHandle: STARL38-ARIN
OrgAbuseName: Starlink Abuse
OrgAbusePhone: +1-310-363-6000
OrgAbuseEmail: starlink-abuse@spacex.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/STARL38-ARIN
OrgRoutingHandle: STARL42-ARIN
OrgRoutingName: Starlink NOC
OrgRoutingPhone: +1-310-363-6000
OrgRoutingEmail: starlink-noc@spacex.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgTechHandle: STARL42-ARIN
OrgTechName: Starlink NOC
OrgTechPhone: +1-310-363-6000
OrgTechEmail: starlink-noc@spacex.com
OrgTechRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
# end
# start
NetRange: 129.222.59.128 - 129.222.59.191
CIDR: 129.222.59.128/26
NetName: STARLINK-12130-MF-ATLAGAX1-IPV4
NetHandle: NET-129-222-59-128-1
Parent: SPACEX-STARLINK-IPV4 (NET-129-222-0-0-1)
NetType: Reassigned
OriginAS:
Organization: SpaceX Services, Inc. (SS-2296)
RegDate: 2023-01-04
Updated: 2023-01-04
Ref: https://rdap.arin.net/registry/ip/129.222.59.128
OrgName: SpaceX Services, Inc.
OrgId: SS-2296
Address: 1 Rocket Rd
City: Hawthorne
StateProv: CA
PostalCode: 90250
Country: US
RegDate: 2019-06-24
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SS-2296
OrgNOCHandle: STARL42-ARIN
OrgNOCName: Starlink NOC
OrgNOCPhone: +1-310-363-6000
OrgNOCEmail: starlink-noc@spacex.com
OrgNOCRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgDNSHandle: STARL42-ARIN
OrgDNSName: Starlink NOC
OrgDNSPhone: +1-310-363-6000
OrgDNSEmail: starlink-noc@spacex.com
OrgDNSRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgAbuseHandle: STARL38-ARIN
OrgAbuseName: Starlink Abuse
OrgAbusePhone: +1-310-363-6000
OrgAbuseEmail: starlink-abuse@spacex.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/STARL38-ARIN
OrgRoutingHandle: STARL42-ARIN
OrgRoutingName: Starlink NOC
OrgRoutingPhone: +1-310-363-6000
OrgRoutingEmail: starlink-noc@spacex.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
OrgTechHandle: STARL42-ARIN
OrgTechName: Starlink NOC
OrgTechPhone: +1-310-363-6000
OrgTechEmail: starlink-noc@spacex.com
OrgTechRef: https://rdap.arin.net/registry/entity/STARL42-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.222.59.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.222.59.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101701 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 05:26:20 CST 2025
;; MSG SIZE rcvd: 107
142.59.222.129.in-addr.arpa domain name pointer customer.gtmygtm1.pop.starlinkisp.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.59.222.129.in-addr.arpa name = customer.gtmygtm1.pop.starlinkisp.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
179.27.71.18 | attack | 2020-04-07T16:26:35.483018abusebot-3.cloudsearch.cf sshd[19784]: Invalid user testuser from 179.27.71.18 port 43732 2020-04-07T16:26:35.490201abusebot-3.cloudsearch.cf sshd[19784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.71.18 2020-04-07T16:26:35.483018abusebot-3.cloudsearch.cf sshd[19784]: Invalid user testuser from 179.27.71.18 port 43732 2020-04-07T16:26:37.782821abusebot-3.cloudsearch.cf sshd[19784]: Failed password for invalid user testuser from 179.27.71.18 port 43732 ssh2 2020-04-07T16:31:51.332262abusebot-3.cloudsearch.cf sshd[20098]: Invalid user docker from 179.27.71.18 port 55518 2020-04-07T16:31:51.340241abusebot-3.cloudsearch.cf sshd[20098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.71.18 2020-04-07T16:31:51.332262abusebot-3.cloudsearch.cf sshd[20098]: Invalid user docker from 179.27.71.18 port 55518 2020-04-07T16:31:53.011932abusebot-3.cloudsearch.cf sshd[20098]: Fa ... |
2020-04-08 05:01:37 |
58.211.191.22 | attackspam | Apr 7 22:47:54 v22019038103785759 sshd\[3347\]: Invalid user postgres from 58.211.191.22 port 60914 Apr 7 22:47:54 v22019038103785759 sshd\[3347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.191.22 Apr 7 22:47:56 v22019038103785759 sshd\[3347\]: Failed password for invalid user postgres from 58.211.191.22 port 60914 ssh2 Apr 7 22:50:35 v22019038103785759 sshd\[3515\]: Invalid user ubuntu from 58.211.191.22 port 35692 Apr 7 22:50:35 v22019038103785759 sshd\[3515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.191.22 ... |
2020-04-08 05:08:56 |
180.183.154.57 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 07-04-2020 13:45:10. |
2020-04-08 04:51:08 |
186.207.129.132 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 07-04-2020 13:45:10. |
2020-04-08 04:49:22 |
85.175.171.113 | attackbots | Unauthorized connection attempt from IP address 85.175.171.113 on Port 445(SMB) |
2020-04-08 04:50:25 |
176.31.134.73 | attack | wp-login.php |
2020-04-08 05:02:47 |
159.138.62.158 | attackspam | Web Server Attack |
2020-04-08 05:03:18 |
218.255.139.66 | attackbotsspam | Apr 7 21:57:00 vpn01 sshd[12206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.139.66 Apr 7 21:57:02 vpn01 sshd[12206]: Failed password for invalid user ubuntu from 218.255.139.66 port 57810 ssh2 ... |
2020-04-08 04:52:55 |
186.220.1.110 | attackbotsspam | scan z |
2020-04-08 05:04:14 |
61.12.26.145 | attackspam | (sshd) Failed SSH login from 61.12.26.145 (IN/India/bestemailupdate.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 7 18:44:49 amsweb01 sshd[3003]: Invalid user postgres from 61.12.26.145 port 47716 Apr 7 18:44:51 amsweb01 sshd[3003]: Failed password for invalid user postgres from 61.12.26.145 port 47716 ssh2 Apr 7 18:51:03 amsweb01 sshd[5895]: Invalid user user from 61.12.26.145 port 34044 Apr 7 18:51:05 amsweb01 sshd[5895]: Failed password for invalid user user from 61.12.26.145 port 34044 ssh2 Apr 7 18:55:52 amsweb01 sshd[6601]: Failed password for invalid user admin from 61.12.26.145 port 60844 ssh2 |
2020-04-08 04:55:37 |
122.51.198.90 | attackspambots | 2020-04-07T18:09:51.233740homeassistant sshd[5969]: Invalid user admin from 122.51.198.90 port 55612 2020-04-07T18:09:51.246393homeassistant sshd[5969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.90 ... |
2020-04-08 04:42:01 |
104.211.164.16 | attack | Lines containing failures of 104.211.164.16 (max 1000) Apr 7 06:07:54 mxbb sshd[15032]: Invalid user centos from 104.211.164.16 port 42664 Apr 7 06:07:54 mxbb sshd[15032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.164.16 Apr 7 06:07:56 mxbb sshd[15032]: Failed password for invalid user centos from 104.211.164.16 port 42664 ssh2 Apr 7 06:07:56 mxbb sshd[15032]: Received disconnect from 104.211.164.16 port 42664:11: Bye Bye [preauth] Apr 7 06:07:56 mxbb sshd[15032]: Disconnected from 104.211.164.16 port 42664 [preauth] Apr 7 06:13:27 mxbb sshd[15205]: Invalid user admin4 from 104.211.164.16 port 59320 Apr 7 06:13:27 mxbb sshd[15205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.164.16 Apr 7 06:13:29 mxbb sshd[15205]: Failed password for invalid user admin4 from 104.211.164.16 port 59320 ssh2 Apr 7 06:13:29 mxbb sshd[15205]: Received disconnect from 104.211.164......... ------------------------------ |
2020-04-08 04:52:24 |
120.92.173.154 | attackspambots | Apr 7 21:32:41 vserver sshd\[6240\]: Invalid user teampspeak3 from 120.92.173.154Apr 7 21:32:43 vserver sshd\[6240\]: Failed password for invalid user teampspeak3 from 120.92.173.154 port 28879 ssh2Apr 7 21:37:33 vserver sshd\[6279\]: Failed password for games from 120.92.173.154 port 55451 ssh2Apr 7 21:42:21 vserver sshd\[6365\]: Invalid user team from 120.92.173.154 ... |
2020-04-08 05:07:15 |
138.185.33.41 | attackspam | Unauthorized connection attempt detected from IP address 138.185.33.41 to port 445 |
2020-04-08 04:33:30 |
106.202.115.118 | attackbotsspam | Unauthorized connection attempt from IP address 106.202.115.118 on Port 445(SMB) |
2020-04-08 04:44:33 |