City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.244.0.0 - 134.244.255.255
CIDR: 134.244.0.0/16
NetName: SIEMENS-AG
NetHandle: NET-134-244-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Siemens Corporation (SC-40)
RegDate: 1989-08-15
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/134.244.0.0
OrgName: Siemens Corporation
OrgId: SC-40
Address: 170 Wood Avenue South
City: Iselin
StateProv: NJ
PostalCode: 08830
Country: US
RegDate: 2011-05-03
Updated: 2025-07-04
Ref: https://rdap.arin.net/registry/entity/SC-40
OrgTechHandle: GEMEI-ARIN
OrgTechName: Gemeinhardt, Olaf
OrgTechPhone: +49 173 974 7893
OrgTechEmail: olaf.gemeinhardt@siemens.com
OrgTechRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
OrgNOCHandle: GEMEI-ARIN
OrgNOCName: Gemeinhardt, Olaf
OrgNOCPhone: +49 173 974 7893
OrgNOCEmail: olaf.gemeinhardt@siemens.com
OrgNOCRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
OrgTechHandle: MCJR1-ARIN
OrgTechName: Montecinos Cabado, Javier Raul
OrgTechPhone: +351 910095483
OrgTechEmail: javier.montecinos-cabado@siemens.com
OrgTechRef: https://rdap.arin.net/registry/entity/MCJR1-ARIN
OrgAbuseHandle: GEMEI-ARIN
OrgAbuseName: Gemeinhardt, Olaf
OrgAbusePhone: +49 173 974 7893
OrgAbuseEmail: olaf.gemeinhardt@siemens.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/GEMEI-ARIN
RNOCHandle: BILLI139-ARIN
RNOCName: Billios, Georgios
RNOCPhone: +306936888229
RNOCEmail: georgios.billios@siemens.com
RNOCRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
RTechHandle: BILLI139-ARIN
RTechName: Billios, Georgios
RTechPhone: +306936888229
RTechEmail: georgios.billios@siemens.com
RTechRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
RAbuseHandle: BILLI139-ARIN
RAbuseName: Billios, Georgios
RAbusePhone: +306936888229
RAbuseEmail: georgios.billios@siemens.com
RAbuseRef: https://rdap.arin.net/registry/entity/BILLI139-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.244.207.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.244.207.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 14:56:32 CST 2026
;; MSG SIZE rcvd: 108
Host 148.207.244.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 148.207.244.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.52.43.127 | attackspam | Automatic report - Banned IP Access |
2020-02-14 20:24:31 |
| 106.51.140.242 | attack | Unauthorized connection attempt from IP address 106.51.140.242 on Port 445(SMB) |
2020-02-14 20:28:02 |
| 165.227.188.19 | attackspam | Probing for vulnerabilities, ignoring robots.txt |
2020-02-14 20:15:16 |
| 119.202.212.133 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 20:39:48 |
| 185.209.0.89 | attack | 02/14/2020-11:54:56.658778 185.209.0.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-14 20:32:26 |
| 103.130.215.53 | attack | Feb 14 05:19:11 server sshd\[24951\]: Invalid user brady from 103.130.215.53 Feb 14 05:19:11 server sshd\[24951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.215.53 Feb 14 05:19:13 server sshd\[24951\]: Failed password for invalid user brady from 103.130.215.53 port 39314 ssh2 Feb 14 14:51:40 server sshd\[17170\]: Invalid user todd from 103.130.215.53 Feb 14 14:51:40 server sshd\[17170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.215.53 ... |
2020-02-14 20:19:16 |
| 183.230.248.56 | attackspam | Feb 14 01:51:07 vps46666688 sshd[30130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.230.248.56 Feb 14 01:51:09 vps46666688 sshd[30130]: Failed password for invalid user roney from 183.230.248.56 port 55481 ssh2 ... |
2020-02-14 20:20:40 |
| 61.177.172.128 | attack | SSH login attempts |
2020-02-14 19:58:59 |
| 5.89.59.163 | attack | Honeypot attack, port: 5555, PTR: net-5-89-59-163.cust.vodafonedsl.it. |
2020-02-14 20:23:40 |
| 119.202.233.202 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-14 20:29:42 |
| 171.242.121.215 | attackspam | trying to access non-authorized port |
2020-02-14 20:06:27 |
| 177.12.227.131 | attackbots | Feb 13 22:46:06 hpm sshd\[25427\]: Invalid user sarbanes from 177.12.227.131 Feb 13 22:46:06 hpm sshd\[25427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.227.131 Feb 13 22:46:08 hpm sshd\[25427\]: Failed password for invalid user sarbanes from 177.12.227.131 port 15420 ssh2 Feb 13 22:50:06 hpm sshd\[25808\]: Invalid user 123456 from 177.12.227.131 Feb 13 22:50:06 hpm sshd\[25808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.227.131 |
2020-02-14 19:59:34 |
| 148.244.240.86 | attackbots | Honeypot attack, port: 445, PTR: static-148-244-240-86.alestra.net.mx. |
2020-02-14 20:13:41 |
| 93.177.238.98 | attack | Unauthorised access (Feb 14) SRC=93.177.238.98 LEN=40 TTL=58 ID=26259 TCP DPT=23 WINDOW=35754 SYN |
2020-02-14 20:17:55 |
| 103.38.13.102 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 14-02-2020 07:50:09. |
2020-02-14 19:54:45 |