City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 136.249.0.0 - 136.254.255.255
CIDR: 136.249.0.0/16, 136.250.0.0/15, 136.254.0.0/16, 136.252.0.0/15
NetName: SLB-WESTERNGECO-GLOBAL-DP-MARINE-LAND-NET
NetHandle: NET-136-249-0-0-1
Parent: NET136 (NET-136-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Schlumberger Limited (SCHLU-3)
RegDate: 1989-05-15
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/136.249.0.0
OrgName: Schlumberger Limited
OrgId: SCHLU-3
Address: 5599 San Felipe
Address: Suite 1700
City: Houston
StateProv: TX
PostalCode: 77056
Country: US
RegDate: 2005-02-16
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SCHLU-3
OrgAbuseHandle: SISO-ARIN
OrgAbuseName: Schlumberger IT Security Operations
OrgAbusePhone: +1-713-513-1100
OrgAbuseEmail: hostmaster@slb.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/SISO-ARIN
OrgTechHandle: ZS104-ARIN
OrgTechName: Schlumberger IP Address Coordinator
OrgTechPhone: +1-713-513-1100
OrgTechEmail: hostmaster@slb.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZS104-ARIN
OrgNOCHandle: SHEWD-ARIN
OrgNOCName: Schlumberger Houston EMC WAN Desk
OrgNOCPhone: +1-713-513-2028
OrgNOCEmail: hostmaster@slb.com
OrgNOCRef: https://rdap.arin.net/registry/entity/SHEWD-ARIN
RNOCHandle: SHEWD-ARIN
RNOCName: Schlumberger Houston EMC WAN Desk
RNOCPhone: +1-713-513-2028
RNOCEmail: hostmaster@slb.com
RNOCRef: https://rdap.arin.net/registry/entity/SHEWD-ARIN
RAbuseHandle: SISO-ARIN
RAbuseName: Schlumberger IT Security Operations
RAbusePhone: +1-713-513-1100
RAbuseEmail: hostmaster@slb.com
RAbuseRef: https://rdap.arin.net/registry/entity/SISO-ARIN
RTechHandle: ZS104-ARIN
RTechName: Schlumberger IP Address Coordinator
RTechPhone: +1-713-513-1100
RTechEmail: hostmaster@slb.com
RTechRef: https://rdap.arin.net/registry/entity/ZS104-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.249.240.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.249.240.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 14:36:33 CST 2026
;; MSG SIZE rcvd: 108
220.240.249.136.in-addr.arpa domain name pointer host.slb.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.240.249.136.in-addr.arpa name = host.slb.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 109.184.152.221 | attackbotsspam | fell into ViewStateTrap:berlin |
2019-11-14 01:17:00 |
| 182.127.161.214 | attackbots | Telnet/23 MH Probe, BF, Hack - |
2019-11-14 01:34:37 |
| 41.141.250.244 | attackbotsspam | 2019-11-14T01:33:46.841852luisaranguren sshd[786372]: Connection from 41.141.250.244 port 53518 on 10.10.10.6 port 22 2019-11-14T01:33:48.396419luisaranguren sshd[786372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.141.250.244 user=root 2019-11-14T01:33:50.279611luisaranguren sshd[786372]: Failed password for root from 41.141.250.244 port 53518 ssh2 2019-11-14T01:48:59.643312luisaranguren sshd[788455]: Connection from 41.141.250.244 port 59762 on 10.10.10.6 port 22 2019-11-14T01:49:01.332773luisaranguren sshd[788455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.141.250.244 user=root 2019-11-14T01:49:03.221015luisaranguren sshd[788455]: Failed password for root from 41.141.250.244 port 59762 ssh2 ... |
2019-11-14 01:28:23 |
| 2001:df0:411:400d:1410:61ff:fe63:9563 | attackspambots | xmlrpc attack |
2019-11-14 01:40:18 |
| 222.186.175.212 | attack | $f2bV_matches |
2019-11-14 01:01:45 |
| 212.26.251.125 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-14 01:12:04 |
| 45.55.12.248 | attackbotsspam | Nov 13 16:38:56 vps01 sshd[23323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248 Nov 13 16:38:58 vps01 sshd[23323]: Failed password for invalid user ftpuser from 45.55.12.248 port 48840 ssh2 |
2019-11-14 01:43:11 |
| 178.128.144.128 | attackspambots | Nov 13 05:16:51 hpm sshd\[24042\]: Invalid user su from 178.128.144.128 Nov 13 05:16:51 hpm sshd\[24042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.128 Nov 13 05:16:53 hpm sshd\[24042\]: Failed password for invalid user su from 178.128.144.128 port 40840 ssh2 Nov 13 05:20:50 hpm sshd\[24365\]: Invalid user woldeyohannes from 178.128.144.128 Nov 13 05:20:50 hpm sshd\[24365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.128 |
2019-11-14 01:30:35 |
| 27.59.27.73 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-11-14 01:20:19 |
| 222.186.175.169 | attack | Nov 13 17:54:34 h2177944 sshd\[32089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Nov 13 17:54:36 h2177944 sshd\[32089\]: Failed password for root from 222.186.175.169 port 54058 ssh2 Nov 13 17:54:40 h2177944 sshd\[32089\]: Failed password for root from 222.186.175.169 port 54058 ssh2 Nov 13 17:54:43 h2177944 sshd\[32089\]: Failed password for root from 222.186.175.169 port 54058 ssh2 ... |
2019-11-14 01:15:29 |
| 115.20.202.63 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-14 00:59:21 |
| 194.114.129.201 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-14 01:14:27 |
| 114.80.116.184 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-14 01:10:19 |
| 77.6.1.110 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/77.6.1.110/ DE - 1H : (52) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : DE NAME ASN : ASN6805 IP : 77.6.1.110 CIDR : 77.0.0.0/12 PREFIX COUNT : 42 UNIQUE IP COUNT : 7555584 ATTACKS DETECTED ASN6805 : 1H - 2 3H - 2 6H - 2 12H - 3 24H - 5 DateTime : 2019-11-13 15:49:33 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-11-14 01:05:01 |
| 106.13.37.203 | attackbotsspam | 2019-11-13T16:33:03.979430abusebot-5.cloudsearch.cf sshd\[26456\]: Invalid user Mataleena from 106.13.37.203 port 54572 |
2019-11-14 01:24:15 |