City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 142.248.80.0 - 142.248.83.255
CIDR: 142.248.80.0/22
NetName: AMBYRE
NetHandle: NET-142-248-80-0-1
Parent: NET142 (NET-142-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Ambyre LLC (AL-3032)
RegDate: 2025-10-10
Updated: 2025-10-10
Ref: https://rdap.arin.net/registry/ip/142.248.80.0
OrgName: Ambyre LLC
OrgId: AL-3032
Address: 30 N. Gould St. Ste N
City: Sheridan
StateProv: WY
PostalCode: 82801
Country: US
RegDate: 2021-07-15
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/AL-3032
OrgTechHandle: AMBYR-ARIN
OrgTechName: AMBYRE-ARIN
OrgTechPhone: +1-434-373-7837
OrgTechEmail: admin@ambyre.net
OrgTechRef: https://rdap.arin.net/registry/entity/AMBYR-ARIN
OrgAbuseHandle: ABUSE8544-ARIN
OrgAbuseName: ABUSE
OrgAbusePhone: +1-434-373-7837
OrgAbuseEmail: abuse@ambyrenodes.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8544-ARIN
# end
# start
NetRange: 142.248.80.0 - 142.248.80.255
CIDR: 142.248.80.0/24
NetName: ADVIN-KC-01
NetHandle: NET-142-248-80-0-2
Parent: AMBYRE (NET-142-248-80-0-1)
NetType: Reallocated
OriginAS:
Organization: Advin Services LLC (ASL-843)
RegDate: 2025-10-27
Updated: 2025-10-27
Comment: Geofeed https://advinservers.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/142.248.80.0
OrgName: Advin Services LLC
OrgId: ASL-843
Address: 3640 Concord Pike #1080
City: Wilmington
StateProv: DE
PostalCode: 19803
Country: US
RegDate: 2021-10-18
Updated: 2024-10-02
Comment: Website: https://advinservers.com
Comment: Abuse Email: abuse@advinservers.com
Comment: Support Email: support@advinservers.com
Ref: https://rdap.arin.net/registry/entity/ASL-843
OrgAbuseHandle: ADMIN7999-ARIN
OrgAbuseName: Admin
OrgAbusePhone: +1-302-212-0969
OrgAbuseEmail: anush@advinservers.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ADMIN7999-ARIN
OrgTechHandle: ADMIN7999-ARIN
OrgTechName: Admin
OrgTechPhone: +1-302-212-0969
OrgTechEmail: anush@advinservers.com
OrgTechRef: https://rdap.arin.net/registry/entity/ADMIN7999-ARIN
OrgRoutingHandle: ADMIN7999-ARIN
OrgRoutingName: Admin
OrgRoutingPhone: +1-302-212-0969
OrgRoutingEmail: anush@advinservers.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ADMIN7999-ARIN
OrgDNSHandle: ADMIN7999-ARIN
OrgDNSName: Admin
OrgDNSPhone: +1-302-212-0969
OrgDNSEmail: anush@advinservers.com
OrgDNSRef: https://rdap.arin.net/registry/entity/ADMIN7999-ARIN
OrgNOCHandle: ADMIN7999-ARIN
OrgNOCName: Admin
OrgNOCPhone: +1-302-212-0969
OrgNOCEmail: anush@advinservers.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ADMIN7999-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.248.80.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.248.80.190. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 19:30:36 CST 2026
;; MSG SIZE rcvd: 107
Host 190.80.248.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 190.80.248.142.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 101.224.233.24 | attack | 404 NOT FOUND |
2019-10-19 00:06:04 |
| 167.86.114.108 | attackspambots | 2019-10-18T12:06:25.192675shield sshd\[21808\]: Invalid user sudip from 167.86.114.108 port 58342 2019-10-18T12:06:25.197118shield sshd\[21808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi267007.contaboserver.net 2019-10-18T12:06:27.168471shield sshd\[21808\]: Failed password for invalid user sudip from 167.86.114.108 port 58342 ssh2 2019-10-18T12:10:23.723544shield sshd\[22971\]: Invalid user PASSWORD!23 from 167.86.114.108 port 40978 2019-10-18T12:10:23.728077shield sshd\[22971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi267007.contaboserver.net |
2019-10-18 23:46:29 |
| 163.47.214.158 | attackspambots | Oct 18 16:43:18 MK-Soft-VM7 sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158 Oct 18 16:43:20 MK-Soft-VM7 sshd[19983]: Failed password for invalid user supervisor from 163.47.214.158 port 35990 ssh2 ... |
2019-10-19 00:04:49 |
| 201.66.230.67 | attackbotsspam | Oct 18 05:03:41 tdfoods sshd\[3844\]: Invalid user operador from 201.66.230.67 Oct 18 05:03:41 tdfoods sshd\[3844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.stv.com.br Oct 18 05:03:43 tdfoods sshd\[3844\]: Failed password for invalid user operador from 201.66.230.67 port 56502 ssh2 Oct 18 05:08:58 tdfoods sshd\[4371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.stv.com.br user=root Oct 18 05:09:01 tdfoods sshd\[4371\]: Failed password for root from 201.66.230.67 port 46941 ssh2 |
2019-10-18 23:46:10 |
| 1.52.120.94 | attack | 1.52.120.94 - - [18/Oct/2019:07:39:23 -0400] "GET /?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=61&productID=4701-RIM&linkID=16812 HTTP/1.1" 200 17420 "https://exitdevice.com/?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=61&productID=4701-RIM&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-18 23:31:43 |
| 188.131.179.87 | attack | Oct 18 10:03:34 xtremcommunity sshd\[646378\]: Invalid user test01 from 188.131.179.87 port 11013 Oct 18 10:03:34 xtremcommunity sshd\[646378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.179.87 Oct 18 10:03:36 xtremcommunity sshd\[646378\]: Failed password for invalid user test01 from 188.131.179.87 port 11013 ssh2 Oct 18 10:09:54 xtremcommunity sshd\[646558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.179.87 user=root Oct 18 10:09:56 xtremcommunity sshd\[646558\]: Failed password for root from 188.131.179.87 port 48325 ssh2 ... |
2019-10-19 00:04:18 |
| 202.179.185.12 | attackbots | 202.179.185.12 - - [18/Oct/2019:07:38:42 -0400] "GET /?page=../../../../etc/passwd%00&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0 HTTP/1.1" 200 16653 "https://exitdevice.com/?page=../../../../etc/passwd%00&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-18 23:51:09 |
| 83.110.147.240 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-18 23:38:04 |
| 92.151.64.207 | attack | ... |
2019-10-18 23:26:50 |
| 222.186.173.201 | attackbotsspam | Oct 18 17:17:25 vpn01 sshd[14363]: Failed password for root from 222.186.173.201 port 52550 ssh2 Oct 18 17:17:29 vpn01 sshd[14363]: Failed password for root from 222.186.173.201 port 52550 ssh2 ... |
2019-10-18 23:29:00 |
| 220.137.89.128 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/220.137.89.128/ TW - 1H : (164) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TW NAME ASN : ASN3462 IP : 220.137.89.128 CIDR : 220.137.0.0/17 PREFIX COUNT : 390 UNIQUE IP COUNT : 12267520 WYKRYTE ATAKI Z ASN3462 : 1H - 7 3H - 23 6H - 40 12H - 88 24H - 159 DateTime : 2019-10-18 13:38:20 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-19 00:05:30 |
| 119.61.26.165 | attack | Oct 18 14:30:08 server sshd\[7576\]: Invalid user image from 119.61.26.165 Oct 18 14:30:08 server sshd\[7576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165 Oct 18 14:30:10 server sshd\[7576\]: Failed password for invalid user image from 119.61.26.165 port 50419 ssh2 Oct 18 14:39:36 server sshd\[9862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165 user=root Oct 18 14:39:38 server sshd\[9862\]: Failed password for root from 119.61.26.165 port 49897 ssh2 ... |
2019-10-18 23:23:59 |
| 182.73.123.118 | attackspambots | Oct 18 14:57:32 vps647732 sshd[21861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118 Oct 18 14:57:34 vps647732 sshd[21861]: Failed password for invalid user pineapple from 182.73.123.118 port 32867 ssh2 ... |
2019-10-18 23:56:16 |
| 51.77.144.50 | attack | Invalid user avis from 51.77.144.50 port 48994 |
2019-10-18 23:53:40 |
| 59.25.197.158 | attackspam | Automatic report - Banned IP Access |
2019-10-18 23:44:15 |