City: St. Louis
Region: Missouri
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 144.126.128.0 - 144.126.159.255
CIDR: 144.126.128.0/19
NetName: CONTA-48
NetHandle: NET-144-126-128-0-1
Parent: NET144 (NET-144-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Contabo Inc. (CONTA-48)
RegDate: 2021-03-16
Updated: 2023-05-16
Ref: https://rdap.arin.net/registry/ip/144.126.128.0
OrgName: Contabo Inc.
OrgId: CONTA-48
Address: 710 N Tucker Blvd. STE 400A
City: St. Louis
StateProv: MO
PostalCode: 63101
Country: US
RegDate: 2019-12-23
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/CONTA-48
OrgNOCHandle: CONTA393-ARIN
OrgNOCName: Contabo NOC
OrgNOCPhone: +498921665862
OrgNOCEmail: sascha.wintz@contabo.com
OrgNOCRef: https://rdap.arin.net/registry/entity/CONTA393-ARIN
OrgAbuseHandle: CAD61-ARIN
OrgAbuseName: Contabo Abuse Department
OrgAbusePhone: +498921268372
OrgAbuseEmail: abuse@contabo.de
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAD61-ARIN
OrgTechHandle: CONTA392-ARIN
OrgTechName: Contabo Tech
OrgTechPhone: +498921268372
OrgTechEmail: wilhelm.zwalina@contabo.de
OrgTechRef: https://rdap.arin.net/registry/entity/CONTA392-ARIN
OrgRoutingHandle: CONTA393-ARIN
OrgRoutingName: Contabo NOC
OrgRoutingPhone: +498921665862
OrgRoutingEmail: sascha.wintz@contabo.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CONTA393-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.126.132.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.126.132.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 18:31:55 CST 2026
;; MSG SIZE rcvd: 107
98.132.126.144.in-addr.arpa domain name pointer vmi3231749.contaboserver.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
98.132.126.144.in-addr.arpa name = vmi3231749.contaboserver.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.229.79.17 | attackspambots | Feb 25 15:03:08 mockhub sshd[26331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.17 Feb 25 15:03:10 mockhub sshd[26331]: Failed password for invalid user sandeep from 111.229.79.17 port 53830 ssh2 ... |
2020-02-26 07:03:49 |
| 143.0.178.142 | attack | 2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= |
2020-02-26 06:57:13 |
| 146.66.178.78 | attackbots | [portscan] Port scan |
2020-02-26 07:13:28 |
| 211.24.100.215 | attackspambots | Honeypot attack, port: 445, PTR: cgw-211-24-100-215.bbrtl.time.net.my. |
2020-02-26 06:53:15 |
| 140.136.170.12 | attackspambots | Honeypot attack, port: 81, PTR: user12.ext.fju.edu.tw. |
2020-02-26 06:59:30 |
| 71.200.234.56 | attackbots | Honeypot attack, port: 5555, PTR: c-71-200-234-56.hsd1.fl.comcast.net. |
2020-02-26 06:59:06 |
| 200.225.222.161 | attackspam | Honeypot attack, port: 445, PTR: 200-225-222-161.static.ctbctelecom.com.br. |
2020-02-26 07:05:47 |
| 103.52.216.52 | attackbots | suspicious action Tue, 25 Feb 2020 13:32:52 -0300 |
2020-02-26 07:14:30 |
| 134.19.177.53 | attackspam | Brute forcing email accounts |
2020-02-26 06:42:01 |
| 190.181.15.197 | attack | Feb 25 19:33:33 server sshd\[23143\]: Invalid user admin from 190.181.15.197 Feb 25 19:33:33 server sshd\[23143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.181.15.197 Feb 25 19:33:35 server sshd\[23143\]: Failed password for invalid user admin from 190.181.15.197 port 52968 ssh2 Feb 25 19:33:42 server sshd\[23197\]: Invalid user admin from 190.181.15.197 Feb 25 19:33:42 server sshd\[23197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.181.15.197 ... |
2020-02-26 06:42:52 |
| 219.78.59.2 | attackbots | Honeypot attack, port: 5555, PTR: n219078059002.netvigator.com. |
2020-02-26 06:51:16 |
| 185.118.76.134 | attackbots | Port probing on unauthorized port 5555 |
2020-02-26 06:42:19 |
| 51.75.105.227 | attackbots | Date: Tue, 25 Feb 2020 00:07:50 -0000 From: "Lifeventure" |
2020-02-26 06:40:30 |
| 103.145.172.10 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-26 06:39:57 |
| 107.193.106.251 | attackbotsspam | Feb 25 22:00:31 MK-Soft-VM8 sshd[18105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.193.106.251 Feb 25 22:00:32 MK-Soft-VM8 sshd[18105]: Failed password for invalid user admin from 107.193.106.251 port 52742 ssh2 ... |
2020-02-26 06:54:06 |