City: Ogden
Region: Utah
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 144.172.64.0 - 144.172.127.255
CIDR: 144.172.64.0/18
NetName: PONYNET-12
NetHandle: NET-144-172-64-0-1
Parent: NET144 (NET-144-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: FranTech Solutions (SYNDI-5)
RegDate: 2014-05-07
Updated: 2014-05-07
Ref: https://rdap.arin.net/registry/ip/144.172.64.0
OrgName: FranTech Solutions
OrgId: SYNDI-5
Address: 1621 Central Ave
City: Cheyenne
StateProv: WY
PostalCode: 82001
Country: US
RegDate: 2010-07-21
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SYNDI-5
OrgTechHandle: FDI19-ARIN
OrgTechName: Dias, Francisco
OrgTechPhone: +1-778-977-8246
OrgTechEmail: admin@frantech.ca
OrgTechRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
OrgAbuseHandle: FDI19-ARIN
OrgAbuseName: Dias, Francisco
OrgAbusePhone: +1-778-977-8246
OrgAbuseEmail: admin@frantech.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/FDI19-ARIN
# end
# start
NetRange: 144.172.96.0 - 144.172.97.255
CIDR: 144.172.96.0/23
NetName: ROUTERHOSTING
NetHandle: NET-144-172-96-0-1
Parent: PONYNET-12 (NET-144-172-64-0-1)
NetType: Reallocated
OriginAS:
Organization: RouterHosting LLC (RL-896)
RegDate: 2025-01-03
Updated: 2025-01-03
Ref: https://rdap.arin.net/registry/ip/144.172.96.0
OrgName: RouterHosting LLC
OrgId: RL-896
Address: 1309 Coffeen Avenue STE 1200
Address: Sheridan, WY 82801
City: Sheridan
StateProv: WY
PostalCode: 82801
Country: US
RegDate: 2023-03-24
Updated: 2023-09-19
Comment: geofeed: https://api.cloudzy.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/RL-896
OrgAbuseHandle: ABUSE8459-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-778-977-8246
OrgAbuseEmail: abuse-reports@cloudzy.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8459-ARIN
OrgTechHandle: ABUSE8459-ARIN
OrgTechName: abuse
OrgTechPhone: +1-778-977-8246
OrgTechEmail: abuse-reports@cloudzy.com
OrgTechRef: https://rdap.arin.net/registry/entity/ABUSE8459-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.172.97.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.172.97.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092600 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 26 19:31:23 CST 2025
;; MSG SIZE rcvd: 107
117.97.172.144.in-addr.arpa domain name pointer 117.97.172.144.static.cloudzy.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.97.172.144.in-addr.arpa name = 117.97.172.144.static.cloudzy.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
134.73.5.117 | attackbots | 2020-06-17 13:54:23.229479-0500 localhost sshd[99585]: Failed password for invalid user mysqluser from 134.73.5.117 port 51248 ssh2 |
2020-06-18 03:45:10 |
165.22.52.181 | attack | Auto Fail2Ban report, multiple SSH login attempts. |
2020-06-18 03:42:49 |
52.230.18.206 | attackbotsspam | Jun 17 17:58:19 XXX sshd[32246]: Invalid user jas from 52.230.18.206 port 40502 |
2020-06-18 03:50:40 |
34.209.17.83 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-18 04:10:46 |
45.157.120.16 | attackspam | Invalid user lsfadmin from 45.157.120.16 port 54206 |
2020-06-18 03:52:12 |
187.35.25.230 | attackbotsspam | Invalid user jake from 187.35.25.230 port 37476 |
2020-06-18 03:56:35 |
18.217.38.247 | attack | Invalid user lb from 18.217.38.247 port 54760 |
2020-06-18 04:11:34 |
128.199.227.96 | attack | Jun 17 22:17:32 hosting sshd[27789]: Invalid user user from 128.199.227.96 port 33662 ... |
2020-06-18 04:20:30 |
89.163.150.32 | attack | Jun 17 18:20:12 pbkit sshd[192743]: Invalid user nfs from 89.163.150.32 port 35560 Jun 17 18:20:14 pbkit sshd[192743]: Failed password for invalid user nfs from 89.163.150.32 port 35560 ssh2 Jun 17 18:27:08 pbkit sshd[192911]: Invalid user smtp from 89.163.150.32 port 41634 ... |
2020-06-18 04:07:28 |
207.244.240.199 | attack | Jun 17 22:02:53 pkdns2 sshd\[61864\]: Failed password for root from 207.244.240.199 port 49934 ssh2Jun 17 22:05:51 pkdns2 sshd\[62032\]: Invalid user gpadmin from 207.244.240.199Jun 17 22:05:53 pkdns2 sshd\[62032\]: Failed password for invalid user gpadmin from 207.244.240.199 port 50514 ssh2Jun 17 22:08:58 pkdns2 sshd\[62153\]: Invalid user hendi from 207.244.240.199Jun 17 22:09:00 pkdns2 sshd\[62153\]: Failed password for invalid user hendi from 207.244.240.199 port 51106 ssh2Jun 17 22:11:58 pkdns2 sshd\[62343\]: Invalid user sibyl from 207.244.240.199 ... |
2020-06-18 03:54:55 |
65.31.127.80 | attackbots | odoo8 ... |
2020-06-18 04:09:32 |
106.12.99.204 | attack | Bruteforce detected by fail2ban |
2020-06-18 03:47:04 |
185.251.44.193 | attackspam | 2020-06-17T14:35:47.931597morrigan.ad5gb.com sshd[367098]: Invalid user liuxin from 185.251.44.193 port 36196 2020-06-17T14:35:49.604568morrigan.ad5gb.com sshd[367098]: Failed password for invalid user liuxin from 185.251.44.193 port 36196 ssh2 2020-06-17T14:35:50.485983morrigan.ad5gb.com sshd[367098]: Disconnected from invalid user liuxin 185.251.44.193 port 36196 [preauth] |
2020-06-18 03:56:50 |
186.93.60.224 | attack | Invalid user ftpuser from 186.93.60.224 port 57766 |
2020-06-18 04:17:46 |
207.244.247.192 | attackbotsspam | Invalid user db2inst1 from 207.244.247.192 port 57202 |
2020-06-18 04:14:09 |