City: New York City
Region: New York
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 149.119.0.0 - 149.119.255.255
CIDR: 149.119.0.0/16
NetName: COGENT-149-119-16
NetHandle: NET-149-119-0-0-1
Parent: NET149 (NET-149-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1992-01-28
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/149.119.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9577800012
network:Network-Name:NET4-9577800012
network:IP-Network:149.119.128.0/18
network:Org-Name:SparkTech LTD
network:Street-Address:25 BROADWAY
network:City:NEW YORK
network:State:NY
network:Country:US
network:Postal-Code:10004
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-07-07 19:20:41
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.119.134.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.119.134.111. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042902 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 10:18:15 CST 2026
;; MSG SIZE rcvd: 108
Host 111.134.119.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 111.134.119.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 208.187.166.187 | attackbots | Spam mails sent to address hacked/leaked from Nexus Mods in July 2013 |
2019-09-25 12:22:04 |
| 94.102.57.24 | attackbots | Bad Postfix AUTH attempts ... |
2019-09-25 12:51:48 |
| 188.166.163.92 | attackbots | Sep 24 18:38:44 php1 sshd\[8953\]: Invalid user ulrick from 188.166.163.92 Sep 24 18:38:44 php1 sshd\[8953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.163.92 Sep 24 18:38:45 php1 sshd\[8953\]: Failed password for invalid user ulrick from 188.166.163.92 port 45598 ssh2 Sep 24 18:42:49 php1 sshd\[9459\]: Invalid user tchai from 188.166.163.92 Sep 24 18:42:49 php1 sshd\[9459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.163.92 |
2019-09-25 12:52:02 |
| 212.59.186.62 | attackbots | Scanning and Vuln Attempts |
2019-09-25 12:51:25 |
| 51.89.164.224 | attackspambots | 2019-09-25T05:51:55.183535 sshd[25306]: Invalid user testing1 from 51.89.164.224 port 36255 2019-09-25T05:51:55.197875 sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.224 2019-09-25T05:51:55.183535 sshd[25306]: Invalid user testing1 from 51.89.164.224 port 36255 2019-09-25T05:51:57.373990 sshd[25306]: Failed password for invalid user testing1 from 51.89.164.224 port 36255 ssh2 2019-09-25T05:55:47.001427 sshd[25362]: Invalid user oz from 51.89.164.224 port 56816 ... |
2019-09-25 12:43:16 |
| 221.178.157.244 | attackspam | Sep 25 03:55:59 work-partkepr sshd\[8484\]: Invalid user vowell from 221.178.157.244 port 16929 Sep 25 03:55:59 work-partkepr sshd\[8484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.178.157.244 ... |
2019-09-25 12:32:35 |
| 187.217.199.20 | attack | 2019-09-25T00:00:28.2853251495-001 sshd\[20656\]: Invalid user ave from 187.217.199.20 port 54764 2019-09-25T00:00:28.2927351495-001 sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20 2019-09-25T00:00:30.5592951495-001 sshd\[20656\]: Failed password for invalid user ave from 187.217.199.20 port 54764 ssh2 2019-09-25T00:05:07.9132211495-001 sshd\[21016\]: Invalid user heinz from 187.217.199.20 port 39084 2019-09-25T00:05:07.9215611495-001 sshd\[21016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20 2019-09-25T00:05:10.4893591495-001 sshd\[21016\]: Failed password for invalid user heinz from 187.217.199.20 port 39084 ssh2 ... |
2019-09-25 12:30:06 |
| 186.84.174.215 | attackbotsspam | Sep 25 06:39:15 dedicated sshd[13679]: Invalid user tester from 186.84.174.215 port 45729 |
2019-09-25 13:00:25 |
| 148.70.35.109 | attackbots | Sep 25 06:57:43 nextcloud sshd\[11817\]: Invalid user wasadrc from 148.70.35.109 Sep 25 06:57:43 nextcloud sshd\[11817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.35.109 Sep 25 06:57:45 nextcloud sshd\[11817\]: Failed password for invalid user wasadrc from 148.70.35.109 port 42784 ssh2 ... |
2019-09-25 12:58:45 |
| 213.142.143.209 | attackspambots | Scanning and Vuln Attempts |
2019-09-25 12:31:03 |
| 177.23.90.10 | attackspam | Sep 24 23:50:21 ny01 sshd[10894]: Failed password for backup from 177.23.90.10 port 48442 ssh2 Sep 24 23:55:22 ny01 sshd[12113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.90.10 Sep 24 23:55:25 ny01 sshd[12113]: Failed password for invalid user bim from 177.23.90.10 port 32902 ssh2 |
2019-09-25 13:00:55 |
| 112.85.42.87 | attackbots | Sep 24 17:54:47 sachi sshd\[22379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root Sep 24 17:54:50 sachi sshd\[22379\]: Failed password for root from 112.85.42.87 port 15989 ssh2 Sep 24 17:55:24 sachi sshd\[22414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root Sep 24 17:55:26 sachi sshd\[22414\]: Failed password for root from 112.85.42.87 port 45172 ssh2 Sep 24 17:55:28 sachi sshd\[22414\]: Failed password for root from 112.85.42.87 port 45172 ssh2 |
2019-09-25 12:46:51 |
| 216.231.129.34 | attack | Scanning and Vuln Attempts |
2019-09-25 12:14:56 |
| 222.186.42.117 | attackbotsspam | Sep 25 04:11:58 localhost sshd\[8910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117 user=root Sep 25 04:12:00 localhost sshd\[8910\]: Failed password for root from 222.186.42.117 port 14286 ssh2 Sep 25 04:12:02 localhost sshd\[8910\]: Failed password for root from 222.186.42.117 port 14286 ssh2 Sep 25 04:12:05 localhost sshd\[8910\]: Failed password for root from 222.186.42.117 port 14286 ssh2 Sep 25 04:14:54 localhost sshd\[8975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117 user=root ... |
2019-09-25 12:18:30 |
| 142.93.114.123 | attackbotsspam | Sep 25 06:47:55 site1 sshd\[12492\]: Invalid user elasticsearch from 142.93.114.123Sep 25 06:47:56 site1 sshd\[12492\]: Failed password for invalid user elasticsearch from 142.93.114.123 port 51584 ssh2Sep 25 06:51:49 site1 sshd\[12721\]: Invalid user ferari from 142.93.114.123Sep 25 06:51:51 site1 sshd\[12721\]: Failed password for invalid user ferari from 142.93.114.123 port 35778 ssh2Sep 25 06:55:50 site1 sshd\[13033\]: Invalid user ql from 142.93.114.123Sep 25 06:55:51 site1 sshd\[13033\]: Failed password for invalid user ql from 142.93.114.123 port 48198 ssh2 ... |
2019-09-25 12:37:49 |