City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 149.40.0.0 - 149.40.255.255
CIDR: 149.40.0.0/16
NetName: COGENT-149-40-16
NetHandle: NET-149-40-0-0-1
Parent: NET149 (NET-149-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1992-01-28
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/149.40.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
# end
# start
NetRange: 149.40.48.0 - 149.40.63.255
CIDR: 149.40.48.0/20
NetName: DATACAMP-CGNT-NET-6
NetHandle: NET-149-40-48-0-1
Parent: COGENT-149-40-16 (NET-149-40-0-0-1)
NetType: Reallocated
OriginAS:
Organization: CDN77 (DL-807)
RegDate: 2023-07-18
Updated: 2023-07-18
Ref: https://rdap.arin.net/registry/ip/149.40.48.0
OrgName: CDN77
OrgId: DL-807
Address: 207 Regent Street
City: London
StateProv:
PostalCode: W1B 3HH
Country: GB
RegDate: 2022-03-28
Updated: 2022-12-01
Ref: https://rdap.arin.net/registry/entity/DL-807
OrgAbuseHandle: CAC96-ARIN
OrgAbuseName: CDN77 Abuse contact
OrgAbusePhone: +443308081648
OrgAbuseEmail: abuse@cdn77.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAC96-ARIN
OrgNOCHandle: PROCH16-ARIN
OrgNOCName: Prochazka, Jiri
OrgNOCPhone: +443308081648
OrgNOCEmail: support@cdn77.com
OrgNOCRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgTechHandle: PROCH16-ARIN
OrgTechName: Prochazka, Jiri
OrgTechPhone: +443308081648
OrgTechEmail: support@cdn77.com
OrgTechRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName: CDN77 NOC
OrgRoutingPhone: +443308081648
OrgRoutingEmail: network@cdn77.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CDNNO-ARIN
# end
# start
NetRange: 149.40.56.0 - 149.40.56.255
CIDR: 149.40.56.0/24
NetName: CDNEXT-HOU-CG
NetHandle: NET-149-40-56-0-1
Parent: DATACAMP-CGNT-NET-6 (NET-149-40-48-0-1)
NetType: Reassigned
OriginAS:
Customer: DataCamp Limited (C10677203)
RegDate: 2024-02-01
Updated: 2024-02-01
Ref: https://rdap.arin.net/registry/ip/149.40.56.0
CustName: DataCamp Limited
Address: 207 Regent Street
City: London
StateProv:
PostalCode: W1B 3HH
Country: GB
RegDate: 2024-02-01
Updated: 2024-02-01
Ref: https://rdap.arin.net/registry/entity/C10677203
OrgAbuseHandle: CAC96-ARIN
OrgAbuseName: CDN77 Abuse contact
OrgAbusePhone: +443308081648
OrgAbuseEmail: abuse@cdn77.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAC96-ARIN
OrgNOCHandle: PROCH16-ARIN
OrgNOCName: Prochazka, Jiri
OrgNOCPhone: +443308081648
OrgNOCEmail: support@cdn77.com
OrgNOCRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgTechHandle: PROCH16-ARIN
OrgTechName: Prochazka, Jiri
OrgTechPhone: +443308081648
OrgTechEmail: support@cdn77.com
OrgTechRef: https://rdap.arin.net/registry/entity/PROCH16-ARIN
OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName: CDN77 NOC
OrgRoutingPhone: +443308081648
OrgRoutingEmail: network@cdn77.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CDNNO-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-9528300014
network:Network-Name:NET4-9528300014
network:IP-Network:149.40.48.0/20
network:Org-Name:Datacamp Limited
network:Street-Address:KLEYERSTRASSE 90
network:City:FRANKFURT
network:Country:DE
network:Postal-Code:60326
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-11-04 17:24:09
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.40.56.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.40.56.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111002 1800 900 604800 86400
;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 11 10:51:48 CST 2025
;; MSG SIZE rcvd: 105
b'20.56.40.149.in-addr.arpa domain name pointer unn-149-40-56-20.datapacket.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.56.40.149.in-addr.arpa name = unn-149-40-56-20.datapacket.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.172.163.162 | attackspam | Sep 15 04:27:31 instance-2 sshd[29024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.163.162 Sep 15 04:27:33 instance-2 sshd[29024]: Failed password for invalid user phpmyadmin from 167.172.163.162 port 43666 ssh2 Sep 15 04:31:38 instance-2 sshd[29173]: Failed password for root from 167.172.163.162 port 56506 ssh2 |
2020-09-15 16:18:04 |
| 112.226.75.155 | attackbotsspam | DATE:2020-09-14 18:57:02, IP:112.226.75.155, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-09-15 16:17:18 |
| 203.130.242.68 | attackbotsspam | 2020-09-15T14:38:55.141345hostname sshd[91843]: Invalid user jeff from 203.130.242.68 port 39297 ... |
2020-09-15 16:33:33 |
| 95.216.74.122 | attackspambots | Scanned 3 times in the last 24 hours on port 22 |
2020-09-15 16:29:07 |
| 156.203.63.205 | attack | Icarus honeypot on github |
2020-09-15 16:32:14 |
| 107.189.10.93 | attackspam | (sshd) Failed SSH login from 107.189.10.93 (US/United States/exit.tor.gg): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 02:24:58 optimus sshd[26997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.93 user=root Sep 15 02:25:00 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:02 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:06 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:08 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 |
2020-09-15 16:42:03 |
| 59.120.189.234 | attack | Sep 15 07:39:45 jumpserver sshd[42142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234 Sep 15 07:39:45 jumpserver sshd[42142]: Invalid user nora from 59.120.189.234 port 40216 Sep 15 07:39:46 jumpserver sshd[42142]: Failed password for invalid user nora from 59.120.189.234 port 40216 ssh2 ... |
2020-09-15 16:19:02 |
| 45.141.84.91 | attackspam | 2020-09-14T16:58:27Z - RDP login failed multiple times. (45.141.84.91) |
2020-09-15 16:24:49 |
| 222.186.180.17 | attackbotsspam | $f2bV_matches |
2020-09-15 16:33:07 |
| 46.101.19.133 | attackbots | 2020-09-15T08:04:30.591485abusebot-2.cloudsearch.cf sshd[17276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133 user=root 2020-09-15T08:04:31.891910abusebot-2.cloudsearch.cf sshd[17276]: Failed password for root from 46.101.19.133 port 43116 ssh2 2020-09-15T08:09:22.352298abusebot-2.cloudsearch.cf sshd[17424]: Invalid user ubian from 46.101.19.133 port 49605 2020-09-15T08:09:22.359130abusebot-2.cloudsearch.cf sshd[17424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133 2020-09-15T08:09:22.352298abusebot-2.cloudsearch.cf sshd[17424]: Invalid user ubian from 46.101.19.133 port 49605 2020-09-15T08:09:24.080678abusebot-2.cloudsearch.cf sshd[17424]: Failed password for invalid user ubian from 46.101.19.133 port 49605 ssh2 2020-09-15T08:13:56.511889abusebot-2.cloudsearch.cf sshd[17542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19. ... |
2020-09-15 16:20:31 |
| 51.178.55.56 | attack | $f2bV_matches |
2020-09-15 16:49:26 |
| 31.163.203.54 | attackspam | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-09-15 16:16:32 |
| 93.41.130.209 | attack | Sep 14 21:39:06 ift sshd\[16663\]: Invalid user pollinate from 93.41.130.209Sep 14 21:39:08 ift sshd\[16663\]: Failed password for invalid user pollinate from 93.41.130.209 port 45332 ssh2Sep 14 21:43:27 ift sshd\[17504\]: Failed password for root from 93.41.130.209 port 34092 ssh2Sep 14 21:47:43 ift sshd\[18139\]: Invalid user unithkd from 93.41.130.209Sep 14 21:47:45 ift sshd\[18139\]: Failed password for invalid user unithkd from 93.41.130.209 port 51090 ssh2 ... |
2020-09-15 16:38:45 |
| 51.83.69.142 | attack | 2020-09-15T03:45:16.7088791495-001 sshd[43479]: Invalid user gery from 51.83.69.142 port 50188 2020-09-15T03:45:18.1410991495-001 sshd[43479]: Failed password for invalid user gery from 51.83.69.142 port 50188 ssh2 2020-09-15T03:48:01.4435011495-001 sshd[43596]: Invalid user monitor from 51.83.69.142 port 44268 2020-09-15T03:48:01.4466501495-001 sshd[43596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.ip-51-83-69.eu 2020-09-15T03:48:01.4435011495-001 sshd[43596]: Invalid user monitor from 51.83.69.142 port 44268 2020-09-15T03:48:03.3092361495-001 sshd[43596]: Failed password for invalid user monitor from 51.83.69.142 port 44268 ssh2 ... |
2020-09-15 16:14:20 |
| 23.129.64.184 | attack | Sep 15 06:16:30 eventyay sshd[17464]: Failed password for root from 23.129.64.184 port 43573 ssh2 Sep 15 06:16:37 eventyay sshd[17464]: Failed password for root from 23.129.64.184 port 43573 ssh2 Sep 15 06:16:39 eventyay sshd[17464]: Failed password for root from 23.129.64.184 port 43573 ssh2 Sep 15 06:16:42 eventyay sshd[17464]: Failed password for root from 23.129.64.184 port 43573 ssh2 Sep 15 06:16:42 eventyay sshd[17464]: error: maximum authentication attempts exceeded for root from 23.129.64.184 port 43573 ssh2 [preauth] ... |
2020-09-15 16:23:59 |