City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.0.0.0 - 150.255.255.255'
% Abuse contact for '150.0.0.0 - 150.255.255.255' is 'helpdesk@apnic.net'
inetnum: 150.0.0.0 - 150.255.255.255
netname: ERX-NETBLOCK
descr: Early registration addresses
remarks: ------------------------------------------------------
remarks: Important:
remarks:
remarks: Networks in this range were allocated by InterNIC
remarks: prior to the formation of Regional Internet
remarks: Registries (RIRs): AfriNIC, APNIC, ARIN, LACNIC and RIPE NCC.
remarks:
remarks: Address ranges from this historical space have now
remarks: been transferred to the appropriate RIR database.remarks:
remarks: If your search has returned this record, it means the
remarks: address range is not administered by APNIC.
remarks:
remarks: Instead, please search one of the following databases:
remarks:
remarks: - AfriNIC (Africa)
remarks: website: http://www.afrinic.net/
remarks: command line: whois.afrinic.net
remarks:
remarks: - ARIN (Northern America)
remarks: website: http://www.arin.net/
remarks: command line: whois.arin.net
remarks:
remarks: - LACNIC (Latin America and the Carribean)
remarks: website: http://www.lacnic.net/
remarks: command line: whois.lacnic.net
remarks:
remarks: - RIPE NCC (Europe)
remarks: website: http://www.ripe.net/
remarks: command line: whois.ripe.net
remarks:
remarks: For information on the Early Registration Transfer
remarks: (ERX) project, see:
remarks:
remarks: http://www.apnic.net/db/erx
remarks:
remarks: ------------------------------------------------------
country: AU
admin-c: IANA1-AP
tech-c: IANA1-AP
mnt-by: APNIC-HM
mnt-lower: APNIC-HM
status: ALLOCATED PORTABLE
last-modified: 2015-08-28T00:31:15Z
source: APNIC
mnt-irt: IRT-APNIC-AP
irt: IRT-APNIC-AP
address: Brisbane, Australia
e-mail: helpdesk@apnic.net
abuse-mailbox: helpdesk@apnic.net
admin-c: HM20-AP
tech-c: NO4-AP
auth: # Filtered
remarks: APNIC is a Regional Internet Registry.
remarks: We do not operate the referring network and
remarks: are unable to investigate complaints of network abuse.
remarks: For information about IRT, see www.apnic.net/irt
remarks: helpdesk@apnic.net was validated on 2020-02-03
mnt-by: APNIC-HM
last-modified: 2023-08-18T00:42:38Z
source: APNIC
role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-AP
tech-c: IANA1-AP
nic-hdl: IANA1-AP
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: MAINT-APNIC-AP
last-modified: 2018-06-22T22:34:30Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.241.185.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.241.185.17. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101200 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 12 20:42:41 CST 2025
;; MSG SIZE rcvd: 107
Host 17.185.241.150.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 150.241.185.17.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
111.231.66.135 | attack | Nov 23 05:46:41 MK-Soft-Root1 sshd[4696]: Failed password for root from 111.231.66.135 port 49284 ssh2 ... |
2019-11-23 13:07:09 |
37.187.54.67 | attack | 2019-11-22T17:51:22.483218homeassistant sshd[8080]: Failed password for invalid user gurmeet from 37.187.54.67 port 53864 ssh2 2019-11-22T22:53:20.776561homeassistant sshd[888]: Invalid user ivan from 37.187.54.67 port 39948 2019-11-22T22:53:20.782860homeassistant sshd[888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.67 ... |
2019-11-23 09:13:54 |
110.10.174.179 | attackbotsspam | Nov 23 02:05:00 vps647732 sshd[11214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.10.174.179 Nov 23 02:05:02 vps647732 sshd[11214]: Failed password for invalid user webmaster from 110.10.174.179 port 33663 ssh2 ... |
2019-11-23 09:17:44 |
113.110.47.33 | attackspambots | badbot |
2019-11-23 09:12:02 |
46.105.122.62 | attack | Nov 22 23:52:47 vmd17057 sshd\[12798\]: Invalid user zabbix from 46.105.122.62 port 48042 Nov 22 23:52:47 vmd17057 sshd\[12798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.122.62 Nov 22 23:52:50 vmd17057 sshd\[12798\]: Failed password for invalid user zabbix from 46.105.122.62 port 48042 ssh2 ... |
2019-11-23 09:30:39 |
92.246.76.194 | attackbots | 11/22/2019-19:20:48.738466 92.246.76.194 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-23 09:21:41 |
116.66.239.146 | attack | " " |
2019-11-23 09:21:10 |
185.142.236.35 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-23 13:17:24 |
5.39.92.185 | attackbotsspam | Nov 22 20:04:02 linuxvps sshd\[42297\]: Invalid user lurch from 5.39.92.185 Nov 22 20:04:02 linuxvps sshd\[42297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.92.185 Nov 22 20:04:03 linuxvps sshd\[42297\]: Failed password for invalid user lurch from 5.39.92.185 port 35320 ssh2 Nov 22 20:07:41 linuxvps sshd\[44600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.92.185 user=root Nov 22 20:07:43 linuxvps sshd\[44600\]: Failed password for root from 5.39.92.185 port 53133 ssh2 |
2019-11-23 09:14:10 |
183.209.114.177 | attackspambots | badbot |
2019-11-23 09:19:26 |
148.70.59.222 | attackspambots | 5x Failed Password |
2019-11-23 13:17:51 |
222.186.180.17 | attackspam | Nov 23 02:07:30 mail sshd[8964]: Failed password for root from 222.186.180.17 port 24728 ssh2 Nov 23 02:07:33 mail sshd[8964]: Failed password for root from 222.186.180.17 port 24728 ssh2 Nov 23 02:07:38 mail sshd[8964]: Failed password for root from 222.186.180.17 port 24728 ssh2 Nov 23 02:07:41 mail sshd[8964]: Failed password for root from 222.186.180.17 port 24728 ssh2 |
2019-11-23 09:25:42 |
111.231.59.116 | attackbots | Nov 19 05:18:44 minden010 sshd[5351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.59.116 Nov 19 05:18:45 minden010 sshd[5351]: Failed password for invalid user ts3server from 111.231.59.116 port 49472 ssh2 Nov 19 05:22:56 minden010 sshd[6739]: Failed password for r.r from 111.231.59.116 port 56786 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=111.231.59.116 |
2019-11-23 09:23:44 |
115.61.240.172 | attackspambots | Wordpress login attempts |
2019-11-23 13:13:40 |
121.23.223.65 | attackspambots | badbot |
2019-11-23 09:20:45 |