City: Wittenberg
Region: Wisconsin
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 158.247.10.0 - 158.247.11.255
CIDR: 158.247.10.0/23
NetName: WITTE-1
NetHandle: NET-158-247-10-0-1
Parent: NET158 (NET-158-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Wittenberg Telephone Company (WITTE-1)
RegDate: 2020-04-02
Updated: 2020-04-02
Ref: https://rdap.arin.net/registry/ip/158.247.10.0
OrgName: Wittenberg Telephone Company
OrgId: WITTE-1
Address: 104 West Walker Street
Address: P.O. Box 160
City: Wittenberg
StateProv: WI
PostalCode: 54499
Country: US
RegDate: 2010-06-14
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/WITTE-1
OrgAbuseHandle: HANSE230-ARIN
OrgAbuseName: Hansen, Trent
OrgAbusePhone: +1-715-253-2111
OrgAbuseEmail: trent@wittelco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/HANSE230-ARIN
OrgRoutingHandle: ADAMI5-ARIN
OrgRoutingName: Adam Igl
OrgRoutingPhone: +1-715-216-0182
OrgRoutingEmail: adam@cirrinity.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/ADAMI5-ARIN
OrgDNSHandle: ADAMI5-ARIN
OrgDNSName: Adam Igl
OrgDNSPhone: +1-715-216-0182
OrgDNSEmail: adam@cirrinity.net
OrgDNSRef: https://rdap.arin.net/registry/entity/ADAMI5-ARIN
OrgTechHandle: HANSE230-ARIN
OrgTechName: Hansen, Trent
OrgTechPhone: +1-715-253-2111
OrgTechEmail: trent@wittelco.com
OrgTechRef: https://rdap.arin.net/registry/entity/HANSE230-ARIN
OrgNOCHandle: HANSE230-ARIN
OrgNOCName: Hansen, Trent
OrgNOCPhone: +1-715-253-2111
OrgNOCEmail: trent@wittelco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/HANSE230-ARIN
OrgTechHandle: ADAMI5-ARIN
OrgTechName: Adam Igl
OrgTechPhone: +1-715-216-0182
OrgTechEmail: adam@cirrinity.net
OrgTechRef: https://rdap.arin.net/registry/entity/ADAMI5-ARIN
OrgAbuseHandle: ADAMI5-ARIN
OrgAbuseName: Adam Igl
OrgAbusePhone: +1-715-216-0182
OrgAbuseEmail: adam@cirrinity.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ADAMI5-ARIN
OrgTechHandle: VNC2-ARIN
OrgTechName: VantagePoint Networking Consultants
OrgTechPhone: +1-605-995-1777
OrgTechEmail: arin@vantagepnt.com
OrgTechRef: https://rdap.arin.net/registry/entity/VNC2-ARIN
OrgNOCHandle: ADAMI5-ARIN
OrgNOCName: Adam Igl
OrgNOCPhone: +1-715-216-0182
OrgNOCEmail: adam@cirrinity.net
OrgNOCRef: https://rdap.arin.net/registry/entity/ADAMI5-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.247.10.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.247.10.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030901 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 09:00:49 CST 2026
;; MSG SIZE rcvd: 106
Host 41.10.247.158.in-addr.arpa not found: 2(SERVFAIL)
server can't find 158.247.10.41.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.252.25.186 | attackspambots | $f2bV_matches |
2020-05-10 18:43:28 |
| 129.204.3.6 | attack | trying to access non-authorized port |
2020-05-10 18:51:34 |
| 51.254.32.102 | attackspam | 5x Failed Password |
2020-05-10 18:23:26 |
| 133.242.53.108 | attackbotsspam | May 10 07:12:42 vps639187 sshd\[15951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.53.108 user=root May 10 07:12:44 vps639187 sshd\[15951\]: Failed password for root from 133.242.53.108 port 35493 ssh2 May 10 07:15:06 vps639187 sshd\[15994\]: Invalid user rancid from 133.242.53.108 port 55101 May 10 07:15:06 vps639187 sshd\[15994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.53.108 ... |
2020-05-10 18:41:20 |
| 14.243.167.40 | attackbotsspam | (ftpd) Failed FTP login from 14.243.167.40 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs |
2020-05-10 18:24:41 |
| 115.79.196.85 | attackspam | 2,20-01/01 [bc01/m69] PostRequest-Spammer scoring: lisboa |
2020-05-10 18:41:06 |
| 129.158.110.47 | attack | 1589082509 - 05/10/2020 05:48:29 Host: 129.158.110.47/129.158.110.47 Port: 22 TCP Blocked |
2020-05-10 18:28:48 |
| 106.53.12.243 | attack | May 10 09:41:05 mail sshd\[5812\]: Invalid user mu from 106.53.12.243 May 10 09:41:05 mail sshd\[5812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.12.243 May 10 09:41:07 mail sshd\[5812\]: Failed password for invalid user mu from 106.53.12.243 port 56612 ssh2 ... |
2020-05-10 18:57:14 |
| 165.22.63.73 | attackspam | May 10 12:06:23 legacy sshd[18311]: Failed password for root from 165.22.63.73 port 52510 ssh2 May 10 12:09:07 legacy sshd[18375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.73 May 10 12:09:09 legacy sshd[18375]: Failed password for invalid user guest from 165.22.63.73 port 60704 ssh2 ... |
2020-05-10 18:28:18 |
| 128.199.220.207 | attackspam | 2020-05-10T05:54:29.414737shield sshd\[4672\]: Invalid user beth from 128.199.220.207 port 48766 2020-05-10T05:54:29.418098shield sshd\[4672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 2020-05-10T05:54:31.231575shield sshd\[4672\]: Failed password for invalid user beth from 128.199.220.207 port 48766 ssh2 2020-05-10T05:58:58.542352shield sshd\[6999\]: Invalid user admin from 128.199.220.207 port 57018 2020-05-10T05:58:58.546155shield sshd\[6999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 |
2020-05-10 18:52:33 |
| 80.14.99.14 | attack | May 10 10:49:13 xeon sshd[40576]: Failed password for invalid user thailand from 80.14.99.14 port 57426 ssh2 |
2020-05-10 18:52:04 |
| 119.252.173.122 | attackspambots | 20/5/9@23:48:10: FAIL: IoT-SSH address from=119.252.173.122 ... |
2020-05-10 18:45:22 |
| 165.227.206.220 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-05-10 18:59:32 |
| 41.77.8.75 | attackbots | May 10 05:48:28 ArkNodeAT sshd\[7028\]: Invalid user nagesh from 41.77.8.75 May 10 05:48:28 ArkNodeAT sshd\[7028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.8.75 May 10 05:48:29 ArkNodeAT sshd\[7028\]: Failed password for invalid user nagesh from 41.77.8.75 port 61596 ssh2 |
2020-05-10 18:29:08 |
| 178.62.186.49 | attackbotsspam | odoo8 ... |
2020-05-10 19:01:39 |