City: Union
Region: Kentucky
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 161.155.0.0 - 161.155.255.255
CIDR: 161.155.0.0/16
NetName: CBTWAN
NetHandle: NET-161-155-0-0-1
Parent: NET161 (NET-161-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cincinnati Bell Telephone Company LLC (CBTL-6)
RegDate: 1992-12-21
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/161.155.0.0
OrgName: Cincinnati Bell Telephone Company LLC
OrgId: CBTL-6
Address: 221 East Fourth Street
City: Cincinnati
StateProv: OH
PostalCode: 45202
Country: US
RegDate: 2016-09-26
Updated: 2023-07-09
Ref: https://rdap.arin.net/registry/entity/CBTL-6
OrgAbuseHandle: TJB34-ARIN
OrgAbuseName: Beck, Timothy J.
OrgAbusePhone: +1-513-397-6758
OrgAbuseEmail: Tim.Beck@Cinbell.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/TJB34-ARIN
OrgTechHandle: TJB40-ARIN
OrgTechName: Baumgartner, Todd J
OrgTechPhone: +1-513-397-5636
OrgTechEmail: toddb@fuse.net
OrgTechRef: https://rdap.arin.net/registry/entity/TJB40-ARIN
OrgTechHandle: ELSEA-ARIN
OrgTechName: Elsea, Mike
OrgTechPhone: +1-513-397-5236
OrgTechEmail: mike.elsea@cinbell.com
OrgTechRef: https://rdap.arin.net/registry/entity/ELSEA-ARIN
OrgTechHandle: KISSI4-ARIN
OrgTechName: Kissinger, Tom
OrgTechPhone: +1-513-397-5292
OrgTechEmail: tom.kissinger@altafiber.com
OrgTechRef: https://rdap.arin.net/registry/entity/KISSI4-ARIN
OrgTechHandle: GSP36-ARIN
OrgTechName: Pennington, Gregory Scott
OrgTechPhone: +1-513-608-7516
OrgTechEmail: scott.pennington@cinbell.com
OrgTechRef: https://rdap.arin.net/registry/entity/GSP36-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.155.147.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.155.147.202. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 22:51:53 CST 2026
;; MSG SIZE rcvd: 108
Host 202.147.155.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 202.147.155.161.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.252.214.144 | attack | Unauthorized connection attempt from IP address 222.252.214.144 on Port 445(SMB) |
2020-01-08 19:02:19 |
| 69.94.156.6 | attackbots | Jan 8 05:47:09 grey postfix/smtpd\[27038\]: NOQUEUE: reject: RCPT from dust.nabhaa.com\[69.94.156.6\]: 554 5.7.1 Service unavailable\; Client host \[69.94.156.6\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.156.6\]\; from=\ |
2020-01-08 19:06:45 |
| 14.173.195.82 | attack | Unauthorized connection attempt detected from IP address 14.173.195.82 to port 445 |
2020-01-08 19:22:36 |
| 180.246.151.247 | attackspam | 1578458819 - 01/08/2020 05:46:59 Host: 180.246.151.247/180.246.151.247 Port: 445 TCP Blocked |
2020-01-08 19:13:51 |
| 183.83.145.240 | attackbots | Unauthorized connection attempt from IP address 183.83.145.240 on Port 445(SMB) |
2020-01-08 19:39:34 |
| 203.113.130.198 | attackbots | $f2bV_matches |
2020-01-08 19:18:32 |
| 113.179.112.63 | attack | Unauthorized connection attempt from IP address 113.179.112.63 on Port 445(SMB) |
2020-01-08 19:28:41 |
| 78.100.18.81 | attack | SSH Brute Force |
2020-01-08 19:21:15 |
| 200.85.4.121 | attackspambots | Unauthorized connection attempt detected from IP address 200.85.4.121 to port 2220 [J] |
2020-01-08 19:15:30 |
| 117.31.76.86 | attackspam | 2020-01-07 22:46:53 dovecot_login authenticator failed for (nezbv) [117.31.76.86]:58890 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liutingting@lerctr.org) 2020-01-07 22:47:01 dovecot_login authenticator failed for (tdbrb) [117.31.76.86]:58890 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liutingting@lerctr.org) 2020-01-07 22:47:13 dovecot_login authenticator failed for (jdycy) [117.31.76.86]:58890 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liutingting@lerctr.org) ... |
2020-01-08 19:04:31 |
| 182.188.46.92 | attack | Automatic report - Port Scan Attack |
2020-01-08 19:16:54 |
| 80.82.77.33 | attack | IP daily and all day long attempting intrusion connection on multiple ports. |
2020-01-08 19:36:09 |
| 176.222.157.244 | attackspambots | Unauthorized connection attempt from IP address 176.222.157.244 on Port 445(SMB) |
2020-01-08 19:29:30 |
| 80.82.77.85 | attack | IP daily and all day long attempting intrusion connection on multiple ports. |
2020-01-08 19:36:02 |
| 41.41.241.234 | attack | unauthorized connection attempt |
2020-01-08 19:05:57 |