City: McAllen
Region: Texas
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 162.224.0.0 - 162.239.255.255
CIDR: 162.224.0.0/12
NetName: SIS-80-5-10-2013
NetHandle: NET-162-224-0-0-1
Parent: NET162 (NET-162-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AT&T Enterprises, LLC (AEL-360)
RegDate: 2013-05-21
Updated: 2024-12-05
Ref: https://rdap.arin.net/registry/ip/162.224.0.0
OrgName: AT&T Enterprises, LLC
OrgId: AEL-360
Address: 208 S. Akard St.
City: Dallas
StateProv: TX
PostalCode: 75202
Country: US
RegDate: 2024-11-22
Updated: 2025-10-29
Ref: https://rdap.arin.net/registry/entity/AEL-360
OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName: Routing POC
OrgRoutingPhone: +1-999-999-9999
OrgRoutingEmail: DL-routing_poc@att.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI59-ARIN
OrgTechHandle: ICC-ARIN
OrgTechName: IP Team
OrgTechPhone: +1-888-876-2382
OrgTechEmail: rm-ipspecialist@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ICC-ARIN
OrgTechHandle: ZS44-ARIN
OrgTechName: IPAdmin-ATT Internet Services
OrgTechPhone: +1-888-510-5545
OrgTechEmail: ipadmin@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZS44-ARIN
OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-919-319-8167
OrgAbuseEmail: abuse@att.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.229.3.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.229.3.83. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121000 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 16:39:31 CST 2025
;; MSG SIZE rcvd: 105
83.3.229.162.in-addr.arpa domain name pointer 162-229-3-83.lightspeed.snantx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
83.3.229.162.in-addr.arpa name = 162-229-3-83.lightspeed.snantx.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.67.206.115 | attackbotsspam | $f2bV_matches |
2020-07-19 18:02:39 |
| 106.13.86.54 | attackbotsspam | Jul 19 10:44:15 piServer sshd[4481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.54 Jul 19 10:44:17 piServer sshd[4481]: Failed password for invalid user justin from 106.13.86.54 port 54772 ssh2 Jul 19 10:48:42 piServer sshd[4765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.54 ... |
2020-07-19 17:53:02 |
| 132.145.216.7 | attackspam | 2020-07-19T10:12:52.481547abusebot-4.cloudsearch.cf sshd[20531]: Invalid user gerrit from 132.145.216.7 port 48598 2020-07-19T10:12:52.489866abusebot-4.cloudsearch.cf sshd[20531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.216.7 2020-07-19T10:12:52.481547abusebot-4.cloudsearch.cf sshd[20531]: Invalid user gerrit from 132.145.216.7 port 48598 2020-07-19T10:12:54.327835abusebot-4.cloudsearch.cf sshd[20531]: Failed password for invalid user gerrit from 132.145.216.7 port 48598 ssh2 2020-07-19T10:21:35.206648abusebot-4.cloudsearch.cf sshd[20598]: Invalid user Test from 132.145.216.7 port 34002 2020-07-19T10:21:35.215325abusebot-4.cloudsearch.cf sshd[20598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.216.7 2020-07-19T10:21:35.206648abusebot-4.cloudsearch.cf sshd[20598]: Invalid user Test from 132.145.216.7 port 34002 2020-07-19T10:21:36.852398abusebot-4.cloudsearch.cf sshd[20598]: Faile ... |
2020-07-19 18:24:39 |
| 66.18.72.122 | attackspambots | Jul 19 09:53:32 vmd17057 sshd[12208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.18.72.122 Jul 19 09:53:34 vmd17057 sshd[12208]: Failed password for invalid user jhonatan from 66.18.72.122 port 56096 ssh2 ... |
2020-07-19 18:19:45 |
| 112.85.42.200 | attackbotsspam | $f2bV_matches |
2020-07-19 18:05:45 |
| 46.101.236.221 | attackbotsspam | 46.101.236.221 - - \[19/Jul/2020:10:40:47 +0200\] "POST /wp-login.php HTTP/1.0" 200 5924 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 46.101.236.221 - - \[19/Jul/2020:10:40:48 +0200\] "POST /wp-login.php HTTP/1.0" 200 5737 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 46.101.236.221 - - \[19/Jul/2020:10:40:49 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-07-19 18:05:03 |
| 101.78.3.29 | attackbots | Jul 19 09:48:49 vps687878 sshd\[17904\]: Failed password for invalid user silvano from 101.78.3.29 port 48426 ssh2 Jul 19 09:50:55 vps687878 sshd\[18094\]: Invalid user david from 101.78.3.29 port 39756 Jul 19 09:50:55 vps687878 sshd\[18094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.3.29 Jul 19 09:50:57 vps687878 sshd\[18094\]: Failed password for invalid user david from 101.78.3.29 port 39756 ssh2 Jul 19 09:53:16 vps687878 sshd\[18395\]: Invalid user eva from 101.78.3.29 port 59320 Jul 19 09:53:16 vps687878 sshd\[18395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.3.29 ... |
2020-07-19 17:55:53 |
| 87.251.74.30 | attackspambots | 2020-07-18 UTC: (56x) - admin(2x),root(52x),user(2x) |
2020-07-19 18:23:54 |
| 35.196.27.1 | attackspam | *Port Scan* detected from 35.196.27.1 (US/United States/South Carolina/North Charleston/1.27.196.35.bc.googleusercontent.com). 4 hits in the last 210 seconds |
2020-07-19 18:11:40 |
| 43.229.153.76 | attack | 2020-07-19T07:43:27.267217abusebot-5.cloudsearch.cf sshd[10166]: Invalid user deploy from 43.229.153.76 port 43120 2020-07-19T07:43:27.271420abusebot-5.cloudsearch.cf sshd[10166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.76 2020-07-19T07:43:27.267217abusebot-5.cloudsearch.cf sshd[10166]: Invalid user deploy from 43.229.153.76 port 43120 2020-07-19T07:43:29.371308abusebot-5.cloudsearch.cf sshd[10166]: Failed password for invalid user deploy from 43.229.153.76 port 43120 ssh2 2020-07-19T07:53:17.858935abusebot-5.cloudsearch.cf sshd[10175]: Invalid user qun from 43.229.153.76 port 57168 2020-07-19T07:53:17.864756abusebot-5.cloudsearch.cf sshd[10175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.76 2020-07-19T07:53:17.858935abusebot-5.cloudsearch.cf sshd[10175]: Invalid user qun from 43.229.153.76 port 57168 2020-07-19T07:53:19.959789abusebot-5.cloudsearch.cf sshd[10175]: Failed ... |
2020-07-19 18:30:25 |
| 211.90.39.117 | attack | $f2bV_matches |
2020-07-19 18:11:57 |
| 51.158.98.224 | attack | Jul 19 11:42:06 server sshd[1062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.98.224 Jul 19 11:42:08 server sshd[1062]: Failed password for invalid user sophia from 51.158.98.224 port 37012 ssh2 Jul 19 11:46:05 server sshd[1463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.98.224 ... |
2020-07-19 17:54:59 |
| 116.21.205.0 | attack | DATE:2020-07-19 09:53:24, IP:116.21.205.0, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-07-19 18:25:01 |
| 190.143.39.211 | attackspambots | Jul 19 11:13:45 sso sshd[27787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211 Jul 19 11:13:47 sso sshd[27787]: Failed password for invalid user jeff from 190.143.39.211 port 47908 ssh2 ... |
2020-07-19 18:01:21 |
| 63.250.33.58 | attackbotsspam | Jul 19 10:09:29 dev0-dcde-rnet sshd[26798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.250.33.58 Jul 19 10:09:31 dev0-dcde-rnet sshd[26798]: Failed password for invalid user kmk from 63.250.33.58 port 56576 ssh2 Jul 19 10:13:13 dev0-dcde-rnet sshd[26930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.250.33.58 |
2020-07-19 18:03:02 |