City: Moca
Region: unknown
Country: Puerto Rico
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 162.244.16.0 - 162.244.19.255
CIDR: 162.244.16.0/22
NetName: SPEEDYNETPR
NetHandle: NET-162-244-16-0-1
Parent: NET162 (NET-162-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: SpeedyNet (WW)
RegDate: 2014-03-04
Updated: 2014-03-04
Comment: wmendez@speedynetpr.com
Ref: https://rdap.arin.net/registry/ip/162.244.16.0
OrgName: SpeedyNet
OrgId: WW
Address: Po Box 2624
City: Moca
StateProv: PR
PostalCode: 00676
Country: PR
RegDate: 2011-01-25
Updated: 2024-11-25
Comment: www.speedynetpr.com
Ref: https://rdap.arin.net/registry/entity/WW
OrgTechHandle: MENDE5-ARIN
OrgTechName: Mendez, Wilfredo
OrgTechPhone: +1-787-877-8042
OrgTechEmail: wmendez@speedynetpr.com
OrgTechRef: https://rdap.arin.net/registry/entity/MENDE5-ARIN
OrgAbuseHandle: MENDE176-ARIN
OrgAbuseName: Mendez, Wilfredo
OrgAbusePhone: +1-939-218-7885
OrgAbuseEmail: abuse@speedynetpr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MENDE176-ARIN
OrgNOCHandle: MENDE5-ARIN
OrgNOCName: Mendez, Wilfredo
OrgNOCPhone: +1-787-877-8042
OrgNOCEmail: wmendez@speedynetpr.com
OrgNOCRef: https://rdap.arin.net/registry/entity/MENDE5-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.244.18.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.244.18.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040700 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 01:30:10 CST 2026
;; MSG SIZE rcvd: 106
b'Host 91.18.244.162.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 91.18.244.162.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.254.184.162 | attack | Honeypot attack, port: 445, PTR: 162-184-254-113-on-nets.com. |
2020-04-30 16:45:45 |
| 101.81.250.223 | attack | Brute force blocker - service: proftpd1 - aantal: 85 - Wed Jun 13 02:40:15 2018 |
2020-04-30 16:49:30 |
| 165.22.35.107 | attack | Apr 30 01:25:36 mail sshd\[44237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.35.107 user=root ... |
2020-04-30 16:34:22 |
| 191.253.0.146 | attack | Automatic report - Port Scan Attack |
2020-04-30 16:18:46 |
| 5.9.71.56 | attackbotsspam | [portscan] Port scan |
2020-04-30 16:44:49 |
| 115.79.35.110 | attack | Apr 29 19:36:24 kapalua sshd\[12701\]: Invalid user test1 from 115.79.35.110 Apr 29 19:36:24 kapalua sshd\[12701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.35.110 Apr 29 19:36:26 kapalua sshd\[12701\]: Failed password for invalid user test1 from 115.79.35.110 port 45153 ssh2 Apr 29 19:41:12 kapalua sshd\[13243\]: Invalid user magento from 115.79.35.110 Apr 29 19:41:12 kapalua sshd\[13243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.35.110 |
2020-04-30 16:21:58 |
| 114.95.102.237 | attackspambots | Brute force blocker - service: proftpd1 - aantal: 122 - Thu Jun 14 23:00:19 2018 |
2020-04-30 16:16:08 |
| 181.123.177.150 | attackspam | Invalid user gong from 181.123.177.150 port 2151 |
2020-04-30 16:31:22 |
| 222.186.30.167 | attackbotsspam | Apr 30 10:10:26 vps sshd[82056]: Failed password for root from 222.186.30.167 port 13231 ssh2 Apr 30 10:10:29 vps sshd[82056]: Failed password for root from 222.186.30.167 port 13231 ssh2 Apr 30 10:10:30 vps sshd[82565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root Apr 30 10:10:33 vps sshd[82565]: Failed password for root from 222.186.30.167 port 32616 ssh2 Apr 30 10:10:35 vps sshd[82565]: Failed password for root from 222.186.30.167 port 32616 ssh2 ... |
2020-04-30 16:13:53 |
| 221.227.108.115 | attackbotsspam | lfd: (smtpauth) Failed SMTP AUTH login from 221.227.108.115 (-): 5 in the last 3600 secs - Wed Jun 13 12:32:56 2018 |
2020-04-30 16:33:23 |
| 72.13.134.3 | attack | RDP Brute-Force (honeypot 11) |
2020-04-30 16:24:34 |
| 114.224.29.98 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 114.224.29.98 (-): 5 in the last 3600 secs - Wed Jun 13 13:15:31 2018 |
2020-04-30 16:32:03 |
| 60.20.64.28 | attack | Brute force blocker - service: proftpd1, proftpd2 - aantal: 65 - Thu Jun 14 08:25:16 2018 |
2020-04-30 16:18:28 |
| 81.128.171.59 | attack | RDP Brute-Force (honeypot 8) |
2020-04-30 16:22:40 |
| 223.243.124.173 | attackspam | Brute force blocker - service: proftpd1 - aantal: 155 - Tue Jun 12 09:25:18 2018 |
2020-04-30 16:49:49 |