City: Seattle
Region: Washington
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.110.0.0 - 164.110.255.255
CIDR: 164.110.0.0/16
NetName: WASHINGTON-STATE-DEPARTMENT-OF-TRANSPORTATION
NetHandle: NET-164-110-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Washington State Department of Transportation (WSDT)
RegDate: 1993-02-19
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/164.110.0.0
OrgName: Washington State Department of Transportation
OrgId: WSDT
Address: 7345 Linderson Way SW
City: Tumwater
StateProv: WA
PostalCode: 98501
Country: US
RegDate: 1993-02-19
Updated: 2024-03-01
Ref: https://rdap.arin.net/registry/entity/WSDT
OrgTechHandle: MIDKI5-ARIN
OrgTechName: Midkiff, Janae
OrgTechPhone: +1-360-705-7606
OrgTechEmail: midkifj@wsdot.wa.gov
OrgTechRef: https://rdap.arin.net/registry/entity/MIDKI5-ARIN
OrgTechHandle: DARBY32-ARIN
OrgTechName: Darby, Glenn
OrgTechPhone: +1-360-705-7171
OrgTechEmail: darbyg@wsdot.wa.gov
OrgTechRef: https://rdap.arin.net/registry/entity/DARBY32-ARIN
OrgAbuseHandle: SECUR188-ARIN
OrgAbuseName: Security
OrgAbusePhone: +1-360-705-7681
OrgAbuseEmail: ipabuse@wsdot.wa.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/SECUR188-ARIN
OrgAbuseHandle: DARBY32-ARIN
OrgAbuseName: Darby, Glenn
OrgAbusePhone: +1-360-705-7171
OrgAbuseEmail: darbyg@wsdot.wa.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/DARBY32-ARIN
OrgAbuseHandle: MIDKI5-ARIN
OrgAbuseName: Midkiff, Janae
OrgAbusePhone: +1-360-705-7606
OrgAbuseEmail: midkifj@wsdot.wa.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/MIDKI5-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.110.75.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.110.75.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 02:53:57 CST 2026
;; MSG SIZE rcvd: 107
Host 136.75.110.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 136.75.110.164.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 2.185.144.60 | attack | Automatic report - Port Scan Attack |
2019-11-29 06:26:23 |
| 61.157.78.136 | attack | Port scan on 9 port(s): 8884 8885 8887 8888 8889 8890 8892 8896 8899 |
2019-11-29 07:01:36 |
| 185.220.101.49 | attack | Automatic report - Banned IP Access |
2019-11-29 06:36:42 |
| 101.91.160.243 | attackspambots | Nov 28 23:44:12 tux-35-217 sshd\[30278\]: Invalid user 99999999 from 101.91.160.243 port 48846 Nov 28 23:44:12 tux-35-217 sshd\[30278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243 Nov 28 23:44:15 tux-35-217 sshd\[30278\]: Failed password for invalid user 99999999 from 101.91.160.243 port 48846 ssh2 Nov 28 23:47:27 tux-35-217 sshd\[30299\]: Invalid user password666 from 101.91.160.243 port 53842 Nov 28 23:47:27 tux-35-217 sshd\[30299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243 ... |
2019-11-29 07:03:27 |
| 106.13.181.147 | attackspam | Nov 29 02:43:40 microserver sshd[65089]: Invalid user davida from 106.13.181.147 port 42400 Nov 29 02:43:40 microserver sshd[65089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.147 Nov 29 02:43:42 microserver sshd[65089]: Failed password for invalid user davida from 106.13.181.147 port 42400 ssh2 Nov 29 02:47:46 microserver sshd[1132]: Invalid user kash from 106.13.181.147 port 47608 Nov 29 02:47:46 microserver sshd[1132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.147 |
2019-11-29 06:56:14 |
| 159.89.115.126 | attackbotsspam | Nov 29 04:11:45 vibhu-HP-Z238-Microtower-Workstation sshd\[6803\]: Invalid user kollman from 159.89.115.126 Nov 29 04:11:45 vibhu-HP-Z238-Microtower-Workstation sshd\[6803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126 Nov 29 04:11:47 vibhu-HP-Z238-Microtower-Workstation sshd\[6803\]: Failed password for invalid user kollman from 159.89.115.126 port 45514 ssh2 Nov 29 04:17:49 vibhu-HP-Z238-Microtower-Workstation sshd\[7122\]: Invalid user apache from 159.89.115.126 Nov 29 04:17:49 vibhu-HP-Z238-Microtower-Workstation sshd\[7122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126 ... |
2019-11-29 06:54:05 |
| 178.62.180.164 | attackspambots | 178.62.180.164 - - \[28/Nov/2019:20:10:46 +0100\] "POST /wp-login.php HTTP/1.0" 200 7538 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 178.62.180.164 - - \[28/Nov/2019:20:10:52 +0100\] "POST /wp-login.php HTTP/1.0" 200 7363 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 178.62.180.164 - - \[28/Nov/2019:20:10:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 7358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-29 06:36:07 |
| 122.226.129.25 | attackbotsspam | Brute force attempt |
2019-11-29 06:41:42 |
| 92.46.40.110 | attackbotsspam | Nov 29 00:47:52 sauna sshd[80557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.40.110 Nov 29 00:47:54 sauna sshd[80557]: Failed password for invalid user chuck from 92.46.40.110 port 37878 ssh2 ... |
2019-11-29 06:51:40 |
| 185.220.101.29 | attackspambots | Automatic report - Banned IP Access |
2019-11-29 06:37:09 |
| 35.230.91.250 | attack | xmlrpc attack |
2019-11-29 06:26:10 |
| 166.111.152.230 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-11-29 06:59:54 |
| 176.58.150.121 | attack | " " |
2019-11-29 06:32:11 |
| 172.105.89.161 | attackbotsspam | 11/28/2019-16:51:54.331913 172.105.89.161 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-29 06:25:35 |
| 81.22.45.85 | attackbotsspam | 11/28/2019-17:35:54.150372 81.22.45.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-29 06:42:27 |