City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 169.242.0.0 - 169.242.255.255
CIDR: 169.242.0.0/16
NetName: BAC-169-242-0-0-1
NetHandle: NET-169-242-0-0-1
Parent: NET169 (NET-169-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Bank of America, National Association (BANKOF-2)
RegDate: 1995-10-05
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/169.242.0.0
OrgName: Bank of America, National Association
OrgId: BANKOF-2
Address: Bank of America Corporation
Address: 100 North Tryon Street
City: Charlotte
StateProv: NC
PostalCode: 28255
Country: US
RegDate: 1992-01-06
Updated: 2024-11-25
Comment: For abuse issues contact abuse@bankofamerica.com
Ref: https://rdap.arin.net/registry/entity/BANKOF-2
OrgAbuseHandle: ABUSE608-ARIN
OrgAbuseName: ABUSE
OrgAbusePhone: +1-704-386-5000
OrgAbuseEmail: ABUSE@bankofamerica.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE608-ARIN
OrgTechHandle: ZB29-ARIN
OrgTechName: HOSTMASTER
OrgTechPhone: +1-563-549-8798
OrgTechEmail: patrick.ohagerty@bofa.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZB29-ARIN
OrgTechHandle: LAU-ARIN
OrgTechName: Uribarri, Luis Alfonso
OrgTechPhone: +1-646-556-2742
OrgTechEmail: luis.a.uribarri@bofa.com
OrgTechRef: https://rdap.arin.net/registry/entity/LAU-ARIN
OrgTechHandle: SPD3-ARIN
OrgTechName: Dornan, Sean Patrick
OrgTechPhone: +1-586-273-1444
OrgTechEmail: sean.dornan@bofa.com
OrgTechRef: https://rdap.arin.net/registry/entity/SPD3-ARIN
OrgNOCHandle: ZB29-ARIN
OrgNOCName: HOSTMASTER
OrgNOCPhone: +1-563-549-8798
OrgNOCEmail: patrick.ohagerty@bofa.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZB29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.242.73.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.242.73.82. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 21:56:12 CST 2026
;; MSG SIZE rcvd: 106
b'Host 82.73.242.169.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 169.242.73.82.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.12.254.166 | attackspam | Honeypot attack, port: 5555, PTR: 46.12.254.166.dsl.dyn.forthnet.gr. |
2020-02-20 09:51:52 |
| 105.235.28.90 | attackspam | Feb 20 01:02:09 h1745522 sshd[18343]: Invalid user user from 105.235.28.90 port 42621 Feb 20 01:02:09 h1745522 sshd[18343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.28.90 Feb 20 01:02:09 h1745522 sshd[18343]: Invalid user user from 105.235.28.90 port 42621 Feb 20 01:02:11 h1745522 sshd[18343]: Failed password for invalid user user from 105.235.28.90 port 42621 ssh2 Feb 20 01:05:01 h1745522 sshd[29967]: Invalid user amandabackup from 105.235.28.90 port 54848 Feb 20 01:05:01 h1745522 sshd[29967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.28.90 Feb 20 01:05:01 h1745522 sshd[29967]: Invalid user amandabackup from 105.235.28.90 port 54848 Feb 20 01:05:03 h1745522 sshd[29967]: Failed password for invalid user amandabackup from 105.235.28.90 port 54848 ssh2 Feb 20 01:07:48 h1745522 sshd[14838]: Invalid user user from 105.235.28.90 port 38846 ... |
2020-02-20 09:29:28 |
| 91.215.88.171 | attack | Feb 20 01:54:37 |
2020-02-20 09:52:30 |
| 222.186.42.155 | attackspam | Feb 19 22:37:46 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2 Feb 19 22:37:48 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2 Feb 19 22:37:51 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2 ... |
2020-02-20 09:52:56 |
| 120.31.160.66 | attack | Honeypot attack, port: 445, PTR: ns1.eflydns.net. |
2020-02-20 09:53:21 |
| 43.249.224.149 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-20 09:48:00 |
| 43.248.123.33 | attackspambots | Automatic report - SSH Brute-Force Attack |
2020-02-20 09:24:15 |
| 78.160.33.166 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-20 09:32:32 |
| 178.169.87.223 | attack | Portscan detected |
2020-02-20 09:55:25 |
| 100.0.240.94 | attackbotsspam | Honeypot attack, port: 445, PTR: pool-100-0-240-94.bstnma.fios.verizon.net. |
2020-02-20 09:45:47 |
| 81.250.191.173 | attackbotsspam | Automatic report - Banned IP Access |
2020-02-20 09:19:56 |
| 218.149.221.136 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 09:37:30 |
| 119.27.166.181 | attackspam | Feb 20 02:15:20 sd-53420 sshd\[15157\]: Invalid user speech-dispatcher from 119.27.166.181 Feb 20 02:15:20 sd-53420 sshd\[15157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.166.181 Feb 20 02:15:22 sd-53420 sshd\[15157\]: Failed password for invalid user speech-dispatcher from 119.27.166.181 port 51852 ssh2 Feb 20 02:17:58 sd-53420 sshd\[15375\]: User list from 119.27.166.181 not allowed because none of user's groups are listed in AllowGroups Feb 20 02:17:58 sd-53420 sshd\[15375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.166.181 user=list ... |
2020-02-20 09:29:13 |
| 92.222.78.178 | attackbotsspam | Feb 20 02:14:08 SilenceServices sshd[12411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178 Feb 20 02:14:10 SilenceServices sshd[12411]: Failed password for invalid user hadoop from 92.222.78.178 port 56176 ssh2 Feb 20 02:16:56 SilenceServices sshd[14876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178 |
2020-02-20 09:26:28 |
| 180.241.228.21 | attackspam | Port probing on unauthorized port 1433 |
2020-02-20 09:43:12 |