City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 172.16.0.0 - 172.31.255.255
CIDR: 172.16.0.0/12
NetName: PRIVATE-ADDRESS-BBLK-RFC1918-IANA-RESERVED
NetHandle: NET-172-16-0-0-1
Parent: NET172 (NET-172-0-0-0-0)
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate: 1994-03-15
Updated: 2024-05-24
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/172.16.0.0
OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2024-05-24
Ref: https://rdap.arin.net/registry/entity/IANA
OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.22.116.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.22.116.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 16:27:45 CST 2026
;; MSG SIZE rcvd: 107
Host 196.116.22.172.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 196.116.22.172.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.99.169.67 | attack | 2019-11-20 15:11:03 H=([116.99.169.67]) [116.99.169.67]:15550 I=[10.100.18.22]:25 F= |
2019-11-20 23:05:37 |
| 129.204.58.180 | attackbotsspam | Nov 20 04:12:24 mail sshd\[63792\]: Invalid user zhr from 129.204.58.180 Nov 20 04:12:24 mail sshd\[63792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180 ... |
2019-11-20 22:36:39 |
| 41.73.8.80 | attack | $f2bV_matches |
2019-11-20 22:47:16 |
| 203.121.77.2 | attackbotsspam | Unauthorized connection attempt from IP address 203.121.77.2 on Port 445(SMB) |
2019-11-20 23:02:29 |
| 177.125.213.38 | attackbots | Nov 20 16:46:42 www5 sshd\[61242\]: Invalid user nbpt1580999!!! from 177.125.213.38 Nov 20 16:46:42 www5 sshd\[61242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.213.38 Nov 20 16:46:44 www5 sshd\[61242\]: Failed password for invalid user nbpt1580999!!! from 177.125.213.38 port 5956 ssh2 ... |
2019-11-20 23:03:19 |
| 163.172.93.131 | attackbotsspam | 2019-11-20T08:22:04.7817701495-001 sshd\[47247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sd.two-notes.net 2019-11-20T08:22:06.6420721495-001 sshd\[47247\]: Failed password for invalid user hindle from 163.172.93.131 port 59132 ssh2 2019-11-20T09:28:45.7366501495-001 sshd\[49574\]: Invalid user default from 163.172.93.131 port 49052 2019-11-20T09:28:45.7401151495-001 sshd\[49574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sd.two-notes.net 2019-11-20T09:28:47.2021881495-001 sshd\[49574\]: Failed password for invalid user default from 163.172.93.131 port 49052 ssh2 2019-11-20T09:36:06.0322281495-001 sshd\[50570\]: Invalid user wwwadmin from 163.172.93.131 port 57342 ... |
2019-11-20 23:14:19 |
| 49.64.175.15 | attackbots | badbot |
2019-11-20 22:32:08 |
| 185.176.27.18 | attackspam | 11/20/2019-15:46:56.031837 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-20 22:54:58 |
| 207.253.227.226 | attackbotsspam | Unauthorised access (Nov 20) SRC=207.253.227.226 LEN=40 TTL=243 ID=11647 TCP DPT=445 WINDOW=1024 SYN Unauthorised access (Nov 17) SRC=207.253.227.226 LEN=40 TTL=243 ID=59184 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-20 23:00:42 |
| 117.70.38.102 | attack | badbot |
2019-11-20 22:42:18 |
| 66.249.64.157 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-20 22:35:12 |
| 121.230.45.49 | attackspam | badbot |
2019-11-20 22:44:31 |
| 49.146.47.110 | attackspambots | Unauthorized connection attempt from IP address 49.146.47.110 on Port 445(SMB) |
2019-11-20 23:14:45 |
| 111.231.71.157 | attackbotsspam | Nov 20 11:26:26 ns382633 sshd\[26938\]: Invalid user makayla from 111.231.71.157 port 34164 Nov 20 11:26:26 ns382633 sshd\[26938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 Nov 20 11:26:28 ns382633 sshd\[26938\]: Failed password for invalid user makayla from 111.231.71.157 port 34164 ssh2 Nov 20 11:38:21 ns382633 sshd\[29040\]: Invalid user juwaan from 111.231.71.157 port 51580 Nov 20 11:38:21 ns382633 sshd\[29040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 |
2019-11-20 22:41:22 |
| 196.219.96.238 | attackbotsspam | Brute force attempt |
2019-11-20 22:45:29 |