City: Clinton
Region: Oklahoma
Country: United States
Internet Service Provider: Pioneer Cellular
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 198.46.16.0 - 198.46.31.255
CIDR: 198.46.16.0/20
NetName: PLDI-NET
NetHandle: NET-198-46-16-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Pioneer Long Distance Inc. (PIO)
RegDate: 2024-07-09
Updated: 2024-07-10
Ref: https://rdap.arin.net/registry/ip/198.46.16.0
OrgName: Pioneer Long Distance Inc.
OrgId: PIO
Address: 301 Nth 5th
City: Kingfisher
StateProv: OK
PostalCode: 73750
Country: US
RegDate: 1998-11-04
Updated: 2024-11-25
Comment: ___________________________________________
Comment: For matters pertaining to abuse, harassment
Comment: or spam, please contact abuse@pldi.net
Comment: ___________________________________________
Ref: https://rdap.arin.net/registry/entity/PIO
OrgTechHandle: HILLJ22-ARIN
OrgTechName: Hill, Jeremie
OrgTechPhone: +1-405-375-0605
OrgTechEmail: jjhill@ptci.com
OrgTechRef: https://rdap.arin.net/registry/entity/HILLJ22-ARIN
OrgTechHandle: PNO6-ARIN
OrgTechName: PLDI Network Operations
OrgTechPhone: +1-405-375-0376
OrgTechEmail: netop@pldi.net
OrgTechRef: https://rdap.arin.net/registry/entity/PNO6-ARIN
OrgRoutingHandle: PRO94-ARIN
OrgRoutingName: PLDI Routing Operations
OrgRoutingPhone: +1-405-375-0537
OrgRoutingEmail: networkservices-core@ptci.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/PRO94-ARIN
OrgTechHandle: SANDE653-ARIN
OrgTechName: Sanders, Judith
OrgTechPhone: +1-405-368-2991
OrgTechEmail: jasanders@ptci.com
OrgTechRef: https://rdap.arin.net/registry/entity/SANDE653-ARIN
OrgNOCHandle: PNO6-ARIN
OrgNOCName: PLDI Network Operations
OrgNOCPhone: +1-405-375-0376
OrgNOCEmail: netop@pldi.net
OrgNOCRef: https://rdap.arin.net/registry/entity/PNO6-ARIN
OrgAbuseHandle: PNA4-ARIN
OrgAbuseName: PLDI Network Abuse
OrgAbusePhone: +1-405-375-0376
OrgAbuseEmail: abuse@pldi.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/PNA4-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.46.29.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.46.29.125. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092000 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 20 23:10:49 CST 2025
;; MSG SIZE rcvd: 106
125.29.46.198.in-addr.arpa domain name pointer 198-46-29-125.mobile.pioneercellular.net.
b'125.29.46.198.in-addr.arpa name = 198-46-29-125.mobile.pioneercellular.net.
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
182.190.218.57 | attackspam | $f2bV_matches |
2020-05-16 15:11:09 |
162.243.145.76 | attack | " " |
2020-05-16 15:26:44 |
139.199.228.133 | attackbots | Invalid user admin from 139.199.228.133 port 18873 |
2020-05-16 15:39:26 |
58.149.49.186 | attackspambots | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-05-16 15:23:08 |
222.186.30.112 | attack | 2020-05-16T04:58:55.618618sd-86998 sshd[18169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root 2020-05-16T04:58:57.590516sd-86998 sshd[18169]: Failed password for root from 222.186.30.112 port 56145 ssh2 2020-05-16T04:59:00.498994sd-86998 sshd[18169]: Failed password for root from 222.186.30.112 port 56145 ssh2 2020-05-16T04:58:55.618618sd-86998 sshd[18169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root 2020-05-16T04:58:57.590516sd-86998 sshd[18169]: Failed password for root from 222.186.30.112 port 56145 ssh2 2020-05-16T04:59:00.498994sd-86998 sshd[18169]: Failed password for root from 222.186.30.112 port 56145 ssh2 2020-05-16T04:58:55.618618sd-86998 sshd[18169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root 2020-05-16T04:58:57.590516sd-86998 sshd[18169]: Failed password for root from ... |
2020-05-16 15:32:39 |
183.88.243.147 | attackbots | Dovecot Invalid User Login Attempt. |
2020-05-16 14:59:56 |
106.247.23.237 | attackbotsspam | May 15 18:35:48 haigwepa sshd[27715]: Failed password for pi from 106.247.23.237 port 42256 ssh2 ... |
2020-05-16 15:25:00 |
222.186.169.192 | attackbots | 2020-05-16T05:48:43.915148afi-git.jinr.ru sshd[10633]: Failed password for root from 222.186.169.192 port 9740 ssh2 2020-05-16T05:48:47.386794afi-git.jinr.ru sshd[10633]: Failed password for root from 222.186.169.192 port 9740 ssh2 2020-05-16T05:48:50.269808afi-git.jinr.ru sshd[10633]: Failed password for root from 222.186.169.192 port 9740 ssh2 2020-05-16T05:48:50.269952afi-git.jinr.ru sshd[10633]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 9740 ssh2 [preauth] 2020-05-16T05:48:50.269968afi-git.jinr.ru sshd[10633]: Disconnecting: Too many authentication failures [preauth] ... |
2020-05-16 15:06:22 |
121.58.249.150 | attackbots | RDP brute force attack detected by fail2ban |
2020-05-16 15:42:32 |
159.89.34.43 | attackbots | WordPress brute force |
2020-05-16 15:04:56 |
129.211.29.98 | attackbotsspam | Invalid user jordan from 129.211.29.98 port 35538 |
2020-05-16 15:44:26 |
120.84.10.8 | attackspambots | Honeypot Spam Send |
2020-05-16 15:12:08 |
106.12.218.2 | attackspam | SSH brute-force attempt |
2020-05-16 15:15:17 |
91.121.173.98 | attackspam | May 16 02:51:38 163-172-32-151 sshd[21737]: Invalid user admin from 91.121.173.98 port 55152 ... |
2020-05-16 15:31:30 |
14.98.213.14 | attackbots | May 15 21:18:31 srv01 sshd[27009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.213.14 user=root May 15 21:18:32 srv01 sshd[27009]: Failed password for root from 14.98.213.14 port 56640 ssh2 May 15 21:22:44 srv01 sshd[27228]: Invalid user admin from 14.98.213.14 port 34298 May 15 21:22:44 srv01 sshd[27228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.213.14 May 15 21:22:44 srv01 sshd[27228]: Invalid user admin from 14.98.213.14 port 34298 May 15 21:22:46 srv01 sshd[27228]: Failed password for invalid user admin from 14.98.213.14 port 34298 ssh2 ... |
2020-05-16 15:48:46 |