City: Phoenix
Region: Arizona
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 20.160.0.0 - 20.175.255.255
CIDR: 20.160.0.0/12
NetName: MSFT
NetHandle: NET-20-160-0-0-1
Parent: NET20 (NET-20-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2017-02-22
Updated: 2017-02-22
Ref: https://rdap.arin.net/registry/ip/20.160.0.0
OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2025-06-10
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT
OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN
OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN
OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN
OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.168.0.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.168.0.86. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101601 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 17 03:30:19 CST 2025
;; MSG SIZE rcvd: 104
86.0.168.20.in-addr.arpa domain name pointer azpdwg2v155x.stretchoid.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
86.0.168.20.in-addr.arpa name = azpdwg2v155x.stretchoid.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
204.42.253.130 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-12-04 06:01:04 |
120.70.100.54 | attack | Dec 3 22:01:07 lnxmysql61 sshd[30992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54 |
2019-12-04 06:14:49 |
89.35.39.60 | attackbots | Fail2Ban Ban Triggered |
2019-12-04 05:58:22 |
111.198.88.86 | attack | Dec 3 23:04:54 sso sshd[28709]: Failed password for root from 111.198.88.86 port 38510 ssh2 ... |
2019-12-04 06:19:11 |
144.217.15.161 | attackbots | Dec 3 17:41:37 *** sshd[8523]: Failed password for invalid user darin from 144.217.15.161 port 53626 ssh2 Dec 3 17:49:49 *** sshd[8650]: Failed password for invalid user reinhold from 144.217.15.161 port 49618 ssh2 Dec 3 18:00:35 *** sshd[8785]: Failed password for invalid user sadella from 144.217.15.161 port 45396 ssh2 Dec 3 18:06:08 *** sshd[8914]: Failed password for invalid user heggelid from 144.217.15.161 port 57410 ssh2 Dec 3 18:22:37 *** sshd[9215]: Failed password for invalid user ftpuser from 144.217.15.161 port 37016 ssh2 Dec 3 18:28:13 *** sshd[9294]: Failed password for invalid user vassar from 144.217.15.161 port 49044 ssh2 Dec 3 18:50:48 *** sshd[9704]: Failed password for invalid user yellowst from 144.217.15.161 port 40722 ssh2 Dec 3 18:56:26 *** sshd[9768]: Failed password for invalid user server from 144.217.15.161 port 52718 ssh2 Dec 3 19:01:55 *** sshd[9865]: Failed password for invalid user search from 144.217.15.161 port 36484 ssh2 Dec 3 19:07:28 *** sshd[9984]: Failed passwo |
2019-12-04 06:20:48 |
36.155.113.218 | attackspam | Dec 3 22:33:05 icinga sshd[32192]: Failed password for root from 36.155.113.218 port 45183 ssh2 ... |
2019-12-04 06:32:51 |
49.235.88.96 | attack | Brute force attempt |
2019-12-04 06:32:28 |
123.207.98.11 | attackbotsspam | Dec 3 23:05:14 legacy sshd[10194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.98.11 Dec 3 23:05:15 legacy sshd[10194]: Failed password for invalid user site1 from 123.207.98.11 port 48648 ssh2 Dec 3 23:11:29 legacy sshd[10467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.98.11 ... |
2019-12-04 06:14:17 |
210.227.113.18 | attack | Dec 3 23:02:42 Ubuntu-1404-trusty-64-minimal sshd\[32022\]: Invalid user ovh from 210.227.113.18 Dec 3 23:02:42 Ubuntu-1404-trusty-64-minimal sshd\[32022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18 Dec 3 23:02:44 Ubuntu-1404-trusty-64-minimal sshd\[32022\]: Failed password for invalid user ovh from 210.227.113.18 port 56632 ssh2 Dec 3 23:09:12 Ubuntu-1404-trusty-64-minimal sshd\[2552\]: Invalid user pidgeon from 210.227.113.18 Dec 3 23:09:12 Ubuntu-1404-trusty-64-minimal sshd\[2552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18 |
2019-12-04 06:17:47 |
178.213.207.178 | attackspambots | Port 1433 Scan |
2019-12-04 06:07:53 |
180.76.119.34 | attackspam | Dec 3 18:06:39 MK-Soft-Root2 sshd[23654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.34 Dec 3 18:06:41 MK-Soft-Root2 sshd[23654]: Failed password for invalid user singleton from 180.76.119.34 port 60538 ssh2 ... |
2019-12-04 06:30:23 |
149.202.135.114 | attack | Lines containing failures of 149.202.135.114 Dec 3 11:58:16 *** sshd[39510]: Invalid user operator from 149.202.135.114 port 45134 Dec 3 11:58:16 *** sshd[39510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.135.114 Dec 3 11:58:19 *** sshd[39510]: Failed password for invalid user operator from 149.202.135.114 port 45134 ssh2 Dec 3 11:58:19 *** sshd[39510]: Received disconnect from 149.202.135.114 port 45134:11: Bye Bye [preauth] Dec 3 11:58:19 *** sshd[39510]: Disconnected from invalid user operator 149.202.135.114 port 45134 [preauth] Dec 3 12:04:28 *** sshd[40478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.135.114 user=r.r Dec 3 12:04:29 *** sshd[40478]: Failed password for r.r from 149.202.135.114 port 45646 ssh2 Dec 3 12:04:29 *** sshd[40478]: Received disconnect from 149.202.135.114 port 45646:11: Bye Bye [preauth] Dec 3 12:04:29 *** sshd[40478]: Discon........ ------------------------------ |
2019-12-04 06:23:32 |
192.99.100.51 | attackbotsspam | 192.99.100.51 - - \[03/Dec/2019:20:45:44 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 192.99.100.51 - - \[03/Dec/2019:20:45:45 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-12-04 06:05:48 |
189.34.62.36 | attack | Dec 3 23:01:02 vps647732 sshd[21385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.34.62.36 Dec 3 23:01:03 vps647732 sshd[21385]: Failed password for invalid user server from 189.34.62.36 port 44033 ssh2 ... |
2019-12-04 06:03:00 |
212.129.138.67 | attack | $f2bV_matches |
2019-12-04 06:00:40 |