City: Des Moines
Region: Iowa
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 20.0.0.0 - 20.31.255.255
CIDR: 20.0.0.0/11
NetName: MSFT
NetHandle: NET-20-0-0-0-1
Parent: NET20 (NET-20-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2017-10-18
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/20.0.0.0
OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2025-06-10
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT
OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN
OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN
OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN
OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN
OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN
OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.29.8.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.29.8.147. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101201 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 08:00:39 CST 2025
;; MSG SIZE rcvd: 104
147.8.29.20.in-addr.arpa domain name pointer azpdcgsp1rt5.stretchoid.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
147.8.29.20.in-addr.arpa name = azpdcgsp1rt5.stretchoid.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.139.48.29 | attackbots | (From rodgerped@outlook.com) Buy very rare high ahrefs SEO metrics score backlinks. Manual backlinks placed on quality websites which have high UR and DR ahrefs score. Order today while we can offer this service, Limited time offer. more info: https://www.monkeydigital.co/product/high-ahrefs-backlinks/ thanks Monkey Digital Team 200 high aHrefs UR DR backlinks – Monkey Digital https://www.monkeydigital.co |
2019-11-16 03:34:56 |
195.158.24.137 | attackspambots | Nov 15 23:23:06 gw1 sshd[8528]: Failed password for root from 195.158.24.137 port 52150 ssh2 Nov 15 23:27:32 gw1 sshd[8571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.24.137 ... |
2019-11-16 03:08:31 |
104.140.188.10 | attack | Connection by 104.140.188.10 on port: 3306 got caught by honeypot at 11/15/2019 5:22:16 PM |
2019-11-16 03:01:56 |
81.215.179.100 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/81.215.179.100/ TR - 1H : (90) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TR NAME ASN : ASN9121 IP : 81.215.179.100 CIDR : 81.215.128.0/18 PREFIX COUNT : 4577 UNIQUE IP COUNT : 6868736 ATTACKS DETECTED ASN9121 : 1H - 2 3H - 10 6H - 21 12H - 34 24H - 64 DateTime : 2019-11-15 15:39:44 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-11-16 03:26:23 |
73.91.76.80 | attack | Telnet brute force and port scan |
2019-11-16 03:28:19 |
223.80.102.182 | attackbotsspam | ICMP MH Probe, Scan /Distributed - |
2019-11-16 03:10:49 |
154.66.113.78 | attackbotsspam | Nov 15 17:45:34 lnxded63 sshd[20969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.113.78 |
2019-11-16 03:14:20 |
138.197.221.114 | attackbots | k+ssh-bruteforce |
2019-11-16 03:10:22 |
128.199.142.0 | attack | Nov 15 18:30:39 MK-Soft-VM7 sshd[4733]: Failed password for root from 128.199.142.0 port 40258 ssh2 ... |
2019-11-16 03:03:38 |
103.99.108.248 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-16 03:03:56 |
222.189.191.89 | attackspam | ICMP MH Probe, Scan /Distributed - |
2019-11-16 03:25:10 |
222.189.191.75 | attackbots | ICMP MH Probe, Scan /Distributed - |
2019-11-16 03:26:09 |
60.12.212.156 | attack | Honeypot hit. |
2019-11-16 03:00:47 |
171.48.53.55 | attackspam | Automatic report - Port Scan Attack |
2019-11-16 03:36:34 |
41.196.0.189 | attack | Nov 15 20:00:42 meumeu sshd[15397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189 Nov 15 20:00:44 meumeu sshd[15397]: Failed password for invalid user aswini from 41.196.0.189 port 51240 ssh2 Nov 15 20:08:48 meumeu sshd[16473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189 ... |
2019-11-16 03:15:42 |