City: South Wayne
Region: Wisconsin
Country: United States
Internet Service Provider: Bug Tussel Wireless
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 207.200.224.0 - 207.200.255.255
CIDR: 207.200.224.0/19
NetName: BTW-006
NetHandle: NET-207-200-224-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Bug Tussel Wireless (BTWL)
RegDate: 2008-09-30
Updated: 2016-03-10
Ref: https://rdap.arin.net/registry/ip/207.200.224.0
OrgName: Bug Tussel Wireless
OrgId: BTWL
Address: PO BOX 1060
City: GREEN BAY
StateProv: WI
PostalCode: 54305-1060
Country: US
RegDate: 2013-09-04
Updated: 2024-11-25
Comment: http://www.bugtusselwireless.com
Ref: https://rdap.arin.net/registry/entity/BTWL
OrgAbuseHandle: NOC2500-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-920-940-0001
OrgAbuseEmail: NOC@bugtusselwireless.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
OrgTechHandle: NOC2500-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-920-940-0001
OrgTechEmail: NOC@bugtusselwireless.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
OrgNOCHandle: NOC2500-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-920-940-0001
OrgNOCEmail: NOC@bugtusselwireless.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
# end
# start
NetRange: 207.200.240.0 - 207.200.255.255
CIDR: 207.200.240.0/20
NetName: MWDC-BLOCK
NetHandle: NET-207-200-240-0-1
Parent: BTW-006 (NET-207-200-224-0-1)
NetType: Reassigned
OriginAS:
Customer: Midwest Datacore, LLC (C04845392)
RegDate: 2014-01-14
Updated: 2014-01-14
Comment: NOC: 920-940-0001
Ref: https://rdap.arin.net/registry/ip/207.200.240.0
CustName: Midwest Datacore, LLC
Address: 130 E. Walnut Street
City: Green Bay
StateProv: WI
PostalCode: 54301
Country: US
RegDate: 2014-01-13
Updated: 2016-03-10
Ref: https://rdap.arin.net/registry/entity/C04845392
OrgAbuseHandle: NOC2500-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-920-940-0001
OrgAbuseEmail: NOC@bugtusselwireless.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
OrgTechHandle: NOC2500-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-920-940-0001
OrgTechEmail: NOC@bugtusselwireless.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
OrgNOCHandle: NOC2500-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-920-940-0001
OrgNOCEmail: NOC@bugtusselwireless.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC2500-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.200.240.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.200.240.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 07:34:39 CST 2026
;; MSG SIZE rcvd: 108
b'Host 143.240.200.207.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 207.200.240.143.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.113.99.172 | attackbots | Unauthorized connection attempt detected from IP address 116.113.99.172 to port 5555 [J] |
2020-01-16 01:32:32 |
| 168.121.50.168 | attackspambots | Jan 14 15:14:48 risk sshd[4390]: Invalid user hwserver from 168.121.50.168 Jan 14 15:14:48 risk sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 Jan 14 15:14:50 risk sshd[4390]: Failed password for invalid user hwserver from 168.121.50.168 port 52958 ssh2 Jan 14 15:16:07 risk sshd[4447]: Invalid user squid from 168.121.50.168 Jan 14 15:16:07 risk sshd[4447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 Jan 14 15:16:09 risk sshd[4447]: Failed password for invalid user squid from 168.121.50.168 port 60094 ssh2 Jan 14 15:16:40 risk sshd[4454]: Invalid user jasmin from 168.121.50.168 Jan 14 15:16:40 risk sshd[4454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 Jan 14 15:16:42 risk sshd[4454]: Failed password for invalid user jasmin from 168.121.50.168 port 35404 ssh2 ........ ----------------------------------------------- https: |
2020-01-16 01:58:05 |
| 122.152.226.207 | attackspambots | Unauthorized connection attempt detected from IP address 122.152.226.207 to port 3389 [T] |
2020-01-16 01:26:38 |
| 180.115.40.207 | attackbotsspam | Unauthorized connection attempt detected from IP address 180.115.40.207 to port 5555 [T] |
2020-01-16 01:22:11 |
| 103.225.138.170 | attack | Unauthorized connection attempt detected from IP address 103.225.138.170 to port 445 [T] |
2020-01-16 01:38:16 |
| 27.100.141.149 | attackbotsspam | Unauthorized connection attempt detected from IP address 27.100.141.149 to port 82 [J] |
2020-01-16 01:48:00 |
| 222.43.87.234 | attack | Unauthorized connection attempt detected from IP address 222.43.87.234 to port 23 [J] |
2020-01-16 01:53:09 |
| 183.80.179.199 | attack | Unauthorized connection attempt detected from IP address 183.80.179.199 to port 23 [J] |
2020-01-16 01:19:53 |
| 133.232.89.61 | attackbotsspam | Unauthorized connection attempt detected from IP address 133.232.89.61 to port 4567 [J] |
2020-01-16 01:24:56 |
| 115.29.174.179 | attack | Unauthorized connection attempt detected from IP address 115.29.174.179 to port 1433 [T] |
2020-01-16 01:33:06 |
| 200.122.224.200 | attackbotsspam | 20/1/15@11:01:24: FAIL: Alarm-Network address from=200.122.224.200 20/1/15@11:01:24: FAIL: Alarm-Network address from=200.122.224.200 ... |
2020-01-16 01:18:34 |
| 164.52.24.179 | attack | Unauthorized connection attempt detected from IP address 164.52.24.179 to port 5432 [J] |
2020-01-16 01:24:21 |
| 182.254.217.198 | attack | Unauthorized connection attempt detected from IP address 182.254.217.198 to port 445 [T] |
2020-01-16 01:21:00 |
| 219.117.193.48 | attack | Unauthorized connection attempt detected from IP address 219.117.193.48 to port 22 [T] |
2020-01-16 01:53:50 |
| 117.157.15.27 | attackspam | Unauthorized connection attempt detected from IP address 117.157.15.27 to port 1433 [J] |
2020-01-16 01:31:25 |