City: Calgary
Region: Alberta
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 207.54.96.0 - 207.54.125.255
CIDR: 207.54.112.0/21, 207.54.124.0/23, 207.54.96.0/20, 207.54.120.0/22
NetName: TERAGO-1
NetHandle: NET-207-54-96-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: TeraGo Networks Inc. (TRGO)
RegDate: 2001-03-22
Updated: 2023-09-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/207.54.96.0
OrgName: TeraGo Networks Inc.
OrgId: TRGO
Address: Suite 800, 55 Commerce Valley Dr. West
City: Thornhill
StateProv: ON
PostalCode: L3T-7V9
Country: CA
RegDate: 2001-03-22
Updated: 2023-03-01
Comment: http://www.terago.ca
Comment: NOC hours 24/7
Ref: https://rdap.arin.net/registry/entity/TRGO
ReferralServer: rwhois://rwhois.rackforce.com:4321
OrgNOCHandle: TIN1-ARIN
OrgNOCName: PTP NOC
OrgNOCPhone: +1-866-837-2462
OrgNOCEmail: ipnoc@terago.ca
OrgNOCRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
OrgAbuseHandle: TIN1-ARIN
OrgAbuseName: PTP NOC
OrgAbusePhone: +1-866-837-2462
OrgAbuseEmail: ipnoc@terago.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
OrgTechHandle: JAINM16-ARIN
OrgTechName: Jain, Manoj
OrgTechPhone: +1-647-291-4847
OrgTechEmail: manoj.jain@terago.ca
OrgTechRef: https://rdap.arin.net/registry/entity/JAINM16-ARIN
OrgTechHandle: TIP2-ARIN
OrgTechName: TeraGo Internet Peering
OrgTechPhone: +1-866-837-2462
OrgTechEmail: ipnoc@terago.ca
OrgTechRef: https://rdap.arin.net/registry/entity/TIP2-ARIN
RNOCHandle: TIN1-ARIN
RNOCName: PTP NOC
RNOCPhone: +1-866-837-2462
RNOCEmail: ipnoc@terago.ca
RNOCRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
RAbuseHandle: TIN1-ARIN
RAbuseName: PTP NOC
RAbusePhone: +1-866-837-2462
RAbuseEmail: ipnoc@terago.ca
RAbuseRef: https://rdap.arin.net/registry/entity/TIN1-ARIN
RTechHandle: TIP2-ARIN
RTechName: TeraGo Internet Peering
RTechPhone: +1-866-837-2462
RTechEmail: ipnoc@terago.ca
RTechRef: https://rdap.arin.net/registry/entity/TIP2-ARIN
# end
# start
NetRange: 207.54.113.224 - 207.54.113.255
CIDR: 207.54.113.224/27
NetName: T-207054113224-021903
NetHandle: NET-207-54-113-224-1
Parent: TERAGO-1 (NET-207-54-96-0-1)
NetType: Reassigned
OriginAS:
Organization: National Gas Exchange (NGX) (NGEN)
RegDate: 2003-02-19
Updated: 2003-02-19
Ref: https://rdap.arin.net/registry/ip/207.54.113.224
OrgName: National Gas Exchange (NGX)
OrgId: NGEN
Address: #2330 140 4th Ave SW
City: Calgary
StateProv: AB
PostalCode: T2P-3N3
Country: CA
RegDate: 2003-02-19
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/NGEN
OrgTechHandle: CMI6-ARIN
OrgTechName: Middleton, Corinne
OrgTechPhone: +1-403-974-1700
OrgTechEmail: corinne.middleton@ngx.com
OrgTechRef: https://rdap.arin.net/registry/entity/CMI6-ARIN
OrgAbuseHandle: CMI6-ARIN
OrgAbuseName: Middleton, Corinne
OrgAbusePhone: +1-403-974-1700
OrgAbuseEmail: corinne.middleton@ngx.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CMI6-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.rackforce.com:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.54.113.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.54.113.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 04:52:41 CST 2026
;; MSG SIZE rcvd: 107
238.113.54.207.in-addr.arpa domain name pointer static-207-54-113-238.ptr.terago.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
238.113.54.207.in-addr.arpa name = static-207-54-113-238.ptr.terago.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 78.128.113.124 | attackspambots | Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: lost connection after AUTH from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: disconnect from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124] Nov 26 21:03:14 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure ........ ------------------------------- |
2019-11-30 13:50:22 |
| 111.198.54.177 | attackbotsspam | 2019-11-30T06:40:22.234321centos sshd\[14366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177 user=root 2019-11-30T06:40:24.242690centos sshd\[14366\]: Failed password for root from 111.198.54.177 port 49943 ssh2 2019-11-30T06:48:27.035204centos sshd\[14572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177 user=root |
2019-11-30 13:49:02 |
| 71.6.135.131 | attackspambots | 11/30/2019-05:57:47.675642 71.6.135.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71 |
2019-11-30 13:45:59 |
| 212.129.140.89 | attackspambots | Nov 30 06:46:08 dedicated sshd[27527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.140.89 user=root Nov 30 06:46:09 dedicated sshd[27527]: Failed password for root from 212.129.140.89 port 47644 ssh2 |
2019-11-30 13:56:44 |
| 49.73.157.191 | attack | SASL broute force |
2019-11-30 13:26:21 |
| 222.186.180.41 | attackbots | Nov 30 06:35:33 vps666546 sshd\[31648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root Nov 30 06:35:35 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2 Nov 30 06:35:38 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2 Nov 30 06:35:42 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2 Nov 30 06:35:45 vps666546 sshd\[31648\]: Failed password for root from 222.186.180.41 port 6034 ssh2 ... |
2019-11-30 13:37:48 |
| 77.204.36.25 | attackbots | Nov 30 05:57:57 vmanager6029 sshd\[5737\]: Invalid user ubnt from 77.204.36.25 port 32946 Nov 30 05:57:57 vmanager6029 sshd\[5737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.204.36.25 Nov 30 05:57:59 vmanager6029 sshd\[5737\]: Failed password for invalid user ubnt from 77.204.36.25 port 32946 ssh2 |
2019-11-30 13:35:35 |
| 122.155.11.55 | attack | fail2ban honeypot |
2019-11-30 13:28:05 |
| 118.24.201.132 | attackbotsspam | Invalid user guest from 118.24.201.132 port 51580 |
2019-11-30 14:01:20 |
| 218.94.136.90 | attackspam | Nov 30 05:53:21 legacy sshd[4680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90 Nov 30 05:53:23 legacy sshd[4680]: Failed password for invalid user seung from 218.94.136.90 port 49821 ssh2 Nov 30 05:57:58 legacy sshd[4845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90 ... |
2019-11-30 13:38:01 |
| 112.85.42.171 | attackspambots | Nov 30 02:28:28 firewall sshd[1680]: Failed password for root from 112.85.42.171 port 42955 ssh2 Nov 30 02:28:28 firewall sshd[1680]: error: maximum authentication attempts exceeded for root from 112.85.42.171 port 42955 ssh2 [preauth] Nov 30 02:28:28 firewall sshd[1680]: Disconnecting: Too many authentication failures [preauth] ... |
2019-11-30 13:29:11 |
| 183.83.137.235 | attackbots | 19/11/29@23:57:35: FAIL: Alarm-Intrusion address from=183.83.137.235 ... |
2019-11-30 13:48:31 |
| 51.38.186.207 | attack | Nov 30 05:57:53 * sshd[24730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.207 Nov 30 05:57:55 * sshd[24730]: Failed password for invalid user racho from 51.38.186.207 port 45092 ssh2 |
2019-11-30 13:41:28 |
| 92.50.151.170 | attack | Nov 30 06:21:09 vps647732 sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.151.170 Nov 30 06:21:10 vps647732 sshd[24349]: Failed password for invalid user cantournet from 92.50.151.170 port 48900 ssh2 ... |
2019-11-30 13:43:32 |
| 128.199.216.250 | attackspambots | Nov 30 06:23:36 dedicated sshd[23396]: Invalid user dev from 128.199.216.250 port 41863 |
2019-11-30 13:54:53 |