City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 208.87.240.0 - 208.87.243.255
CIDR: 208.87.240.0/22
NetName: PSYCHZ
NetHandle: NET-208-87-240-0-1
Parent: NET208 (NET-208-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Psychz Networks (PS-184)
RegDate: 2008-02-29
Updated: 2013-04-26
Ref: https://rdap.arin.net/registry/ip/208.87.240.0
OrgName: Psychz Networks
OrgId: PS-184
Address: 20687-2 Amar Road #312
City: Walnut
StateProv: CA
PostalCode: 91789
Country: US
RegDate: 2013-04-17
Updated: 2025-06-02
Comment: ------------------------------------------------------
Comment: Psychz Networks - AS40676
Comment: ------------------------------------------------------
Comment:
Comment: Psychz Networks is a global infrastructure provider offering cloud hosting, bare metal servers, IP transit, and colocation services across multiple data centers.
Comment:
Comment: We maintain an open peering policy. Facility and interconnection details can be found at: https://www.peeringdb.com/net/6747
Comment:
Comment: Geofeed: https://psychz.net/geo/geofeed.csv
Comment:
Comment: ------------------------------------------------------
Comment: Abuse Reporting:
Comment: ------------------------------------------------------
Comment:
Comment: Our network supports dynamic and virtualized services. To assist with abuse investigations, please include the following details:
Comment:
Comment: - Timestamp of incident (with timezone)
Comment: - Source and destination IPs and ports
Comment: - Log samples and description of observed behavior
Comment: - Any supporting evidence (e.g., packet captures, headers)
Comment:
Comment: Send reports to: abuse@psychz.net
Comment:
Comment: For urgent threats involving life safety or CSAM, contact law enforcement immediately and notify us.
Comment:
Comment: ------------------------------------------------------
Comment: Operational Contacts:
Comment: ------------------------------------------------------
Comment:
Comment: - Abuse Desk: abuse@psychz.net
Comment: - Network Operations: noc@psychz.net
Comment: - Legal Requests: legal@psychz.net
Comment: - Peering Requests: peering@psychz.net
Comment:
Comment: Psychz Networks will only disclose subscriber information in response to valid legal process, court orders, or applicable U.S. law.
Ref: https://rdap.arin.net/registry/entity/PS-184
ReferralServer: rwhois://rwhois.psychz.net:4321
OrgAbuseHandle: TEXAS1-ARIN
OrgAbuseName: Texas - NOC
OrgAbusePhone: +1-626-549-2801
OrgAbuseEmail: abuse@psychz.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/TEXAS1-ARIN
OrgTechHandle: NOC3077-ARIN
OrgTechName: NOC
OrgTechPhone: +1-626-549-2801
OrgTechEmail: noc@psychz.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC3077-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.psychz.net:4321.
%rwhois V-1.0,V-1.5:00090h:00 portal.psychz.net (Ubersmith RWhois Server V-4.6.1)
autharea=208.87.240.0/22
xautharea=208.87.240.0/22
network:Class-Name:network
network:Auth-Area:208.87.240.0/22
network:ID:NET-187634.208.87.240.0/31
network:Network-Name:VPN gateway
network:IP-Network:208.87.240.0/31
network:IP-Network-Block:208.87.240.0 - 208.87.240.1
network:Org-Name:Profuse Solutions INC - Internal
network:Street-Address:20687-2 Amar Road #312
network:City:Walnut
network:State:CA
network:Postal-Code:91789
network:Country-Code:US
network:Tech-Contact:MAINT-187634.208.87.240.0/31
network:Created:20231004155552000
network:Updated:20231004155552000
network:Updated-By:abuse@psychz.net
contact:POC-Name:Network Administrator
contact:POC-Email:abuse@psychz.net
contact:POC-Phone:
contact:Tech-Name:Network Administrator
contact:Tech-Email:abuse@psychz.net
contact:Tech-Phone:
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.87.240.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;208.87.240.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025093000 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 30 21:54:06 CST 2025
;; MSG SIZE rcvd: 105
Host 0.240.87.208.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 0.240.87.208.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
51.77.109.98 | attack | 51.77.109.98 (GB/United Kingdom/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 08:42:24 server2 sshd[8167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.129.125 user=root Sep 16 08:42:26 server2 sshd[8167]: Failed password for root from 187.35.129.125 port 57488 ssh2 Sep 16 08:42:43 server2 sshd[8310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98 user=root Sep 16 08:42:45 server2 sshd[8310]: Failed password for root from 51.77.109.98 port 48616 ssh2 Sep 16 08:42:09 server2 sshd[7972]: Failed password for root from 164.132.44.25 port 51426 ssh2 Sep 16 08:43:24 server2 sshd[8664]: Failed password for root from 51.83.69.142 port 55698 ssh2 IP Addresses Blocked: 187.35.129.125 (BR/Brazil/-) |
2020-09-16 21:41:13 |
60.243.123.93 | attack | Auto Detect Rule! proto TCP (SYN), 60.243.123.93:25982->gjan.info:23, len 40 |
2020-09-16 21:44:51 |
82.102.85.111 | attack | Sep 15 10:00:45 scw-focused-cartwright sshd[2556]: Failed password for root from 82.102.85.111 port 58347 ssh2 |
2020-09-16 21:52:58 |
163.172.178.167 | attack | Sep 16 23:02:44 web1 sshd[8340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.167 user=root Sep 16 23:02:47 web1 sshd[8340]: Failed password for root from 163.172.178.167 port 46288 ssh2 Sep 16 23:15:07 web1 sshd[13520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.167 user=root Sep 16 23:15:09 web1 sshd[13520]: Failed password for root from 163.172.178.167 port 37738 ssh2 Sep 16 23:18:59 web1 sshd[14980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.167 user=root Sep 16 23:19:01 web1 sshd[14980]: Failed password for root from 163.172.178.167 port 48512 ssh2 Sep 16 23:22:53 web1 sshd[16667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.167 user=root Sep 16 23:22:54 web1 sshd[16667]: Failed password for root from 163.172.178.167 port 59268 ssh2 Sep 16 23:26:45 web1 s ... |
2020-09-16 21:31:28 |
202.162.209.29 | attack | Unauthorized connection attempt from IP address 202.162.209.29 on Port 445(SMB) |
2020-09-16 21:27:59 |
115.96.254.190 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 115.96.254.190:12236->gjan.info:23, len 40 |
2020-09-16 21:31:48 |
51.195.166.160 | attackspambots | (mod_security) mod_security (id:980001) triggered by 51.195.166.160 (FR/France/tor-exit-readme.stopmassspying.net): 5 in the last 14400 secs; ID: rub |
2020-09-16 21:53:23 |
118.172.227.96 | attackbots | Unauthorized connection attempt from IP address 118.172.227.96 on Port 445(SMB) |
2020-09-16 21:29:46 |
82.148.31.110 | attackbots | 1,06-00/00 [bc00/m01] PostRequest-Spammer scoring: stockholm |
2020-09-16 21:47:37 |
220.128.102.12 | attackbots | Unauthorized connection attempt from IP address 220.128.102.12 on Port 445(SMB) |
2020-09-16 21:26:37 |
185.100.87.206 | attack | (sshd) Failed SSH login from 185.100.87.206 (RO/Romania/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 09:45:37 server5 sshd[13442]: Failed password for root from 185.100.87.206 port 36953 ssh2 Sep 16 09:45:39 server5 sshd[13442]: Failed password for root from 185.100.87.206 port 36953 ssh2 Sep 16 09:45:42 server5 sshd[13442]: Failed password for root from 185.100.87.206 port 36953 ssh2 Sep 16 09:45:44 server5 sshd[13442]: Failed password for root from 185.100.87.206 port 36953 ssh2 Sep 16 09:45:46 server5 sshd[13442]: Failed password for root from 185.100.87.206 port 36953 ssh2 |
2020-09-16 21:48:16 |
201.182.228.63 | attackbotsspam | Automatic report - Port Scan Attack |
2020-09-16 21:52:07 |
114.35.59.144 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 114.35.59.144:3239->gjan.info:23, len 40 |
2020-09-16 21:42:57 |
76.186.73.35 | attackbots | Sep 16 11:30:36 ns3033917 sshd[2857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.73.35 user=root Sep 16 11:30:38 ns3033917 sshd[2857]: Failed password for root from 76.186.73.35 port 57459 ssh2 Sep 16 11:38:53 ns3033917 sshd[2901]: Invalid user maya from 76.186.73.35 port 35613 ... |
2020-09-16 21:25:44 |
190.85.54.158 | attack | Invalid user deluge from 190.85.54.158 port 50628 |
2020-09-16 21:23:39 |