City: Pittsburgh
Region: Pennsylvania
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 209.195.128.0 - 209.195.191.255
CIDR: 209.195.128.0/18
NetName: PINNATECH-1
NetHandle: NET-209-195-128-0-1
Parent: NET209 (NET-209-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Fidium (CONSO-8)
RegDate: 1998-01-22
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/209.195.128.0
OrgName: Fidium
OrgId: CONSO-8
Address: 350 S Loop 336 W
City: Conroe
StateProv: TX
PostalCode: 77304
Country: US
RegDate: 2004-06-29
Updated: 2025-10-29
Comment: Please report all abuse to abusetx@consolidated.net. DO NOT send abuse reports to dmartin@consolidated.net, they will be deleted.
Ref: https://rdap.arin.net/registry/entity/CONSO-8
OrgTechHandle: KOVAR16-ARIN
OrgTechName: Kovar, Brent
OrgTechPhone: +1-936-521-7702
OrgTechEmail: Brent.Kovar@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/KOVAR16-ARIN
OrgAbuseHandle: CAA22-ARIN
OrgAbuseName: CCI ARIN Abuse
OrgAbusePhone: +1-800-553-7611
OrgAbuseEmail: abuse@consolidated.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAA22-ARIN
OrgTechHandle: JPR89-ARIN
OrgTechName: Prendergast, John
OrgTechPhone: +1-518-392-1211
OrgTechEmail: jprendergast@fairpoint.com
OrgTechRef: https://rdap.arin.net/registry/entity/JPR89-ARIN
OrgTechHandle: COOKM69-ARIN
OrgTechName: Cook, Martin
OrgTechPhone: +1-603-722-9888
OrgTechEmail: martin.cook@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/COOKM69-ARIN
OrgTechHandle: PETER825-ARIN
OrgTechName: Peterson, Corey
OrgTechPhone: +1-603-528-7315
OrgTechEmail: corey.peterson@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/PETER825-ARIN
OrgTechHandle: WEINR17-ARIN
OrgTechName: Weinrub, Jeremy
OrgTechPhone: +1-916-772-5000
OrgTechEmail: jeremy.weinrub@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/WEINR17-ARIN
OrgTechHandle: BOUIN-ARIN
OrgTechName: Bouington, Michael
OrgTechPhone: +1-850-229-7293
OrgTechEmail: michael.bouington@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/BOUIN-ARIN
OrgTechHandle: JENKI512-ARIN
OrgTechName: Jenkins, Johnathan
OrgTechPhone: +1-603-707-8630
OrgTechEmail: Johnathan.Jenkins@Consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/JENKI512-ARIN
OrgTechHandle: SOLAK1-ARIN
OrgTechName: Solak, William
OrgTechPhone: +1-603-222-8170
OrgTechEmail: william.solak@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/SOLAK1-ARIN
OrgTechHandle: MCKEN241-ARIN
OrgTechName: McKenney, Christopher
OrgTechPhone: +1-603-229-1493
OrgTechEmail: chris.mckenney@consolidated.com
OrgTechRef: https://rdap.arin.net/registry/entity/MCKEN241-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.195.129.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;209.195.129.133. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 04:25:33 CST 2026
;; MSG SIZE rcvd: 108
Host 133.129.195.209.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 133.129.195.209.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 171.13.14.83 | attack | Fail2Ban Ban Triggered |
2020-02-19 23:11:09 |
| 197.220.206.197 | attack | DATE:2020-02-19 14:35:07, IP:197.220.206.197, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq) |
2020-02-19 23:17:09 |
| 200.196.253.251 | attackbots | Feb 19 15:22:53 silence02 sshd[14198]: Failed password for man from 200.196.253.251 port 57462 ssh2 Feb 19 15:26:14 silence02 sshd[14465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251 Feb 19 15:26:17 silence02 sshd[14465]: Failed password for invalid user ec2-user from 200.196.253.251 port 58276 ssh2 |
2020-02-19 22:40:25 |
| 117.114.161.11 | attackbotsspam | firewall-block, port(s): 1433/tcp |
2020-02-19 23:07:58 |
| 196.52.43.51 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 23:17:38 |
| 14.189.253.10 | attackspambots | 445/tcp [2020-02-19]1pkt |
2020-02-19 23:25:55 |
| 125.44.73.151 | attack | 23/tcp [2020-02-19]1pkt |
2020-02-19 22:53:54 |
| 120.142.160.8 | attack | 2223/tcp [2020-02-19]1pkt |
2020-02-19 22:56:34 |
| 154.209.65.21 | attackbotsspam | Feb 19 16:26:29 site1 sshd\[13250\]: Invalid user digitaldsvm from 154.209.65.21Feb 19 16:26:31 site1 sshd\[13250\]: Failed password for invalid user digitaldsvm from 154.209.65.21 port 49504 ssh2Feb 19 16:30:03 site1 sshd\[13409\]: Invalid user mailman from 154.209.65.21Feb 19 16:30:05 site1 sshd\[13409\]: Failed password for invalid user mailman from 154.209.65.21 port 43942 ssh2Feb 19 16:33:46 site1 sshd\[13524\]: Invalid user web from 154.209.65.21Feb 19 16:33:48 site1 sshd\[13524\]: Failed password for invalid user web from 154.209.65.21 port 38380 ssh2 ... |
2020-02-19 22:56:05 |
| 123.17.179.20 | attackbotsspam | 445/tcp [2020-02-19]1pkt |
2020-02-19 22:59:32 |
| 222.186.175.23 | attackbots | Feb 19 16:14:10 rotator sshd\[6367\]: Failed password for root from 222.186.175.23 port 21521 ssh2Feb 19 16:14:13 rotator sshd\[6367\]: Failed password for root from 222.186.175.23 port 21521 ssh2Feb 19 16:14:16 rotator sshd\[6367\]: Failed password for root from 222.186.175.23 port 21521 ssh2Feb 19 16:18:01 rotator sshd\[7146\]: Failed password for root from 222.186.175.23 port 34046 ssh2Feb 19 16:18:03 rotator sshd\[7146\]: Failed password for root from 222.186.175.23 port 34046 ssh2Feb 19 16:18:07 rotator sshd\[7146\]: Failed password for root from 222.186.175.23 port 34046 ssh2 ... |
2020-02-19 23:20:52 |
| 14.162.35.102 | attackbotsspam | 20/2/19@08:37:16: FAIL: Alarm-Network address from=14.162.35.102 20/2/19@08:37:16: FAIL: Alarm-Network address from=14.162.35.102 ... |
2020-02-19 22:50:47 |
| 105.155.71.122 | attack | 23/tcp [2020-02-19]1pkt |
2020-02-19 23:07:36 |
| 104.206.128.38 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 23:15:30 |
| 148.70.134.52 | attack | Feb 19 04:25:27 php1 sshd\[4401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.134.52 user=backup Feb 19 04:25:29 php1 sshd\[4401\]: Failed password for backup from 148.70.134.52 port 45086 ssh2 Feb 19 04:34:28 php1 sshd\[5294\]: Invalid user cnc from 148.70.134.52 Feb 19 04:34:28 php1 sshd\[5294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.134.52 Feb 19 04:34:30 php1 sshd\[5294\]: Failed password for invalid user cnc from 148.70.134.52 port 44678 ssh2 |
2020-02-19 23:03:51 |