City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.180.240.0 - 216.180.247.255
CIDR: 216.180.240.0/21
NetName: NTHL
NetHandle: NET-216-180-240-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: NETWORK TRANSIT HOLDINGS LLC (NTHL)
RegDate: 2002-06-19
Updated: 2023-11-13
Ref: https://rdap.arin.net/registry/ip/216.180.240.0
OrgName: NETWORK TRANSIT HOLDINGS LLC
OrgId: NTHL
Address: 2626 Spring Cypress Road
City: Spring
StateProv: TX
PostalCode: 77388
Country: US
RegDate: 2016-07-01
Updated: 2026-01-07
Comment: All DMCA requests must be mailed to:
Comment:
Comment: Network Transit Holdings LLC
Comment: 2626 Spring Cypress Road
Comment: Spring, TX 77388
Ref: https://rdap.arin.net/registry/entity/NTHL
OrgAbuseHandle: ABUSE5641-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-281-942-2800
OrgAbuseEmail: abuse@networktransit.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5641-ARIN
OrgNOCHandle: NETWO7681-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-844-252-5683
OrgNOCEmail: noc@networktransit.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO7681-ARIN
OrgTechHandle: PROST1-ARIN
OrgTechName: Proston, Serg
OrgTechPhone: +1-844-252-5683
OrgTechEmail: sprotsun@networktransit.net
OrgTechRef: https://rdap.arin.net/registry/entity/PROST1-ARIN
OrgTechHandle: NETWO7681-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-844-252-5683
OrgTechEmail: noc@networktransit.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO7681-ARIN
RNOCHandle: NETWO7681-ARIN
RNOCName: Network Operations
RNOCPhone: +1-844-252-5683
RNOCEmail: noc@networktransit.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO7681-ARIN
RAbuseHandle: ABUSE5641-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-281-942-2800
RAbuseEmail: abuse@networktransit.net
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5641-ARIN
RTechHandle: NETWO7681-ARIN
RTechName: Network Operations
RTechPhone: +1-844-252-5683
RTechEmail: noc@networktransit.net
RTechRef: https://rdap.arin.net/registry/entity/NETWO7681-ARIN
# end
# start
NetRange: 216.180.246.0 - 216.180.246.255
CIDR: 216.180.246.0/24
NetName: NET-216-180-246-0-24
NetHandle: NET-216-180-246-0-1
Parent: NTHL (NET-216-180-240-0-1)
NetType: Reallocated
OriginAS:
Organization: IPXO LLC (IL-845)
RegDate: 2024-07-15
Updated: 2024-07-15
Ref: https://rdap.arin.net/registry/ip/216.180.246.0
OrgName: IPXO LLC
OrgId: IL-845
Address: 3132 State Street
City: Dallas
StateProv: TX
PostalCode: 75204-3500
Country: US
RegDate: 2021-03-25
Updated: 2025-09-10
Comment: Geofeed https://geofeed.ipxo.com/geofeed.txt
Ref: https://rdap.arin.net/registry/entity/IL-845
OrgDNSHandle: IST36-ARIN
OrgDNSName: IPXO Support Team
OrgDNSPhone: +1 (650) 564-3425
OrgDNSEmail: support@ipxo.com
OrgDNSRef: https://rdap.arin.net/registry/entity/IST36-ARIN
OrgAbuseHandle: IAMT1-ARIN
OrgAbuseName: IPXO Abuse Management Team
OrgAbusePhone: +1 (650) 934-1667
OrgAbuseEmail: abuse@ipxo.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IAMT1-ARIN
OrgTechHandle: IST36-ARIN
OrgTechName: IPXO Support Team
OrgTechPhone: +1 (650) 564-3425
OrgTechEmail: support@ipxo.com
OrgTechRef: https://rdap.arin.net/registry/entity/IST36-ARIN
# end
# start
NetRange: 216.180.246.0 - 216.180.246.255
CIDR: 216.180.246.0/24
NetName: NETUTILS
NetHandle: NET-216-180-246-0-2
Parent: NET-216-180-246-0-24 (NET-216-180-246-0-1)
NetType: Reallocated
OriginAS:
Organization: Internet Utilities NA LLC (DCL-577)
RegDate: 2025-01-07
Updated: 2025-01-07
Ref: https://rdap.arin.net/registry/ip/216.180.246.0
OrgName: Internet Utilities NA LLC
OrgId: DCL-577
Address: 2711 Centerville Road
City: Wilmington
StateProv: DE
PostalCode: 19808
Country: US
RegDate: 2015-11-18
Updated: 2024-08-23
Ref: https://rdap.arin.net/registry/entity/DCL-577
OrgAbuseHandle: IUA-ARIN
OrgAbuseName: Internet Utilities Abuse
OrgAbusePhone: +1-650-934-1667
OrgAbuseEmail: report@abuseradar.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IUA-ARIN
OrgTechHandle: IUS-ARIN
OrgTechName: Internet Utilities Support
OrgTechPhone: +1-650-564-3425
OrgTechEmail: support@netutils.io
OrgTechRef: https://rdap.arin.net/registry/entity/IUS-ARIN
# end
# start
NetRange: 216.180.246.0 - 216.180.246.255
CIDR: 216.180.246.0/24
NetName: NET-216-180-246-0-24
NetHandle: NET-216-180-246-0-3
Parent: NETUTILS (NET-216-180-246-0-2)
NetType: Reassigned
OriginAS:
Customer: Private Customer (C11319774)
RegDate: 2025-08-18
Updated: 2025-08-18
Comment: report@abuseradar.com
Comment: Geofeed https://geofeed.ipxo.com/geofeed.txt
Ref: https://rdap.arin.net/registry/ip/216.180.246.0
CustName: Private Customer
Address: Private Residence
City: Massy
StateProv:
PostalCode: 91300
Country: FR
RegDate: 2025-08-18
Updated: 2025-08-18
Ref: https://rdap.arin.net/registry/entity/C11319774
OrgAbuseHandle: IUA-ARIN
OrgAbuseName: Internet Utilities Abuse
OrgAbusePhone: +1-650-934-1667
OrgAbuseEmail: report@abuseradar.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/IUA-ARIN
OrgTechHandle: IUS-ARIN
OrgTechName: Internet Utilities Support
OrgTechPhone: +1-650-564-3425
OrgTechEmail: support@netutils.io
OrgTechRef: https://rdap.arin.net/registry/entity/IUS-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.180.246.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.180.246.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 20:00:06 CST 2026
;; MSG SIZE rcvd: 107
39.246.180.216.in-addr.arpa domain name pointer crawler039.deepfield.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.246.180.216.in-addr.arpa name = crawler039.deepfield.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 39.107.158.176 | attack | Automatic report - Port Scan Attack |
2020-01-16 15:14:14 |
| 222.186.180.9 | attackbotsspam | Jan 16 08:14:55 MK-Soft-VM7 sshd[11780]: Failed password for root from 222.186.180.9 port 15414 ssh2 Jan 16 08:15:01 MK-Soft-VM7 sshd[11780]: Failed password for root from 222.186.180.9 port 15414 ssh2 ... |
2020-01-16 15:29:39 |
| 222.186.180.6 | attackspam | SSH Brute Force, server-1 sshd[27689]: Failed password for root from 222.186.180.6 port 57774 ssh2 |
2020-01-16 15:16:42 |
| 152.32.185.30 | attack | Unauthorized connection attempt detected from IP address 152.32.185.30 to port 2220 [J] |
2020-01-16 15:05:25 |
| 106.12.58.4 | attack | Jan 16 00:13:27 ny01 sshd[8715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4 Jan 16 00:13:29 ny01 sshd[8715]: Failed password for invalid user fabrizio from 106.12.58.4 port 59144 ssh2 Jan 16 00:14:26 ny01 sshd[8803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4 |
2020-01-16 15:23:17 |
| 31.211.65.102 | attackspambots | Jan 15 21:15:26 auw2 sshd\[28423\]: Invalid user haresh from 31.211.65.102 Jan 15 21:15:26 auw2 sshd\[28423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.211.65.102 Jan 15 21:15:28 auw2 sshd\[28423\]: Failed password for invalid user haresh from 31.211.65.102 port 56321 ssh2 Jan 15 21:20:35 auw2 sshd\[28756\]: Invalid user dexter from 31.211.65.102 Jan 15 21:20:35 auw2 sshd\[28756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.211.65.102 |
2020-01-16 15:20:58 |
| 188.166.220.17 | attack | Unauthorized connection attempt detected from IP address 188.166.220.17 to port 2220 [J] |
2020-01-16 15:15:08 |
| 179.107.111.106 | attack | Unauthorized connection attempt detected from IP address 179.107.111.106 to port 2220 [J] |
2020-01-16 15:38:00 |
| 196.47.67.180 | attackbots | Unauthorized connection attempt detected from IP address 196.47.67.180 to port 2220 [J] |
2020-01-16 15:46:59 |
| 62.234.190.206 | attackbotsspam | Unauthorized connection attempt detected from IP address 62.234.190.206 to port 2220 [J] |
2020-01-16 15:10:08 |
| 52.178.134.11 | attack | "SSH brute force auth login attempt." |
2020-01-16 15:27:18 |
| 36.73.172.200 | attackspam | 1579150282 - 01/16/2020 05:51:22 Host: 36.73.172.200/36.73.172.200 Port: 445 TCP Blocked |
2020-01-16 15:39:19 |
| 64.44.40.66 | attackspam | Unauthorized connection attempt detected from IP address 64.44.40.66 to port 23 [J] |
2020-01-16 15:26:46 |
| 218.82.36.21 | attackspam | Jan 16 05:27:35 ns4 sshd[25487]: reveeclipse mapping checking getaddrinfo for 21.36.82.218.broad.xw.sh.dynamic.163data.com.cn [218.82.36.21] failed - POSSIBLE BREAK-IN ATTEMPT! Jan 16 05:27:35 ns4 sshd[25487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.82.36.21 user=r.r Jan 16 05:27:36 ns4 sshd[25487]: Failed password for r.r from 218.82.36.21 port 47628 ssh2 Jan 16 05:27:37 ns4 sshd[25488]: Received disconnect from 218.82.36.21: 11: Bye Bye Jan 16 05:45:46 ns4 sshd[28074]: reveeclipse mapping checking getaddrinfo for 21.36.82.218.broad.xw.sh.dynamic.163data.com.cn [218.82.36.21] failed - POSSIBLE BREAK-IN ATTEMPT! Jan 16 05:45:46 ns4 sshd[28074]: Invalid user lbw from 218.82.36.21 Jan 16 05:45:46 ns4 sshd[28074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.82.36.21 Jan 16 05:45:48 ns4 sshd[28074]: Failed password for invalid user lbw from 218.82.36.21 port 47316 ssh2 Jan ........ ------------------------------- |
2020-01-16 15:32:07 |
| 2.91.78.192 | attackbotsspam | Jan 16 05:51:16 grey postfix/smtpd\[6673\]: NOQUEUE: reject: RCPT from unknown\[2.91.78.192\]: 554 5.7.1 Service unavailable\; Client host \[2.91.78.192\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[2.91.78.192\]\; from=\ |
2020-01-16 15:43:06 |