City: Yakima
Region: Washington
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 216.7.34.0 - 216.7.63.255
CIDR: 216.7.34.0/23, 216.7.40.0/21, 216.7.48.0/20, 216.7.36.0/22
NetName: ADVANCED-INTERNET
NetHandle: NET-216-7-34-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Advanced Internet (AISPL-2)
RegDate: 2001-01-03
Updated: 2025-11-07
Comment: Geofeed https://geofeed.advancedisp.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/216.7.34.0
OrgName: Advanced Internet
OrgId: AISPL-2
Address: 1703 University Parkway
City: Yakima
StateProv: WA
PostalCode: 98901
Country: US
RegDate: 2018-03-05
Updated: 2025-10-21
Ref: https://rdap.arin.net/registry/entity/AISPL-2
OrgAbuseHandle: FRAZI198-ARIN
OrgAbuseName: Frazier, Devin
OrgAbusePhone: +1-509-306-5330
OrgAbuseEmail: devin@advancedisp.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/FRAZI198-ARIN
OrgNOCHandle: RANDO68-ARIN
OrgNOCName: Randolph, Jeff
OrgNOCPhone: +1-509-895-9600
OrgNOCEmail: jeff@advancedisp.com
OrgNOCRef: https://rdap.arin.net/registry/entity/RANDO68-ARIN
OrgRoutingHandle: FRAZI198-ARIN
OrgRoutingName: Frazier, Devin
OrgRoutingPhone: +1-509-306-5330
OrgRoutingEmail: devin@advancedisp.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/FRAZI198-ARIN
OrgTechHandle: FRAZI198-ARIN
OrgTechName: Frazier, Devin
OrgTechPhone: +1-509-306-5330
OrgTechEmail: devin@advancedisp.com
OrgTechRef: https://rdap.arin.net/registry/entity/FRAZI198-ARIN
OrgNOCHandle: FRAZI198-ARIN
OrgNOCName: Frazier, Devin
OrgNOCPhone: +1-509-306-5330
OrgNOCEmail: devin@advancedisp.com
OrgNOCRef: https://rdap.arin.net/registry/entity/FRAZI198-ARIN
OrgAbuseHandle: RANDO68-ARIN
OrgAbuseName: Randolph, Jeff
OrgAbusePhone: +1-509-895-9600
OrgAbuseEmail: jeff@advancedisp.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/RANDO68-ARIN
OrgDNSHandle: FRAZI198-ARIN
OrgDNSName: Frazier, Devin
OrgDNSPhone: +1-509-306-5330
OrgDNSEmail: devin@advancedisp.com
OrgDNSRef: https://rdap.arin.net/registry/entity/FRAZI198-ARIN
OrgTechHandle: RANDO68-ARIN
OrgTechName: Randolph, Jeff
OrgTechPhone: +1-509-895-9600
OrgTechEmail: jeff@advancedisp.com
OrgTechRef: https://rdap.arin.net/registry/entity/RANDO68-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.7.44.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.7.44.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 12:13:43 CST 2026
;; MSG SIZE rcvd: 105
Host 135.44.7.216.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 135.44.7.216.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.160.96.175 | attack | [portscan] Port scan |
2019-09-14 05:09:23 |
| 87.238.237.109 | attackspambots | 13.09.2019 13:09:09 - Wordpress fail Detected by ELinOX-ALM |
2019-09-14 05:06:22 |
| 118.98.121.207 | attackbots | Invalid user ts from 118.98.121.207 port 36206 |
2019-09-14 05:22:26 |
| 51.75.64.86 | attackspambots | Sep 13 20:11:42 saschabauer sshd[10830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.64.86 Sep 13 20:11:44 saschabauer sshd[10830]: Failed password for invalid user zabbix from 51.75.64.86 port 37810 ssh2 |
2019-09-14 04:55:05 |
| 92.118.161.21 | attack | Automatic report - Port Scan Attack |
2019-09-14 05:31:21 |
| 193.124.67.226 | attack | 445/tcp 445/tcp [2019-08-30/09-13]2pkt |
2019-09-14 05:02:24 |
| 117.6.99.218 | attack | 445/tcp 445/tcp 445/tcp... [2019-07-18/09-13]6pkt,1pt.(tcp) |
2019-09-14 04:53:07 |
| 103.38.14.147 | attack | IMAP brute force ... |
2019-09-14 04:51:54 |
| 221.7.213.133 | attack | Sep 13 10:58:45 ip-172-31-62-245 sshd\[15269\]: Invalid user 35 from 221.7.213.133\ Sep 13 10:58:47 ip-172-31-62-245 sshd\[15269\]: Failed password for invalid user 35 from 221.7.213.133 port 39629 ssh2\ Sep 13 11:03:41 ip-172-31-62-245 sshd\[15304\]: Invalid user 176 from 221.7.213.133\ Sep 13 11:03:43 ip-172-31-62-245 sshd\[15304\]: Failed password for invalid user 176 from 221.7.213.133 port 60152 ssh2\ Sep 13 11:08:24 ip-172-31-62-245 sshd\[15347\]: Invalid user admin from 221.7.213.133\ |
2019-09-14 05:23:31 |
| 2606:4700:30::681f:4ade | attack | Sep 13 11:08:28 DDOS Attack: SRC=2606:4700:0030:0000:0000:0000:681f:4ade DST=[Masked] LEN=72 TC=0 HOPLIMIT=60 FLOWLBL=932652 PROTO=TCP SPT=443 DPT=41990 WINDOW=27200 RES=0x00 ACK SYN URGP=0 |
2019-09-14 05:09:52 |
| 222.252.16.68 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-13 10:48:56,694 INFO [amun_request_handler] PortScan Detected on Port: 445 (222.252.16.68) |
2019-09-14 05:23:01 |
| 51.83.42.244 | attack | Sep 13 10:57:15 hanapaa sshd\[30618\]: Invalid user itsupport from 51.83.42.244 Sep 13 10:57:15 hanapaa sshd\[30618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-83-42.eu Sep 13 10:57:16 hanapaa sshd\[30618\]: Failed password for invalid user itsupport from 51.83.42.244 port 33068 ssh2 Sep 13 11:01:05 hanapaa sshd\[30957\]: Invalid user 1 from 51.83.42.244 Sep 13 11:01:05 hanapaa sshd\[30957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-83-42.eu |
2019-09-14 05:07:26 |
| 222.181.11.216 | attack | Sep 13 20:44:09 ip-172-31-1-72 sshd\[25913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.181.11.216 user=root Sep 13 20:44:11 ip-172-31-1-72 sshd\[25913\]: Failed password for root from 222.181.11.216 port 11710 ssh2 Sep 13 20:49:46 ip-172-31-1-72 sshd\[25956\]: Invalid user shelby from 222.181.11.216 Sep 13 20:49:46 ip-172-31-1-72 sshd\[25956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.181.11.216 Sep 13 20:49:48 ip-172-31-1-72 sshd\[25956\]: Failed password for invalid user shelby from 222.181.11.216 port 14974 ssh2 |
2019-09-14 04:55:29 |
| 150.95.24.185 | attackspambots | Invalid user admin from 150.95.24.185 port 38170 |
2019-09-14 05:19:34 |
| 27.106.45.6 | attackspam | Sep 13 08:22:42 hanapaa sshd\[15811\]: Invalid user git from 27.106.45.6 Sep 13 08:22:42 hanapaa sshd\[15811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.106.45.6 Sep 13 08:22:44 hanapaa sshd\[15811\]: Failed password for invalid user git from 27.106.45.6 port 36118 ssh2 Sep 13 08:28:08 hanapaa sshd\[16302\]: Invalid user user1 from 27.106.45.6 Sep 13 08:28:08 hanapaa sshd\[16302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.106.45.6 |
2019-09-14 04:53:28 |