City: unknown
Region: Iowa
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.81.128.0 - 216.81.255.255
CIDR: 216.81.128.0/17
NetName: LIGHTEDGE-BLK-001
NetHandle: NET-216-81-128-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: LightEdge Solutions (LIGHT-41)
RegDate: 1998-09-25
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/216.81.128.0
OrgName: LightEdge Solutions
OrgId: LIGHT-41
Address: 909 Locust Street
Address: Suite 301
City: Des Moines
StateProv: IA
PostalCode: 50309
Country: US
RegDate: 2006-12-28
Updated: 2018-09-13
Ref: https://rdap.arin.net/registry/entity/LIGHT-41
ReferralServer: rwhois://rwhois.lh.net:4321
OrgTechHandle: IL68-ARIN
OrgTechName: LightEdge Hostmaster
OrgTechPhone: +1-515-471-1000
OrgTechEmail: hostmaster@lightedge.com
OrgTechRef: https://rdap.arin.net/registry/entity/IL68-ARIN
OrgNOCHandle: LIGHT71-ARIN
OrgNOCName: LightEdge NOC
OrgNOCPhone: +1-515-471-1000
OrgNOCEmail: support@lightedge.com
OrgNOCRef: https://rdap.arin.net/registry/entity/LIGHT71-ARIN
OrgAbuseHandle: LIGHT7-ARIN
OrgAbuseName: LightEdge Abuse
OrgAbusePhone: +1-515-471-1000
OrgAbuseEmail: abuse@lightedge.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIGHT7-ARIN
# end
# start
NetRange: 216.81.245.0 - 216.81.245.255
CIDR: 216.81.245.0/24
NetName: MASSEDCOMPUTE-05
NetHandle: NET-216-81-245-0-1
Parent: LIGHTEDGE-BLK-001 (NET-216-81-128-0-1)
NetType: Reassigned
OriginAS:
Organization: Massed Compute (MCL-2382)
RegDate: 2026-03-09
Updated: 2026-03-09
Comment: https://massedcompute.com/
Ref: https://rdap.arin.net/registry/ip/216.81.245.0
OrgName: Massed Compute
OrgId: MCL-2382
Address: 101 Convention Center Dr., Suite 900
City: Las Vegas
StateProv: NV
PostalCode: 89109
Country: US
RegDate: 2022-08-12
Updated: 2026-02-12
Ref: https://rdap.arin.net/registry/entity/MCL-2382
OrgNOCHandle: TECHN2019-ARIN
OrgNOCName: technical
OrgNOCPhone: +1-316-210-1178
OrgNOCEmail: techadmin@massedcompute.com
OrgNOCRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgAbuseHandle: ABUSE9536-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-316-210-1178
OrgAbuseEmail: abuse@massedcompute.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9536-ARIN
OrgTechHandle: TECHN2019-ARIN
OrgTechName: technical
OrgTechPhone: +1-316-210-1178
OrgTechEmail: techadmin@massedcompute.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgRoutingHandle: TECHN2019-ARIN
OrgRoutingName: technical
OrgRoutingPhone: +1-316-210-1178
OrgRoutingEmail: techadmin@massedcompute.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
OrgDNSHandle: TECHN2019-ARIN
OrgDNSName: technical
OrgDNSPhone: +1-316-210-1178
OrgDNSEmail: techadmin@massedcompute.com
OrgDNSRef: https://rdap.arin.net/registry/entity/TECHN2019-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.lh.net:4321.
%rwhois V-1.5 rwhois.lightedge.com (rwhoisd 0.4.1)
network:id:LIGHTEDGE-BLK-001
network:class-name:network
network:network-name:LIGHTEDGE-BLK-001
network:ip-network:216.81.128.0/17
network:org-name:LightEdge Solutions, Inc.
network:street-address:666 Walnut Street
network:city:Des Moines
network:state:IA
network:postal-code:50309
network:country-code:US
network:tech-contact:support@lightedge.com
network:created:20010101
network:updated:20030101
network:updated-by:support@lightedge.com
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.81.245.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.81.245.108. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 14:31:04 CST 2026
;; MSG SIZE rcvd: 107
108.245.81.216.in-addr.arpa domain name pointer ip108.gazettecommunications.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
108.245.81.216.in-addr.arpa name = ip108.gazettecommunications.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.0.113.214 | attackbots | Aug 27 11:46:39 mail.srvfarm.net postfix/smtpd[1519780]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: Aug 27 11:46:40 mail.srvfarm.net postfix/smtpd[1519780]: lost connection after AUTH from unknown[196.0.113.214] Aug 27 11:49:24 mail.srvfarm.net postfix/smtpd[1519775]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: Aug 27 11:49:25 mail.srvfarm.net postfix/smtpd[1519775]: lost connection after AUTH from unknown[196.0.113.214] Aug 27 11:55:49 mail.srvfarm.net postfix/smtpd[1519776]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: |
2020-08-28 07:06:13 |
| 51.75.28.134 | attackspambots | Invalid user ee from 51.75.28.134 port 41116 |
2020-08-28 06:59:24 |
| 213.195.222.60 | attackspam | Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: lost connection after AUTH from unknown[213.195.222.60] Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: lost connection after AUTH from unknown[213.195.222.60] Aug 27 06:15:11 mail.srvfarm.net postfix/smtps/smtpd[1382747]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: |
2020-08-28 07:03:58 |
| 121.122.99.187 | attackbots | Automatic report - Port Scan Attack |
2020-08-28 06:46:04 |
| 222.186.169.192 | attackbotsspam | Aug 27 22:30:29 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2 Aug 27 22:30:33 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2 Aug 27 22:30:36 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2 Aug 27 22:30:40 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2 ... |
2020-08-28 06:32:25 |
| 111.93.71.219 | attack | 2020-08-27T21:19:01.754911shield sshd\[21874\]: Invalid user deploy from 111.93.71.219 port 60682 2020-08-27T21:19:01.794423shield sshd\[21874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219 2020-08-27T21:19:03.749817shield sshd\[21874\]: Failed password for invalid user deploy from 111.93.71.219 port 60682 ssh2 2020-08-27T21:22:58.973378shield sshd\[23106\]: Invalid user demo from 111.93.71.219 port 35226 2020-08-27T21:22:59.024381shield sshd\[23106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219 |
2020-08-28 07:02:19 |
| 211.108.69.103 | attackspam | Aug 28 00:25:15 santamaria sshd\[927\]: Invalid user sdk from 211.108.69.103 Aug 28 00:25:16 santamaria sshd\[927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.108.69.103 Aug 28 00:25:17 santamaria sshd\[927\]: Failed password for invalid user sdk from 211.108.69.103 port 60568 ssh2 ... |
2020-08-28 07:04:29 |
| 159.65.145.160 | attack | C1,WP GET /tim-und-struppi/test/wp-login.php |
2020-08-28 06:42:07 |
| 189.89.185.254 | attackspambots | Port probing on unauthorized port 445 |
2020-08-28 06:48:20 |
| 203.249.17.86 | attack | Aug 27 23:40:48 plg sshd[26959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 Aug 27 23:40:49 plg sshd[26959]: Failed password for invalid user user from 203.249.17.86 port 58458 ssh2 Aug 27 23:44:15 plg sshd[26985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 user=root Aug 27 23:44:17 plg sshd[26985]: Failed password for invalid user root from 203.249.17.86 port 46516 ssh2 Aug 27 23:47:34 plg sshd[27011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 user=root Aug 27 23:47:36 plg sshd[27011]: Failed password for invalid user root from 203.249.17.86 port 34572 ssh2 ... |
2020-08-28 06:41:39 |
| 141.98.10.195 | attackbotsspam | 2020-08-27T02:27:49.614386correo.[domain] sshd[4647]: Invalid user 1234 from 141.98.10.195 port 56016 2020-08-27T02:27:52.155130correo.[domain] sshd[4647]: Failed password for invalid user 1234 from 141.98.10.195 port 56016 ssh2 2020-08-27T02:28:30.221792correo.[domain] sshd[4756]: Invalid user user from 141.98.10.195 port 43906 ... |
2020-08-28 06:58:54 |
| 192.241.225.90 | attackspam | Honeypot hit: [2020-08-28 00:07:44 +0300] Connected from 192.241.225.90 to (HoneypotIP):995 |
2020-08-28 06:38:50 |
| 190.194.152.238 | attack | Invalid user josiane from 190.194.152.238 port 60234 |
2020-08-28 06:35:31 |
| 107.174.245.4 | attackspambots | Aug 27 22:17:39 jumpserver sshd[58901]: Invalid user flf from 107.174.245.4 port 46714 Aug 27 22:17:41 jumpserver sshd[58901]: Failed password for invalid user flf from 107.174.245.4 port 46714 ssh2 Aug 27 22:22:56 jumpserver sshd[58953]: Invalid user xff from 107.174.245.4 port 53824 ... |
2020-08-28 06:40:35 |
| 161.35.193.16 | attack | SSH Invalid Login |
2020-08-28 06:44:39 |