City: Odessa
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 24.155.0.0 - 24.155.255.255
CIDR: 24.155.0.0/16
NetName: GRANDECOM-03
NetHandle: NET-24-155-0-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Grande Communications Networks, LLC (GCNI)
RegDate: 2000-04-03
Updated: 2012-02-24
Ref: https://rdap.arin.net/registry/ip/24.155.0.0
OrgName: Grande Communications Networks, LLC
OrgId: GCNI
Address: 401 Carlson Cir
City: San Marcos
StateProv: TX
PostalCode: 78666
Country: US
RegDate: 2001-03-29
Updated: 2015-06-30
Ref: https://rdap.arin.net/registry/entity/GCNI
OrgAbuseHandle: ABUSE153-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-512-878-4000
OrgAbuseEmail: abuse@grandecom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE153-ARIN
OrgTechHandle: IPSER2-ARIN
OrgTechName: IP Services
OrgTechPhone: +1-512-878-4000
OrgTechEmail: ipservices@astound.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPSER2-ARIN
# end
# start
NetRange: 24.155.32.0 - 24.155.33.255
CIDR: 24.155.32.0/23
NetName: GRANDECOM-MARKET02-01
NetHandle: NET-24-155-32-0-1
Parent: GRANDECOM-03 (NET-24-155-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Grande Communications AUSTIN HUB 1 (C05115235)
RegDate: 2014-06-19
Updated: 2014-06-19
Ref: https://rdap.arin.net/registry/ip/24.155.32.0
CustName: Grande Communications AUSTIN HUB 1
Address: 401 Carlson Circle
City: San Marcos
StateProv: TX
PostalCode: 78666
Country: US
RegDate: 2014-06-19
Updated: 2014-06-19
Ref: https://rdap.arin.net/registry/entity/C05115235
OrgAbuseHandle: ABUSE153-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-512-878-4000
OrgAbuseEmail: abuse@grandecom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE153-ARIN
OrgTechHandle: IPSER2-ARIN
OrgTechName: IP Services
OrgTechPhone: +1-512-878-4000
OrgTechEmail: ipservices@astound.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPSER2-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.155.33.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;24.155.33.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 19:27:29 CST 2026
;; MSG SIZE rcvd: 106
136.33.155.24.in-addr.arpa domain name pointer 24-155-33-136.dyn.grandenetworks.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.33.155.24.in-addr.arpa name = 24-155-33-136.dyn.grandenetworks.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.192.61.19 | attackbotsspam | Jan 20 08:06:49 Tower sshd[14566]: Connection from 103.192.61.19 port 51828 on 192.168.10.220 port 22 rdomain "" Jan 20 08:06:51 Tower sshd[14566]: Invalid user client from 103.192.61.19 port 51828 Jan 20 08:06:51 Tower sshd[14566]: error: Could not get shadow information for NOUSER Jan 20 08:06:51 Tower sshd[14566]: Failed password for invalid user client from 103.192.61.19 port 51828 ssh2 Jan 20 08:06:51 Tower sshd[14566]: Received disconnect from 103.192.61.19 port 51828:11: Bye Bye [preauth] Jan 20 08:06:51 Tower sshd[14566]: Disconnected from invalid user client 103.192.61.19 port 51828 [preauth] |
2020-01-20 22:19:01 |
| 69.181.180.81 | attackspambots | Unauthorized connection attempt detected from IP address 69.181.180.81 to port 2220 [J] |
2020-01-20 22:31:33 |
| 103.90.227.164 | attackspambots | Unauthorized connection attempt detected from IP address 103.90.227.164 to port 2220 [J] |
2020-01-20 22:35:56 |
| 103.133.105.146 | attackbots | " " |
2020-01-20 22:30:12 |
| 122.51.198.248 | attackspambots | Jan 20 16:19:24 server sshd\[2164\]: Invalid user teamspeak3 from 122.51.198.248 Jan 20 16:19:24 server sshd\[2164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 Jan 20 16:19:26 server sshd\[2164\]: Failed password for invalid user teamspeak3 from 122.51.198.248 port 40474 ssh2 Jan 20 16:33:20 server sshd\[5734\]: Invalid user sbserver from 122.51.198.248 Jan 20 16:33:20 server sshd\[5734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 ... |
2020-01-20 22:35:33 |
| 80.73.89.111 | attack | Unauthorised access (Jan 20) SRC=80.73.89.111 LEN=52 PREC=0x20 TTL=116 ID=26476 DF TCP DPT=445 WINDOW=8192 SYN |
2020-01-20 22:33:48 |
| 174.255.132.202 | attack | I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used. it was inconclusive on location, is that something you can assist with? Sincerely Jeanie Smith 8175834552 |
2020-01-20 22:47:51 |
| 174.255.132.202 | attack | I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used. it was inconclusive on location, is that something you can assist with? Sincerely Jeanie Smith 8175834552 |
2020-01-20 22:49:13 |
| 185.80.174.196 | attackbotsspam | Port scan on 1 port(s): 8080 |
2020-01-20 22:11:30 |
| 66.249.75.219 | attackspam | WEB_SERVER 403 Forbidden |
2020-01-20 22:47:26 |
| 190.223.41.18 | attack | Unauthorized connection attempt detected from IP address 190.223.41.18 to port 2220 [J] |
2020-01-20 22:26:50 |
| 62.173.149.89 | attackbotsspam | Jan 20 13:54:51 h2177944 kernel: \[2723232.744129\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20004 DPT=9080 WINDOW=512 RES=0x00 SYN URGP=0 Jan 20 13:54:51 h2177944 kernel: \[2723232.744142\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20004 DPT=9080 WINDOW=512 RES=0x00 SYN URGP=0 Jan 20 14:01:54 h2177944 kernel: \[2723655.878110\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20002 DPT=8092 WINDOW=512 RES=0x00 SYN URGP=0 Jan 20 14:01:54 h2177944 kernel: \[2723655.878126\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20002 DPT=8092 WINDOW=512 RES=0x00 SYN URGP=0 Jan 20 14:07:09 h2177944 kernel: \[2723970.615836\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.2 |
2020-01-20 22:12:56 |
| 66.249.69.69 | attackbots | Automatic report - Banned IP Access |
2020-01-20 22:08:49 |
| 202.179.91.193 | attack | Automatic report - Port Scan Attack |
2020-01-20 22:14:18 |
| 35.189.172.158 | attackbotsspam | Jan 20 10:06:32 vps46666688 sshd[25185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158 Jan 20 10:06:35 vps46666688 sshd[25185]: Failed password for invalid user user from 35.189.172.158 port 53032 ssh2 ... |
2020-01-20 22:38:41 |