City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 2600:1F00:: - 2600:1FFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR: 2600:1F00::/24
NetName: AMZ-EC2
NetHandle: NET6-2600-1F00-1
Parent: NET6-2600 (NET6-2600-1)
NetType: Direct Allocation
OriginAS:
Organization: Amazon.com, Inc. (AMAZO-4)
RegDate: 2014-10-17
Updated: 2014-10-17
Comment: -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Ref: https://rdap.arin.net/registry/ip/2600:1F00::
OrgName: Amazon.com, Inc.
OrgId: AMAZO-4
Address: Amazon Web Services, Inc.
Address: P.O. Box 81226
City: Seattle
StateProv: WA
PostalCode: 98108-1226
Country: US
RegDate: 2005-09-29
Updated: 2022-09-30
Comment: For details of this service please see
Comment: http://ec2.amazonaws.com
Ref: https://rdap.arin.net/registry/entity/AMAZO-4
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
# end
# start
NetRange: 2600:1F14:: - 2600:1F14:1FFF:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR: 2600:1F14::/35
NetName: AMAZON-PDX-V6
NetHandle: NET6-2600-1F14-1
Parent: AMZ-EC2 (NET6-2600-1F00-1)
NetType: Reallocated
OriginAS:
Organization: Amazon.com, Inc. (AMAZO-47)
RegDate: 2016-12-16
Updated: 2016-12-16
Ref: https://rdap.arin.net/registry/ip/2600:1F14::
OrgName: Amazon.com, Inc.
OrgId: AMAZO-47
Address: EC2, EC2 1200 12th Ave South
City: Seattle
StateProv: WA
PostalCode: 98144
Country: US
RegDate: 2011-05-10
Updated: 2021-07-22
Ref: https://rdap.arin.net/registry/entity/AMAZO-47
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2600:1f14:b62:9e04:3856:6ed2:492c:9974
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2600:1f14:b62:9e04:3856:6ed2:492c:9974. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sun Oct 05 10:18:42 CST 2025
;; MSG SIZE rcvd: 67
'
Host 4.7.9.9.c.2.9.4.2.d.e.6.6.5.8.3.4.0.e.9.2.6.b.0.4.1.f.1.0.0.6.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 4.7.9.9.c.2.9.4.2.d.e.6.6.5.8.3.4.0.e.9.2.6.b.0.4.1.f.1.0.0.6.2.ip6.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
198.108.67.25 | attack | Honeypot attack, port: 2, PTR: worker-16.sfj.corp.censys.io. |
2020-05-06 00:31:01 |
211.159.168.46 | attackbotsspam | May 5 15:24:18 vps639187 sshd\[14348\]: Invalid user apache2 from 211.159.168.46 port 59990 May 5 15:24:18 vps639187 sshd\[14348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.168.46 May 5 15:24:20 vps639187 sshd\[14348\]: Failed password for invalid user apache2 from 211.159.168.46 port 59990 ssh2 ... |
2020-05-06 01:00:43 |
193.70.37.148 | attack | Ssh brute force |
2020-05-06 00:41:38 |
134.122.73.25 | attack | May 5 18:42:27 localhost sshd\[27919\]: Invalid user kenneth from 134.122.73.25 May 5 18:42:27 localhost sshd\[27919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.73.25 May 5 18:42:29 localhost sshd\[27919\]: Failed password for invalid user kenneth from 134.122.73.25 port 42266 ssh2 May 5 18:48:25 localhost sshd\[28252\]: Invalid user admin from 134.122.73.25 May 5 18:48:25 localhost sshd\[28252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.73.25 ... |
2020-05-06 01:02:40 |
111.231.225.162 | attackspambots | $f2bV_matches |
2020-05-06 00:48:13 |
173.225.101.99 | attackspam | Scan ports |
2020-05-06 00:25:09 |
103.99.17.56 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-06 00:48:32 |
223.31.104.250 | attackbots | Unauthorized connection attempt from IP address 223.31.104.250 on Port 445(SMB) |
2020-05-06 00:52:53 |
187.12.167.85 | attackbots | prod6 ... |
2020-05-06 01:01:10 |
87.21.15.113 | attackspam | May 5 14:56:45 marvibiene sshd[24351]: Invalid user grant from 87.21.15.113 port 62773 May 5 14:56:45 marvibiene sshd[24351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.21.15.113 May 5 14:56:45 marvibiene sshd[24351]: Invalid user grant from 87.21.15.113 port 62773 May 5 14:56:47 marvibiene sshd[24351]: Failed password for invalid user grant from 87.21.15.113 port 62773 ssh2 ... |
2020-05-06 01:03:36 |
77.109.173.12 | attackbots | prod8 ... |
2020-05-06 00:46:48 |
116.113.12.59 | attack | Scanning |
2020-05-06 00:44:13 |
198.108.67.22 | attackspam | port |
2020-05-06 00:27:43 |
114.67.105.220 | attack | Lines containing failures of 114.67.105.220 May 5 10:54:43 linuxrulz sshd[31654]: Invalid user neha from 114.67.105.220 port 53934 May 5 10:54:43 linuxrulz sshd[31654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220 May 5 10:54:45 linuxrulz sshd[31654]: Failed password for invalid user neha from 114.67.105.220 port 53934 ssh2 May 5 10:54:46 linuxrulz sshd[31654]: Received disconnect from 114.67.105.220 port 53934:11: Bye Bye [preauth] May 5 10:54:46 linuxrulz sshd[31654]: Disconnected from invalid user neha 114.67.105.220 port 53934 [preauth] May 5 11:10:43 linuxrulz sshd[1912]: Invalid user client from 114.67.105.220 port 51008 May 5 11:10:43 linuxrulz sshd[1912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.220 May 5 11:10:45 linuxrulz sshd[1912]: Failed password for invalid user client from 114.67.105.220 port 51008 ssh2 May 5 11:10:46 linuxrulz ssh........ ------------------------------ |
2020-05-06 00:27:16 |
45.76.183.235 | attack | $f2bV_matches |
2020-05-06 00:55:17 |