City: Santa Clara
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 45.38.0.0 - 45.39.255.255
CIDR: 45.38.0.0/15
NetName: EGN-22
NetHandle: NET-45-38-0-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: EGIHosting (EGNL-1)
RegDate: 2015-03-18
Updated: 2023-07-19
Comment: http://egihosting.com
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/45.38.0.0
OrgName: EGIHosting
OrgId: EGNL-1
Address: 3223 Kenneth Street
City: Santa Clara
StateProv: CA
PostalCode: 95054
Country: US
RegDate: 2007-07-23
Updated: 2025-04-01
Comment: http://egihosting.com
Comment: Geofeed https://geofeed.egihosting.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/EGNL-1
OrgTechHandle: CHENJ-ARIN
OrgTechName: Chen, James
OrgTechPhone: +1-408-228-4448
OrgTechEmail: james@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/CHENJ-ARIN
OrgTechHandle: HERNA1269-ARIN
OrgTechName: Hernandez, Aaron
OrgTechPhone: +1-408-228-4448
OrgTechEmail: aaron@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/HERNA1269-ARIN
OrgTechHandle: TRANH54-ARIN
OrgTechName: Tran, Hung
OrgTechPhone: +1-408-581-1984
OrgTechEmail: htran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANH54-ARIN
OrgNOCHandle: NOC2660-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-888-808-8806
OrgNOCEmail: noc@egihosting.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgRoutingHandle: NOC2660-ARIN
OrgRoutingName: Network Operations Center
OrgRoutingPhone: +1-888-808-8806
OrgRoutingEmail: noc@egihosting.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/NOC2660-ARIN
OrgAbuseHandle: ABUSE1715-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-888-808-8806
OrgAbuseEmail: abuse@egihosting.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1715-ARIN
OrgTechHandle: KUMAR396-ARIN
OrgTechName: kumar, Indhira
OrgTechPhone: +1-408-228-4448
OrgTechEmail: indra.kumar@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KUMAR396-ARIN
OrgTechHandle: TRANR22-ARIN
OrgTechName: Tran, Ryan
OrgTechPhone: +1-408-228-4448
OrgTechEmail: rtran@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/TRANR22-ARIN
OrgTechHandle: SIMKI10-ARIN
OrgTechName: Simkiss, John
OrgTechPhone: +1-408-228-4448
OrgTechEmail: jas3@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/SIMKI10-ARIN
OrgTechHandle: KTBIJ-ARIN
OrgTechName: KT, Bijoy
OrgTechPhone: +1-888-808-8806
OrgTechEmail: egni@egihosting.com
OrgTechRef: https://rdap.arin.net/registry/entity/KTBIJ-ARIN
# end
# start
NetRange: 45.38.44.0 - 45.38.44.255
CIDR: 45.38.44.0/24
NetName: 45-38-44-0-1
NetHandle: NET-45-38-44-0-1
Parent: EGN-22 (NET-45-38-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Nodestop LLC (MP-1065)
RegDate: 2024-10-29
Updated: 2024-10-29
Ref: https://rdap.arin.net/registry/ip/45.38.44.0
OrgName: Nodestop LLC
OrgId: MP-1065
Address: 530 Main Street
Address: Suite 1061
City: Chester
StateProv: NJ
PostalCode: 07930
Country: US
RegDate: 2022-03-04
Updated: 2025-06-11
Ref: https://rdap.arin.net/registry/entity/MP-1065
OrgAbuseHandle: ABUSE8642-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-862-348-9978
OrgAbuseEmail: abuse@nodestop.io
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8642-ARIN
OrgRoutingHandle: PICCI15-ARIN
OrgRoutingName: Piccininni, Nino
OrgRoutingPhone: +1-862-348-9978
OrgRoutingEmail: ninop@nodestop.io
OrgRoutingRef: https://rdap.arin.net/registry/entity/PICCI15-ARIN
OrgTechHandle: PICCI15-ARIN
OrgTechName: Piccininni, Nino
OrgTechPhone: +1-862-348-9978
OrgTechEmail: ninop@nodestop.io
OrgTechRef: https://rdap.arin.net/registry/entity/PICCI15-ARIN
OrgDNSHandle: PICCI15-ARIN
OrgDNSName: Piccininni, Nino
OrgDNSPhone: +1-862-348-9978
OrgDNSEmail: ninop@nodestop.io
OrgDNSRef: https://rdap.arin.net/registry/entity/PICCI15-ARIN
OrgNOCHandle: PICCI15-ARIN
OrgNOCName: Piccininni, Nino
OrgNOCPhone: +1-862-348-9978
OrgNOCEmail: ninop@nodestop.io
OrgNOCRef: https://rdap.arin.net/registry/entity/PICCI15-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.38.44.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.38.44.226. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100200 1800 900 604800 86400
;; Query time: 168 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 02 15:31:16 CST 2025
;; MSG SIZE rcvd: 105
Host 226.44.38.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 226.44.38.45.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
121.224.97.239 | attackbots | Unauthorised access (Apr 17) SRC=121.224.97.239 LEN=40 TTL=52 ID=3522 TCP DPT=8080 WINDOW=38968 SYN Unauthorised access (Apr 15) SRC=121.224.97.239 LEN=40 TTL=52 ID=38379 TCP DPT=8080 WINDOW=38968 SYN Unauthorised access (Apr 15) SRC=121.224.97.239 LEN=40 TTL=52 ID=40477 TCP DPT=8080 WINDOW=3463 SYN Unauthorised access (Apr 15) SRC=121.224.97.239 LEN=40 TTL=52 ID=62761 TCP DPT=8080 WINDOW=57891 SYN Unauthorised access (Apr 14) SRC=121.224.97.239 LEN=40 TTL=52 ID=7443 TCP DPT=8080 WINDOW=23080 SYN |
2020-04-18 06:33:54 |
162.243.129.57 | attackbotsspam | Port Scan: Events[1] countPorts[1]: 2638 .. |
2020-04-18 05:58:21 |
165.227.66.224 | attack | Invalid user orm from 165.227.66.224 port 48410 |
2020-04-18 06:09:22 |
163.44.153.98 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-04-18 06:13:38 |
150.143.244.2 | attack | Automated report (2020-04-17T12:21:45-07:00). Caught masquerading as Twitterbot. |
2020-04-18 06:14:06 |
74.82.47.3 | attackspam | Port Scan: Events[1] countPorts[1]: 8443 .. |
2020-04-18 06:01:26 |
117.34.210.106 | attackspambots | Apr 17 21:50:36 sigma sshd\[28114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.210.106 user=uuiddApr 17 22:04:29 sigma sshd\[32415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.210.106 user=root ... |
2020-04-18 05:58:46 |
222.186.15.115 | attackbotsspam | Apr 18 00:02:35 plex sshd[23333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Apr 18 00:02:37 plex sshd[23333]: Failed password for root from 222.186.15.115 port 61782 ssh2 |
2020-04-18 06:03:33 |
93.28.14.209 | attack | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-04-18 06:17:46 |
45.127.134.32 | attackbots | Apr 18 04:57:20 our-server-hostname sshd[4059]: Invalid user test12345 from 45.127.134.32 Apr 18 04:57:20 our-server-hostname sshd[4059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.134.32 Apr 18 04:57:22 our-server-hostname sshd[4059]: Failed password for invalid user test12345 from 45.127.134.32 port 33738 ssh2 Apr 18 05:04:55 our-server-hostname sshd[5817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.134.32 user=r.r Apr 18 05:04:57 our-server-hostname sshd[5817]: Failed password for r.r from 45.127.134.32 port 45556 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.127.134.32 |
2020-04-18 06:23:20 |
128.199.79.230 | attackbots | Invalid user butter from 128.199.79.230 port 42896 |
2020-04-18 06:28:34 |
162.243.131.55 | attackbots | GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak |
2020-04-18 06:11:26 |
176.110.124.103 | attackbots | SSH Brute-Force reported by Fail2Ban |
2020-04-18 06:05:25 |
212.64.16.31 | attack | Invalid user ansible from 212.64.16.31 port 56516 |
2020-04-18 06:12:03 |
172.83.4.171 | attackspambots | 2020-04-17T18:15:50.613398sorsha.thespaminator.com sshd[18055]: Invalid user ux from 172.83.4.171 port 35674 2020-04-17T18:15:52.817928sorsha.thespaminator.com sshd[18055]: Failed password for invalid user ux from 172.83.4.171 port 35674 ssh2 ... |
2020-04-18 06:32:23 |