City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 54.105.0.0 - 54.105.255.255
CIDR: 54.105.0.0/16
NetName: MERCK2
NetHandle: NET-54-105-0-0-1
Parent: NET54 (NET-54-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Merck and Co., Inc. (MERCKA)
RegDate: 1992-03-17
Updated: 2024-12-05
Ref: https://rdap.arin.net/registry/ip/54.105.0.0
OrgName: Merck and Co., Inc.
OrgId: MERCKA
Address: 126 East Lincoln Avenue
City: Rahway
StateProv: NJ
PostalCode: 07065
Country: US
RegDate: 1992-03-17
Updated: 2025-05-06
Ref: https://rdap.arin.net/registry/entity/MERCKA
OrgTechHandle: WHITE7-ARIN
OrgTechName: Whitehouse Telecom
OrgTechPhone: +1-908-423-2900
OrgTechEmail: ns_networknoc@merck.com
OrgTechRef: https://rdap.arin.net/registry/entity/WHITE7-ARIN
OrgAbuseHandle: WHITE7-ARIN
OrgAbuseName: Whitehouse Telecom
OrgAbusePhone: +1-908-423-2900
OrgAbuseEmail: ns_networknoc@merck.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/WHITE7-ARIN
OrgNOCHandle: WHITE7-ARIN
OrgNOCName: Whitehouse Telecom
OrgNOCPhone: +1-908-423-2900
OrgNOCEmail: ns_networknoc@merck.com
OrgNOCRef: https://rdap.arin.net/registry/entity/WHITE7-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.105.246.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.105.246.56. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:44:22 CST 2026
;; MSG SIZE rcvd: 106
Host 56.246.105.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 56.246.105.54.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.101.164.27 | attackspambots | SSH login attempts. |
2020-08-22 23:08:48 |
| 218.92.0.251 | attackspambots | Aug 22 16:41:01 cosmoit sshd[27863]: Failed password for root from 218.92.0.251 port 61454 ssh2 |
2020-08-22 22:43:52 |
| 47.59.63.234 | attackspambots | SSH login attempts. |
2020-08-22 22:45:16 |
| 114.182.25.213 | attack | Aug 22 16:33:57 electroncash sshd[4422]: Invalid user max from 114.182.25.213 port 61439 Aug 22 16:33:57 electroncash sshd[4422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.182.25.213 Aug 22 16:33:57 electroncash sshd[4422]: Invalid user max from 114.182.25.213 port 61439 Aug 22 16:33:59 electroncash sshd[4422]: Failed password for invalid user max from 114.182.25.213 port 61439 ssh2 Aug 22 16:37:55 electroncash sshd[5478]: Invalid user eduardo from 114.182.25.213 port 62955 ... |
2020-08-22 22:42:21 |
| 134.209.97.42 | attackspambots | Aug 22 14:50:41 ajax sshd[21180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42 Aug 22 14:50:43 ajax sshd[21180]: Failed password for invalid user police from 134.209.97.42 port 34394 ssh2 |
2020-08-22 22:46:03 |
| 162.142.125.57 | attackbots | port scan and connect, tcp 9200 (elasticsearch) |
2020-08-22 22:41:29 |
| 111.93.175.214 | attackbotsspam | SSH Brute-Forcing (server1) |
2020-08-22 22:51:13 |
| 31.129.132.198 | attack | Aug 22 14:13:55 db sshd[17436]: Invalid user Administrator from 31.129.132.198 port 53614 ... |
2020-08-22 22:53:06 |
| 108.59.8.80 | attackbots | Web bot scraping website [bot:mj12bot] |
2020-08-22 22:34:14 |
| 180.76.109.16 | attackspam | Aug 22 16:56:16 vps333114 sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.109.16 Aug 22 16:56:18 vps333114 sshd[8615]: Failed password for invalid user ftpadmin from 180.76.109.16 port 38952 ssh2 ... |
2020-08-22 22:51:00 |
| 46.101.137.182 | attackspambots | invalid login attempt (oracle) |
2020-08-22 22:28:18 |
| 46.166.198.75 | attackbotsspam | SSH login attempts. |
2020-08-22 22:54:45 |
| 106.54.128.79 | attackbotsspam | Brute force attempt |
2020-08-22 22:54:20 |
| 46.101.4.101 | attackspam | SSH login attempts. |
2020-08-22 23:00:08 |
| 183.111.96.20 | attack | 2020-08-22T14:30:59.922504shield sshd\[11581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20 user=root 2020-08-22T14:31:01.846186shield sshd\[11581\]: Failed password for root from 183.111.96.20 port 57806 ssh2 2020-08-22T14:35:11.773084shield sshd\[12550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20 user=root 2020-08-22T14:35:13.951913shield sshd\[12550\]: Failed password for root from 183.111.96.20 port 58874 ssh2 2020-08-22T14:39:31.225079shield sshd\[13519\]: Invalid user firewall from 183.111.96.20 port 60754 2020-08-22T14:39:31.231607shield sshd\[13519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20 |
2020-08-22 22:43:17 |