City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 6.0.0.0 - 6.255.255.255
CIDR: 6.0.0.0/8
NetName: CONUS-YPG-NET
NetHandle: NET-6-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: United States Department of Defense (DoD) (USDDD)
RegDate: 1994-02-01
Updated: 2025-08-25
Ref: https://rdap.arin.net/registry/ip/6.0.0.0
OrgName: United States Department of Defense (DoD)
OrgId: USDDD
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate: 2007-01-12
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/USDDD
OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName: Network DoD
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName: Network DoD
OrgNOCPhone: +1-844-347-2457
OrgNOCEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
# end
# start
NetRange: 6.0.0.0 - 6.255.255.255
CIDR: 6.0.0.0/8
NetName: CONUS-YPG-NET
NetHandle: NET-6-0-0-0-2
Parent: CONUS-YPG-NET (NET-6-0-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Headquarters, USAISC (HEADQU-3)
RegDate: 2025-08-25
Updated: 2025-08-25
Ref: https://rdap.arin.net/registry/ip/6.0.0.0
OrgName: Headquarters, USAISC
OrgId: HEADQU-3
Address: NETC-ANC CONUS TNOSC
City: Fort Huachuca
StateProv: AZ
PostalCode: 85613
Country: US
RegDate: 1990-03-26
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/HEADQU-3
OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.85.95.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.85.95.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 23:05:19 CST 2026
;; MSG SIZE rcvd: 104
b'Host 172.95.85.6.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 6.85.95.172.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 120.52.152.17 | attackbots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-07-07 03:09:29 |
| 72.24.99.155 | attack | Jul 6 17:13:32 *** sshd[29824]: Invalid user card from 72.24.99.155 |
2019-07-07 03:21:31 |
| 142.93.178.87 | attackspam | Tried sshing with brute force. |
2019-07-07 03:17:15 |
| 134.73.161.49 | attackbotsspam | Jul 6 11:40:27 myhostname sshd[3255]: Invalid user jiang from 134.73.161.49 Jul 6 11:40:27 myhostname sshd[3255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.49 Jul 6 11:40:29 myhostname sshd[3255]: Failed password for invalid user jiang from 134.73.161.49 port 50932 ssh2 Jul 6 11:40:29 myhostname sshd[3255]: Received disconnect from 134.73.161.49 port 50932:11: Bye Bye [preauth] Jul 6 11:40:29 myhostname sshd[3255]: Disconnected from 134.73.161.49 port 50932 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=134.73.161.49 |
2019-07-07 03:02:57 |
| 201.158.20.230 | attackspam | Automatic report generated by Wazuh |
2019-07-07 02:41:40 |
| 51.91.38.190 | attack | 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.91.38.190 - - [06/Jul/2019:21:04:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-07 03:18:41 |
| 212.124.7.173 | attackbots | " " |
2019-07-07 02:54:11 |
| 91.242.162.55 | attack | Automatic report - Web App Attack |
2019-07-07 02:45:42 |
| 114.237.188.224 | attackspambots | [Sat Jul 6 12:35:05 2019 GMT] Monica.Wang |
2019-07-07 02:40:46 |
| 36.66.149.211 | attackspambots | SSH Brute Force |
2019-07-07 03:11:31 |
| 122.144.12.212 | attack | Jun 30 12:06:32 eola sshd[25668]: Invalid user chou from 122.144.12.212 port 56121 Jun 30 12:06:32 eola sshd[25668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.12.212 Jun 30 12:06:33 eola sshd[25668]: Failed password for invalid user chou from 122.144.12.212 port 56121 ssh2 Jun 30 12:06:34 eola sshd[25668]: Received disconnect from 122.144.12.212 port 56121:11: Bye Bye [preauth] Jun 30 12:06:34 eola sshd[25668]: Disconnected from 122.144.12.212 port 56121 [preauth] Jul 1 04:49:28 eola sshd[12865]: Invalid user test from 122.144.12.212 port 48780 Jul 1 04:49:28 eola sshd[12865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.12.212 Jul 1 04:49:30 eola sshd[12865]: Failed password for invalid user test from 122.144.12.212 port 48780 ssh2 Jul 1 04:49:30 eola sshd[12865]: Received disconnect from 122.144.12.212 port 48780:11: Bye Bye [preauth] Jul 1 04:49:30 eola ssh........ ------------------------------- |
2019-07-07 03:18:07 |
| 200.52.151.135 | attackspam | Jul 4 18:37:52 xxxxxxx0 sshd[15951]: Invalid user pi from 200.52.151.135 port 46678 Jul 4 18:37:52 xxxxxxx0 sshd[15951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.151.135 Jul 4 18:37:52 xxxxxxx0 sshd[15953]: Invalid user pi from 200.52.151.135 port 46686 Jul 4 18:37:53 xxxxxxx0 sshd[15953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.151.135 Jul 4 18:37:54 xxxxxxx0 sshd[15953]: Failed password for invalid user pi from 200.52.151.135 port 46686 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=200.52.151.135 |
2019-07-07 02:36:05 |
| 2001:16a2:94ff:4800:e07d:b8b5:4c8:6ead | attackspam | C1,WP GET /wp-login.php |
2019-07-07 02:48:05 |
| 218.92.0.179 | attackspambots | Jul 6 20:46:35 s1 sshd\[30155\]: User root from 218.92.0.179 not allowed because not listed in AllowUsers Jul 6 20:46:35 s1 sshd\[30155\]: Failed password for invalid user root from 218.92.0.179 port 44785 ssh2 Jul 6 20:46:36 s1 sshd\[30155\]: Failed password for invalid user root from 218.92.0.179 port 44785 ssh2 Jul 6 20:46:36 s1 sshd\[30155\]: Failed password for invalid user root from 218.92.0.179 port 44785 ssh2 Jul 6 20:46:37 s1 sshd\[30155\]: Failed password for invalid user root from 218.92.0.179 port 44785 ssh2 Jul 6 20:46:38 s1 sshd\[30155\]: Failed password for invalid user root from 218.92.0.179 port 44785 ssh2 ... |
2019-07-07 03:12:16 |
| 51.68.220.249 | attack | Jul 6 18:02:32 localhost sshd\[33538\]: Invalid user castis from 51.68.220.249 port 44724 Jul 6 18:02:32 localhost sshd\[33538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.220.249 Jul 6 18:02:34 localhost sshd\[33538\]: Failed password for invalid user castis from 51.68.220.249 port 44724 ssh2 Jul 6 18:10:33 localhost sshd\[33824\]: Invalid user george from 51.68.220.249 port 55010 Jul 6 18:10:33 localhost sshd\[33824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.220.249 ... |
2019-07-07 02:34:29 |