City: Winfield
Region: Illinois
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 64.107.0.0 - 64.107.255.255
CIDR: 64.107.0.0/16
NetName: ICN1
NetHandle: NET-64-107-0-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Illinois Century Network (ILTN)
RegDate: 2000-06-16
Updated: 2015-11-16
Ref: https://rdap.arin.net/registry/ip/64.107.0.0
OrgName: Illinois Century Network
OrgId: ILTN
Address: 120 W Jefferson
Address: Suite B
City: Springfield
StateProv: IL
PostalCode: 62702
Country: US
RegDate:
Updated: 2025-09-24
Ref: https://rdap.arin.net/registry/entity/ILTN
ReferralServer: rwhois://rwhois.illinois.net:4321
OrgAbuseHandle: ICNAB-ARIN
OrgAbuseName: ICN Abuse
OrgAbusePhone: +1-217-524-3648
OrgAbuseEmail: doit.security@illinois.gov
OrgAbuseRef: https://rdap.arin.net/registry/entity/ICNAB-ARIN
OrgTechHandle: WEBST193-ARIN
OrgTechName: Webster, Andrew
OrgTechPhone: +1-217-558-1106
OrgTechEmail: andy.webster@illinois.gov
OrgTechRef: https://rdap.arin.net/registry/entity/WEBST193-ARIN
OrgTechHandle: ZI83-ARIN
OrgTechName: Hostmaster
OrgTechPhone: +1-815-936-4643
OrgTechEmail: DoIT.ICN.Hostmasternet@illinois.gov
OrgTechRef: https://rdap.arin.net/registry/entity/ZI83-ARIN
OrgTechHandle: RESER5-ARIN
OrgTechName: Reserva, Chuck
OrgTechPhone: +1-217-786-8872
OrgTechEmail: chuck.reserva@illinois.gov
OrgTechRef: https://rdap.arin.net/registry/entity/RESER5-ARIN
RTechHandle: ZI83-ARIN
RTechName: Hostmaster
RTechPhone: +1-815-936-4643
RTechEmail: DoIT.ICN.Hostmasternet@illinois.gov
RTechRef: https://rdap.arin.net/registry/entity/ZI83-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.illinois.net:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.107.153.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.107.153.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110400 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 04 22:41:05 CST 2025
;; MSG SIZE rcvd: 106
Host 29.153.107.64.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 64.107.153.29.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.90.70.69 | attackbotsspam | Invalid user syg from 222.90.70.69 port 24257 |
2020-04-01 18:47:15 |
| 106.12.131.36 | attack | Apr 1 06:38:15 *** sshd[10718]: Invalid user zoe from 106.12.131.36 |
2020-04-01 19:15:55 |
| 89.208.29.161 | attackbots | Malicious brute force vulnerability hacking attacks |
2020-04-01 19:18:21 |
| 212.75.202.252 | attackbots | trying to access non-authorized port |
2020-04-01 19:27:27 |
| 47.75.172.46 | attack | 47.75.172.46 - - [01/Apr/2020:09:14:13 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.75.172.46 - - [01/Apr/2020:09:14:16 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.75.172.46 - - [01/Apr/2020:09:14:18 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-01 19:04:18 |
| 142.93.101.148 | attackbots | Apr 01 05:11:48 askasleikir sshd[44445]: Failed password for root from 142.93.101.148 port 57072 ssh2 Apr 01 05:00:04 askasleikir sshd[44072]: Failed password for root from 142.93.101.148 port 58738 ssh2 |
2020-04-01 18:48:49 |
| 223.220.251.232 | attackspam | Apr 1 10:47:13 srv01 sshd[28419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.251.232 user=root Apr 1 10:47:15 srv01 sshd[28419]: Failed password for root from 223.220.251.232 port 40762 ssh2 Apr 1 10:49:54 srv01 sshd[28598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.251.232 user=root Apr 1 10:49:56 srv01 sshd[28598]: Failed password for root from 223.220.251.232 port 56369 ssh2 Apr 1 10:52:44 srv01 sshd[28840]: Invalid user chengm from 223.220.251.232 port 43771 ... |
2020-04-01 19:23:46 |
| 14.232.243.10 | attackbotsspam | 2020-03-31 UTC: (2x) - nproc,root |
2020-04-01 19:14:26 |
| 49.235.135.230 | attackbotsspam | Apr 1 09:02:52 yesfletchmain sshd\[10532\]: Invalid user xn from 49.235.135.230 port 60294 Apr 1 09:02:52 yesfletchmain sshd\[10532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.135.230 Apr 1 09:02:54 yesfletchmain sshd\[10532\]: Failed password for invalid user xn from 49.235.135.230 port 60294 ssh2 Apr 1 09:09:56 yesfletchmain sshd\[10786\]: User root from 49.235.135.230 not allowed because not listed in AllowUsers Apr 1 09:09:56 yesfletchmain sshd\[10786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.135.230 user=root ... |
2020-04-01 19:29:20 |
| 51.91.79.232 | attack | Apr 1 05:38:43 mail sshd\[37259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.79.232 user=root ... |
2020-04-01 19:29:34 |
| 94.156.238.171 | attack | Email address rejected |
2020-04-01 18:49:15 |
| 110.136.96.73 | attackspambots | Icarus honeypot on github |
2020-04-01 19:26:24 |
| 187.191.96.60 | attack | ssh brute force |
2020-04-01 18:58:18 |
| 218.92.0.203 | attack | (sshd) Failed SSH login from 218.92.0.203 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 1 10:22:22 amsweb01 sshd[25923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root Apr 1 10:22:23 amsweb01 sshd[25923]: Failed password for root from 218.92.0.203 port 33874 ssh2 Apr 1 10:22:26 amsweb01 sshd[25923]: Failed password for root from 218.92.0.203 port 33874 ssh2 Apr 1 10:22:28 amsweb01 sshd[25923]: Failed password for root from 218.92.0.203 port 33874 ssh2 Apr 1 10:24:14 amsweb01 sshd[26061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root |
2020-04-01 19:30:07 |
| 107.170.192.131 | attackspam | 'Fail2Ban' |
2020-04-01 19:00:05 |