City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 64.81.0.0 - 64.81.255.255
CIDR: 64.81.0.0/16
NetName: MEGAPATH-BLK-50
NetHandle: NET-64-81-0-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GTT Americas, LLC (GAL-104)
RegDate: 2000-04-28
Updated: 2025-05-07
Ref: https://rdap.arin.net/registry/ip/64.81.0.0
OrgName: GTT Americas, LLC
OrgId: GAL-104
Address: 4201 Wilson Blvd -Suite 504
City: Arlington
StateProv: VA
PostalCode: 22203
Country: US
RegDate: 2025-02-11
Updated: 2025-07-08
Ref: https://rdap.arin.net/registry/entity/GAL-104
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GLD5-ARIN
OrgTechName: GTT Legal Departement
OrgTechPhone: +359886606
OrgTechEmail: alexander.mutafchiyski@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GLD5-ARIN
# end
# start
NetRange: 64.81.112.0 - 64.81.119.255
CIDR: 64.81.112.0/21
NetName: GTT-JUNYUU-NET
NetHandle: NET-64-81-112-0-1
Parent: MEGAPATH-BLK-50 (NET-64-81-0-0-1)
NetType: Reallocated
OriginAS:
Organization: NetLab Global (HOSTH-5)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/64.81.112.0
OrgName: NetLab Global
OrgId: HOSTH-5
Address: 110 W 40TH ST STE200
City: NEW YORK
StateProv: NY
PostalCode: 10018
Country: US
RegDate: 2022-02-26
Updated: 2025-07-30
Comment: Geofeed https://ip-allocation.as979.net/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/HOSTH-5
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
# start
NetRange: 64.81.112.0 - 64.81.119.255
CIDR: 64.81.112.0/21
NetName: GTT
NetHandle: NET-64-81-112-0-2
Parent: GTT-JUNYUU-NET (NET-64-81-112-0-1)
NetType: Reassigned
OriginAS:
Customer: GTT Communications Inc. (C11308730)
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/ip/64.81.112.0
CustName: GTT Communications Inc.
Address: 900 N Alameda ST
City: Los Angeles
StateProv: CA
PostalCode: 90014
Country: US
RegDate: 2025-08-06
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/entity/C11308730
OrgAbuseHandle: LIUFR3-ARIN
OrgAbuseName: Liu, Frid
OrgAbusePhone: +1-213-674-6718
OrgAbuseEmail: legal@as979.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LIUFR3-ARIN
OrgTechHandle: LEERI36-ARIN
OrgTechName: Lee, Richard
OrgTechPhone: +1-213-674-6718
OrgTechEmail: noc@as979.net
OrgTechRef: https://rdap.arin.net/registry/entity/LEERI36-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.81.114.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.81.114.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400
;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 09:32:01 CST 2026
;; MSG SIZE rcvd: 105
38.114.81.64.in-addr.arpa domain name pointer dsl081-114-038.dfw1.dsl.speakeasy.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.114.81.64.in-addr.arpa name = dsl081-114-038.dfw1.dsl.speakeasy.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.167.225.118 | attackspam | Jul 12 11:25:13 XXXXXX sshd[60998]: Invalid user zhoulin from 180.167.225.118 port 42492 |
2020-07-12 20:03:46 |
| 191.235.91.156 | attackspambots | Jul 12 10:56:02 zulu412 sshd\[26179\]: Invalid user albertha from 191.235.91.156 port 60702 Jul 12 10:56:02 zulu412 sshd\[26179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156 Jul 12 10:56:04 zulu412 sshd\[26179\]: Failed password for invalid user albertha from 191.235.91.156 port 60702 ssh2 ... |
2020-07-12 19:37:02 |
| 42.114.32.44 | attackspam | 1594525644 - 07/12/2020 05:47:24 Host: 42.114.32.44/42.114.32.44 Port: 445 TCP Blocked |
2020-07-12 19:40:10 |
| 49.232.28.199 | attackspam | Jul 12 09:23:23 eventyay sshd[27221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.28.199 Jul 12 09:23:25 eventyay sshd[27221]: Failed password for invalid user admin from 49.232.28.199 port 53934 ssh2 Jul 12 09:24:33 eventyay sshd[27279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.28.199 ... |
2020-07-12 19:34:19 |
| 218.92.0.185 | attack | Jul 12 04:50:01 dignus sshd[30243]: Failed password for root from 218.92.0.185 port 39924 ssh2 Jul 12 04:50:12 dignus sshd[30243]: Failed password for root from 218.92.0.185 port 39924 ssh2 Jul 12 04:50:12 dignus sshd[30243]: error: maximum authentication attempts exceeded for root from 218.92.0.185 port 39924 ssh2 [preauth] Jul 12 04:50:22 dignus sshd[30291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.185 user=root Jul 12 04:50:23 dignus sshd[30291]: Failed password for root from 218.92.0.185 port 7993 ssh2 ... |
2020-07-12 19:53:58 |
| 181.31.129.12 | attack | Jul 12 11:45:49 hosting sshd[31900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.31.129.12 user=bin Jul 12 11:45:51 hosting sshd[31900]: Failed password for bin from 181.31.129.12 port 43777 ssh2 ... |
2020-07-12 19:52:01 |
| 165.22.246.254 | attack | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-07-12 19:44:08 |
| 43.225.194.75 | attackspambots | Jul 12 08:19:48 vps46666688 sshd[30516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.194.75 Jul 12 08:19:50 vps46666688 sshd[30516]: Failed password for invalid user satoshi from 43.225.194.75 port 54277 ssh2 ... |
2020-07-12 19:38:40 |
| 118.125.106.12 | attackspambots | Jul 11 09:10:06 hostnameproxy sshd[22903]: Invalid user huzy from 118.125.106.12 port 29520 Jul 11 09:10:06 hostnameproxy sshd[22903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.125.106.12 Jul 11 09:10:07 hostnameproxy sshd[22903]: Failed password for invalid user huzy from 118.125.106.12 port 29520 ssh2 Jul 11 09:13:19 hostnameproxy sshd[22990]: Invalid user snelson from 118.125.106.12 port 13651 Jul 11 09:13:19 hostnameproxy sshd[22990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.125.106.12 Jul 11 09:13:21 hostnameproxy sshd[22990]: Failed password for invalid user snelson from 118.125.106.12 port 13651 ssh2 Jul 11 09:16:10 hostnameproxy sshd[23055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.125.106.12 user=mail Jul 11 09:16:12 hostnameproxy sshd[23055]: Failed password for mail from 118.125.106.12 port 63222 ssh2 Jul 11 0........ ------------------------------ |
2020-07-12 19:32:32 |
| 106.13.71.1 | attackspam | Jul 12 12:55:47 nextcloud sshd\[27187\]: Invalid user airflow from 106.13.71.1 Jul 12 12:55:47 nextcloud sshd\[27187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.71.1 Jul 12 12:55:49 nextcloud sshd\[27187\]: Failed password for invalid user airflow from 106.13.71.1 port 51764 ssh2 |
2020-07-12 19:27:15 |
| 5.182.210.228 | attack | WordPress login Brute force / Web App Attack on client site. |
2020-07-12 19:50:08 |
| 177.177.121.120 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-07-12 19:53:12 |
| 103.89.168.200 | attack | 2020-07-11 15:56:06 Unauthorized connection attempt to IMAP/POP |
2020-07-12 19:32:53 |
| 1.10.252.51 | attackbots | 1594525642 - 07/12/2020 05:47:22 Host: 1.10.252.51/1.10.252.51 Port: 445 TCP Blocked |
2020-07-12 19:41:24 |
| 107.170.178.103 | attackspambots | Jul 12 11:40:22 ns382633 sshd\[30270\]: Invalid user i from 107.170.178.103 port 48639 Jul 12 11:40:22 ns382633 sshd\[30270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.178.103 Jul 12 11:40:24 ns382633 sshd\[30270\]: Failed password for invalid user i from 107.170.178.103 port 48639 ssh2 Jul 12 11:52:07 ns382633 sshd\[32310\]: Invalid user xdzhang from 107.170.178.103 port 40121 Jul 12 11:52:07 ns382633 sshd\[32310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.178.103 |
2020-07-12 19:48:42 |