City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 65.64.0.0 - 65.71.255.255
CIDR: 65.64.0.0/13
NetName: SBCIS-SIS80
NetHandle: NET-65-64-0-0-1
Parent: NET65 (NET-65-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AT&T Enterprises, LLC (AEL-360)
RegDate: 2000-10-03
Updated: 2024-12-05
Ref: https://rdap.arin.net/registry/ip/65.64.0.0
OrgName: AT&T Enterprises, LLC
OrgId: AEL-360
Address: 5302 HARRY HINES BLVD
City: Dallas
StateProv: TX
PostalCode: 75235
Country: US
RegDate: 2024-11-22
Updated: 2025-08-13
Ref: https://rdap.arin.net/registry/entity/AEL-360
OrgTechHandle: ICC-ARIN
OrgTechName: IP Team
OrgTechPhone: +1-888-876-2382
OrgTechEmail: rm-ipspecialist@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ICC-ARIN
OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName: Routing POC
OrgRoutingPhone: +1-999-999-9999
OrgRoutingEmail: DL-routing_poc@att.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI59-ARIN
OrgTechHandle: ZS44-ARIN
OrgTechName: IPAdmin-ATT Internet Services
OrgTechPhone: +1-888-510-5545
OrgTechEmail: ipadmin@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZS44-ARIN
OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-919-319-8167
OrgAbuseEmail: abuse@att.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7-ARIN
# end
# start
NetRange: 65.71.105.192 - 65.71.105.199
CIDR: 65.71.105.192/29
NetName: SBC065071105192030910
NetHandle: NET-65-71-105-192-1
Parent: SBCIS-SIS80 (NET-65-64-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Inn At The Ballpar (C00662170)
RegDate: 2003-09-10
Updated: 2003-09-10
Comment: For Policy Abuse issues, contact: abuse@swbell.net
Comment: For Technical issues, contact: noc@swbell.net
Ref: https://rdap.arin.net/registry/ip/65.71.105.192
CustName: Inn At The Ballpar
Address: 1701 Alma St.
City: Plano
StateProv: TX
PostalCode: 75075
Country: US
RegDate: 2003-09-10
Updated: 2018-07-19
Ref: https://rdap.arin.net/registry/entity/C00662170
OrgTechHandle: ICC-ARIN
OrgTechName: IP Team
OrgTechPhone: +1-888-876-2382
OrgTechEmail: rm-ipspecialist@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ICC-ARIN
OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName: Routing POC
OrgRoutingPhone: +1-999-999-9999
OrgRoutingEmail: DL-routing_poc@att.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ROUTI59-ARIN
OrgTechHandle: ZS44-ARIN
OrgTechName: IPAdmin-ATT Internet Services
OrgTechPhone: +1-888-510-5545
OrgTechEmail: ipadmin@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZS44-ARIN
OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-919-319-8167
OrgAbuseEmail: abuse@att.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.71.105.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;65.71.105.195. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092800 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 22:14:37 CST 2025
;; MSG SIZE rcvd: 106
195.105.71.65.in-addr.arpa domain name pointer adsl-65-71-105-195.dsl.hstntx.swbell.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
195.105.71.65.in-addr.arpa name = adsl-65-71-105-195.dsl.hstntx.swbell.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
54.85.167.161 | attackspam | Jun 23 05:45:05 localhost kernel: [12527299.248904] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=5297 PROTO=UDP SPT=30001 DPT=111 LEN=48 Jun 23 05:45:05 localhost kernel: [12527299.248931] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=5297 PROTO=UDP SPT=30001 DPT=111 LEN=48 Jun 23 05:45:06 localhost kernel: [12527299.410812] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=40127 PROTO=UDP SPT=30001 DPT=111 LEN=48 Jun 23 05:45:06 localhost kernel: [12527299.410819] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=54.85.167.161 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=40127 PROTO=UDP SPT=30001 DPT=111 LEN=48 |
2019-06-24 03:06:49 |
191.101.95.12 | attackspam | NAME : DE-DETL-LACNIC CIDR : 191.101.80.0/20 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack Chile - block certain countries :) IP: 191.101.95.12 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-24 03:26:47 |
118.171.108.193 | attackbotsspam | 2019-06-23T05:43:36.355826stt-1.[munged] kernel: [5314642.356288] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=118.171.108.193 DST=[mungedIP1] LEN=52 TOS=0x08 PREC=0x20 TTL=109 ID=5851 DF PROTO=TCP SPT=56332 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 2019-06-23T05:43:39.435349stt-1.[munged] kernel: [5314645.435794] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=118.171.108.193 DST=[mungedIP1] LEN=52 TOS=0x08 PREC=0x20 TTL=109 ID=6073 DF PROTO=TCP SPT=56332 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 2019-06-23T05:43:45.528352stt-1.[munged] kernel: [5314651.528775] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=118.171.108.193 DST=[mungedIP1] LEN=48 TOS=0x08 PREC=0x20 TTL=109 ID=6555 DF PROTO=TCP SPT=56332 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-06-24 03:31:48 |
103.9.77.80 | attackbots | 103.9.77.80 - - \[23/Jun/2019:14:34:37 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.9.77.80 - - \[23/Jun/2019:14:34:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.9.77.80 - - \[23/Jun/2019:14:34:44 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.9.77.80 - - \[23/Jun/2019:14:34:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.9.77.80 - - \[23/Jun/2019:14:34:51 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.9.77.80 - - \[23/Jun/2019:14:34:52 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/201001 |
2019-06-24 03:13:48 |
78.140.20.133 | attackspam | Automatic report - Web App Attack |
2019-06-24 03:34:48 |
5.39.165.155 | attack | 445/tcp [2019-06-23]1pkt |
2019-06-24 02:58:37 |
223.17.136.75 | attackspam | 5555/tcp [2019-06-23]1pkt |
2019-06-24 03:07:17 |
46.229.168.149 | attackspambots | Malicious Traffic/Form Submission |
2019-06-24 03:19:05 |
14.165.111.209 | attackbots | Jun 23 11:09:51 Serveur sshd[26047]: Did not receive identification string from 14.165.111.209 port 60184 Jun 23 11:11:44 Serveur sshd[27502]: Received disconnect from 14.165.111.209 port 60976:11: Bye Bye [preauth] Jun 23 11:11:44 Serveur sshd[27502]: Disconnected from 14.165.111.209 port 60976 [preauth] Jun 23 11:23:29 Serveur sshd[3116]: Invalid user admin from 14.165.111.209 port 33786 Jun 23 11:23:29 Serveur sshd[3116]: Failed password for invalid user admin from 14.165.111.209 port 33786 ssh2 Jun 23 11:23:29 Serveur sshd[3116]: Received disconnect from 14.165.111.209 port 33786:11: Bye Bye [preauth] Jun 23 11:23:29 Serveur sshd[3116]: Disconnected from invalid user admin 14.165.111.209 port 33786 [preauth] Jun 23 11:25:13 Serveur sshd[4511]: Invalid user ubuntu from 14.165.111.209 port 34290 Jun 23 11:25:13 Serveur sshd[4511]: Failed password for invalid user ubuntu from 14.165.111.209 port 34290 ssh2 Jun 23 11:25:13 Serveur sshd[4511]: Received disconnect from 14........ ------------------------------- |
2019-06-24 03:18:31 |
185.46.85.141 | attackspambots | NAME : QUALITYNETWORK CIDR : 185.46.85.128/25 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 185.46.85.141 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-24 03:11:48 |
95.219.130.237 | attackbots | Unauthorized connection attempt from IP address 95.219.130.237 on Port 445(SMB) |
2019-06-24 03:05:04 |
37.49.227.92 | attackspam | Jun 23 18:04:03 vps65 postfix/smtpd\[13338\]: warning: unknown\[37.49.227.92\]: SASL LOGIN authentication failed: authentication failure Jun 23 18:04:05 vps65 postfix/smtpd\[23069\]: warning: unknown\[37.49.227.92\]: SASL LOGIN authentication failed: authentication failure Jun 23 18:04:08 vps65 postfix/smtpd\[13338\]: warning: unknown\[37.49.227.92\]: SASL LOGIN authentication failed: authentication failure ... |
2019-06-24 03:35:37 |
51.83.78.67 | attackbots | Jun 23 17:14:40 webhost01 sshd[27358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.67 Jun 23 17:14:42 webhost01 sshd[27358]: Failed password for invalid user samba from 51.83.78.67 port 40722 ssh2 ... |
2019-06-24 03:10:01 |
47.95.7.62 | attackspam | LAMP,DEF GET /phpmyadmin/index.php |
2019-06-24 03:33:16 |
193.32.163.182 | attackbotsspam | Jun 23 20:59:57 debian64 sshd\[8126\]: Invalid user admin from 193.32.163.182 port 34419 Jun 23 20:59:57 debian64 sshd\[8126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 Jun 23 21:00:00 debian64 sshd\[8126\]: Failed password for invalid user admin from 193.32.163.182 port 34419 ssh2 ... |
2019-06-24 03:16:25 |