City: unknown
Region: unknown
Country: United States
Internet Service Provider: Softcom Internet Communications, Inc
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 67.200.0.0 - 67.200.127.255
CIDR: 67.200.0.0/17
NetName: RGS-BLK12
NetHandle: NET-67-200-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GTT Americas, LLC (GAL-104)
RegDate: 2007-08-16
Updated: 2025-05-07
Ref: https://rdap.arin.net/registry/ip/67.200.0.0
OrgName: GTT Americas, LLC
OrgId: GAL-104
Address: 4201 Wilson Blvd -Suite 504
City: Arlington
StateProv: VA
PostalCode: 22203
Country: US
RegDate: 2025-02-11
Updated: 2025-07-08
Ref: https://rdap.arin.net/registry/entity/GAL-104
OrgTechHandle: GLD5-ARIN
OrgTechName: GTT Legal Departement
OrgTechPhone: +359886606
OrgTechEmail: alexander.mutafchiyski@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GLD5-ARIN
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
# end
# start
NetRange: 67.200.104.0 - 67.200.111.255
CIDR: 67.200.104.0/21
NetName: RACKDOG-GTT
NetHandle: NET-67-200-104-0-1
Parent: RGS-BLK12 (NET-67-200-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Rackdog, LLC (RL-859)
RegDate: 2025-04-25
Updated: 2025-04-25
Ref: https://rdap.arin.net/registry/ip/67.200.104.0
OrgName: Rackdog, LLC
OrgId: RL-859
Address: 1013 Centre Rd. Suite 403-A
City: Wilmington
StateProv: DE
PostalCode: 19805
Country: US
RegDate: 2020-06-10
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/RL-859
OrgAbuseHandle: ADMIN7476-ARIN
OrgAbuseName: Administrator
OrgAbusePhone: +1-833-722-5364
OrgAbuseEmail: contact@rackdog.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ADMIN7476-ARIN
OrgTechHandle: ADMIN7476-ARIN
OrgTechName: Administrator
OrgTechPhone: +1-833-722-5364
OrgTechEmail: contact@rackdog.com
OrgTechRef: https://rdap.arin.net/registry/entity/ADMIN7476-ARIN
# end
# start
NetRange: 67.200.104.0 - 67.200.111.255
CIDR: 67.200.104.0/21
NetName: NORTHERN-CABLE
NetHandle: NET-67-200-104-0-2
Parent: RACKDOG-GTT (NET-67-200-104-0-1)
NetType: Reallocated
OriginAS:
Organization: NORTHERN CABLE AND FIBER, LLC (NCFL-7)
RegDate: 2025-04-25
Updated: 2025-04-25
Ref: https://rdap.arin.net/registry/ip/67.200.104.0
OrgName: NORTHERN CABLE AND FIBER, LLC
OrgId: NCFL-7
Address: 651 N BROAD ST SUITE 206
City: MIDDLETOWN
StateProv: DE
PostalCode: 19709
Country: US
RegDate: 2020-09-15
Updated: 2020-09-15
Ref: https://rdap.arin.net/registry/entity/NCFL-7
OrgAbuseHandle: ABUSE7989-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-302-894-8922
OrgAbuseEmail: abuse@northerncablefiber.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7989-ARIN
OrgTechHandle: IPSER9-ARIN
OrgTechName: IP Services
OrgTechPhone: +1-302-894-8922
OrgTechEmail: ipservices@northerncablefiber.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPSER9-ARIN
# end
# start
NetRange: 67.200.104.0 - 67.200.111.255
CIDR: 67.200.104.0/21
NetName: WAVE-BROADBAND
NetHandle: NET-67-200-104-0-3
Parent: NORTHERN-CABLE (NET-67-200-104-0-2)
NetType: Reassigned
OriginAS:
Customer: Wave Broadband (C11185432)
RegDate: 2025-04-25
Updated: 2025-04-25
Ref: https://rdap.arin.net/registry/ip/67.200.104.0
CustName: Wave Broadband
Address: 900 N Alameda St Suite 200
City: Los Angeles
StateProv: CA
PostalCode: 90012
Country: US
RegDate: 2025-04-25
Updated: 2025-04-25
Ref: https://rdap.arin.net/registry/entity/C11185432
OrgAbuseHandle: ABUSE7989-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-302-894-8922
OrgAbuseEmail: abuse@northerncablefiber.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE7989-ARIN
OrgTechHandle: IPSER9-ARIN
OrgTechName: IP Services
OrgTechPhone: +1-302-894-8922
OrgTechEmail: ipservices@northerncablefiber.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPSER9-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.200.104.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.200.104.218. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051802 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 19 11:20:57 CST 2026
;; MSG SIZE rcvd: 107
b'Host 218.104.200.67.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 67.200.104.218.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.59.50.84 | attackspambots | Invalid user zbsoong from 37.59.50.84 port 43384 |
2020-07-29 07:08:04 |
| 1.179.185.50 | attackbotsspam | Jul 29 00:18:10 marvibiene sshd[2825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50 Jul 29 00:18:12 marvibiene sshd[2825]: Failed password for invalid user cjt from 1.179.185.50 port 37380 ssh2 |
2020-07-29 07:10:39 |
| 109.116.196.174 | attackbots | Jul 28 17:33:45 NPSTNNYC01T sshd[13744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174 Jul 28 17:33:47 NPSTNNYC01T sshd[13744]: Failed password for invalid user xulei from 109.116.196.174 port 46996 ssh2 Jul 28 17:37:58 NPSTNNYC01T sshd[14133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174 ... |
2020-07-29 07:07:07 |
| 122.227.159.84 | attackbotsspam | Jul 29 00:18:40 jane sshd[30097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.227.159.84 Jul 29 00:18:42 jane sshd[30097]: Failed password for invalid user helong from 122.227.159.84 port 39435 ssh2 ... |
2020-07-29 07:10:12 |
| 183.36.125.220 | attackbotsspam | Jul 28 23:02:50 rocket sshd[3849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.36.125.220 Jul 28 23:02:52 rocket sshd[3849]: Failed password for invalid user webstaff from 183.36.125.220 port 41282 ssh2 Jul 28 23:06:05 rocket sshd[4554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.36.125.220 ... |
2020-07-29 07:14:03 |
| 106.51.86.204 | attack | Jul 29 00:41:16 ip106 sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.86.204 Jul 29 00:41:18 ip106 sshd[14530]: Failed password for invalid user gry from 106.51.86.204 port 53660 ssh2 ... |
2020-07-29 07:04:43 |
| 51.83.33.202 | attackspam | 2020-07-28T20:53:53.797625shield sshd\[398\]: Invalid user chenlw from 51.83.33.202 port 57888 2020-07-28T20:53:53.807183shield sshd\[398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3076ac11.vps.ovh.net 2020-07-28T20:53:55.948764shield sshd\[398\]: Failed password for invalid user chenlw from 51.83.33.202 port 57888 ssh2 2020-07-28T21:01:27.414786shield sshd\[3448\]: Invalid user ljl from 51.83.33.202 port 44344 2020-07-28T21:01:27.421228shield sshd\[3448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3076ac11.vps.ovh.net |
2020-07-29 06:37:51 |
| 212.70.149.51 | attackbotsspam | Jul 29 01:11:01 relay postfix/smtpd\[12152\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 29 01:11:13 relay postfix/smtpd\[8325\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 29 01:11:28 relay postfix/smtpd\[12152\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 29 01:11:40 relay postfix/smtpd\[13729\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 29 01:11:56 relay postfix/smtpd\[11711\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-29 07:14:50 |
| 114.235.87.43 | attack | Failed password for invalid user teng from 114.235.87.43 port 46300 ssh2 |
2020-07-29 06:50:58 |
| 117.158.175.167 | attackspam | Jul 28 23:59:10 jane sshd[13565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.175.167 Jul 28 23:59:12 jane sshd[13565]: Failed password for invalid user iizuka from 117.158.175.167 port 38524 ssh2 ... |
2020-07-29 06:40:19 |
| 85.192.138.149 | attack | Invalid user pgadmin from 85.192.138.149 port 42838 |
2020-07-29 06:52:19 |
| 49.235.165.128 | attackbotsspam | $f2bV_matches |
2020-07-29 06:58:44 |
| 116.106.178.28 | attack | Automatic report - Port Scan Attack |
2020-07-29 06:35:35 |
| 175.138.108.78 | attackspam | Jul 28 20:14:23 XXX sshd[5138]: Invalid user lzy from 175.138.108.78 port 37382 |
2020-07-29 07:09:23 |
| 222.221.248.242 | attack | Jul 29 00:34:33 piServer sshd[4975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242 Jul 29 00:34:35 piServer sshd[4975]: Failed password for invalid user fgj from 222.221.248.242 port 35534 ssh2 Jul 29 00:38:33 piServer sshd[5471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242 ... |
2020-07-29 06:47:20 |