City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 67.213.82.137 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-24 23:28:59 |
| 67.213.82.137 | attackspam | Automatic report - Banned IP Access |
2020-09-24 15:15:49 |
| 67.213.82.137 | attackspam | Automatic report - Banned IP Access |
2020-09-24 06:41:57 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 67.213.82.0 - 67.213.86.255
CIDR: 67.213.84.0/23, 67.213.82.0/23, 67.213.86.0/24
NetName: SPDNETWORK-03
NetHandle: NET-67-213-82-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: 1651884 Ontario Inc. (SPDNE)
RegDate: 2007-09-07
Updated: 2018-12-07
Ref: https://rdap.arin.net/registry/ip/67.213.82.0
OrgName: 1651884 Ontario Inc.
OrgId: SPDNE
Address: 6013 - 25 Crouse Rd
City: TORONTO
StateProv: ON
PostalCode: M1R 5P8
Country: CA
RegDate: 2006-06-05
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/SPDNE
OrgTechHandle: SUPPO190-ARIN
OrgTechName: SPDNETWORK SUPPORT
OrgTechPhone: +1-212-960-3388
OrgTechEmail: SUPPORT@spdnetwork.net
OrgTechRef: https://rdap.arin.net/registry/entity/SUPPO190-ARIN
OrgAbuseHandle: SUPPO190-ARIN
OrgAbuseName: SPDNETWORK SUPPORT
OrgAbusePhone: +1-212-960-3388
OrgAbuseEmail: SUPPORT@spdnetwork.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/SUPPO190-ARIN
RTechHandle: SUPPO190-ARIN
RTechName: SPDNETWORK SUPPORT
RTechPhone: +1-212-960-3388
RTechEmail: SUPPORT@spdnetwork.net
RTechRef: https://rdap.arin.net/registry/entity/SUPPO190-ARIN
RAbuseHandle: ABUSE1233-ARIN
RAbuseName: Abuse
RAbusePhone: +1-212-960-3388
RAbuseEmail: ABUSE@spdnetwork.net
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1233-ARIN
RNOCHandle: SUPPO190-ARIN
RNOCName: SPDNETWORK SUPPORT
RNOCPhone: +1-212-960-3388
RNOCEmail: SUPPORT@spdnetwork.net
RNOCRef: https://rdap.arin.net/registry/entity/SUPPO190-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.213.82.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.213.82.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012900 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 00:30:07 CST 2026
;; MSG SIZE rcvd: 105
18.82.213.67.in-addr.arpa domain name pointer vps1891.baseservers.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.82.213.67.in-addr.arpa name = vps1891.baseservers.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.171.90.167 | attack | 20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167 20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167 ... |
2020-02-17 06:29:15 |
| 175.136.49.5 | attack | GET /wp-login.php HTTP/1.1 |
2020-02-17 06:20:08 |
| 189.209.165.113 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 06:35:25 |
| 189.209.164.88 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 06:40:38 |
| 222.186.173.142 | attack | Feb 16 22:02:09 hcbbdb sshd\[32085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Feb 16 22:02:10 hcbbdb sshd\[32085\]: Failed password for root from 222.186.173.142 port 37392 ssh2 Feb 16 22:02:32 hcbbdb sshd\[32115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Feb 16 22:02:35 hcbbdb sshd\[32115\]: Failed password for root from 222.186.173.142 port 60634 ssh2 Feb 16 22:02:51 hcbbdb sshd\[32115\]: Failed password for root from 222.186.173.142 port 60634 ssh2 |
2020-02-17 06:11:31 |
| 184.167.140.242 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 06:12:58 |
| 184.161.114.69 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 06:21:42 |
| 81.136.255.20 | attackspam | $f2bV_matches |
2020-02-17 06:13:16 |
| 41.221.168.167 | attackspambots | Feb 16 16:54:57 ws22vmsma01 sshd[23554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167 Feb 16 16:54:59 ws22vmsma01 sshd[23554]: Failed password for invalid user cvsroot from 41.221.168.167 port 37317 ssh2 ... |
2020-02-17 06:25:07 |
| 184.174.170.78 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 06:11:50 |
| 101.127.0.153 | attack | wp-login.php |
2020-02-17 06:27:03 |
| 14.244.103.191 | attackspam | 1581860500 - 02/16/2020 14:41:40 Host: 14.244.103.191/14.244.103.191 Port: 445 TCP Blocked |
2020-02-17 06:28:57 |
| 84.163.245.135 | attack | SSH Brute-Force reported by Fail2Ban |
2020-02-17 06:15:42 |
| 185.175.93.105 | attackbotsspam | Feb 16 23:47:35 h2177944 kernel: \[5091173.596979\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=35683 PROTO=TCP SPT=40424 DPT=11626 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 16 23:47:35 h2177944 kernel: \[5091173.596993\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=35683 PROTO=TCP SPT=40424 DPT=11626 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 16 23:48:10 h2177944 kernel: \[5091208.069541\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=4270 PROTO=TCP SPT=40424 DPT=11075 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 16 23:48:10 h2177944 kernel: \[5091208.069556\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=4270 PROTO=TCP SPT=40424 DPT=11075 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 16 23:48:49 h2177944 kernel: \[5091247.305692\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.21 |
2020-02-17 06:52:14 |
| 129.211.87.221 | attackbots | Feb 16 17:53:53 MK-Soft-VM3 sshd[1262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.87.221 Feb 16 17:53:56 MK-Soft-VM3 sshd[1262]: Failed password for invalid user az from 129.211.87.221 port 60788 ssh2 ... |
2020-02-17 06:24:35 |