Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashby

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       69.165.16.0 - 69.165.31.255
CIDR:           69.165.16.0/20
NetName:        PARK-REGION-TELEPHONE
NetHandle:      NET-69-165-16-0-1
Parent:         NET69 (NET-69-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   The Park Region Mutual Telephone Co (PRGM)
RegDate:        2009-09-30
Updated:        2024-11-26
Comment:        http://www.parkregion.net
Comment:        Standard NOC hours are 8am to 4pm CST
Ref:            https://rdap.arin.net/registry/ip/69.165.16.0


OrgName:        The Park Region Mutual Telephone Co
OrgId:          PRGM
Address:        PO Box 277
Address:        100 Main Street
City:           Underwood
StateProv:      MN
PostalCode:     56586
Country:        US
RegDate:        2002-02-08
Updated:        2024-11-26
Ref:            https://rdap.arin.net/registry/entity/PRGM


OrgNOCHandle: NOC33631-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-218-826-6161 
OrgNOCEmail:  noc@parkregion.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33631-ARIN

OrgAbuseHandle: ABUSE9189-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-218-826-6161 
OrgAbuseEmail:  abuse@parkregion.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9189-ARIN

OrgRoutingHandle: IPADM820-ARIN
OrgRoutingName:   IP Admin
OrgRoutingPhone:  +1-218-826-6161 
OrgRoutingEmail:  noc@parkregion.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPADM820-ARIN

OrgRoutingHandle: NOC33631-ARIN
OrgRoutingName:   NOC
OrgRoutingPhone:  +1-218-826-6161 
OrgRoutingEmail:  noc@parkregion.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NOC33631-ARIN

OrgDNSHandle: JW1242-ARIN
OrgDNSName:   Wilde, Jeff 
OrgDNSPhone:  +1-218-826-8330 
OrgDNSEmail:  jeff.wilde@parkregion.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/JW1242-ARIN

OrgRoutingHandle: JW1242-ARIN
OrgRoutingName:   Wilde, Jeff 
OrgRoutingPhone:  +1-218-826-8330 
OrgRoutingEmail:  jeff.wilde@parkregion.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/JW1242-ARIN

OrgTechHandle: NOC33631-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-218-826-6161 
OrgTechEmail:  noc@parkregion.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC33631-ARIN

OrgDNSHandle: NOC33631-ARIN
OrgDNSName:   NOC
OrgDNSPhone:  +1-218-826-6161 
OrgDNSEmail:  noc@parkregion.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/NOC33631-ARIN

OrgDNSHandle: IPADM820-ARIN
OrgDNSName:   IP Admin
OrgDNSPhone:  +1-218-826-6161 
OrgDNSEmail:  noc@parkregion.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/IPADM820-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.165.31.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.165.31.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 22:21:32 CST 2026
;; MSG SIZE  rcvd: 106
Host info
149.31.165.69.in-addr.arpa domain name pointer 69-165-31-149.parkregion.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.31.165.69.in-addr.arpa	name = 69-165-31-149.parkregion.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.82.187.55 attackbotsspam
Invalid user frappe from 173.82.187.55 port 56252
2020-03-20 06:40:52
41.232.6.139 attack
Mar 19 21:53:26 *** sshd[9462]: User root from 41.232.6.139 not allowed because not listed in AllowUsers
2020-03-20 06:53:16
177.207.122.54 attackbots
Unauthorized connection attempt detected from IP address 177.207.122.54 to port 445
2020-03-20 06:54:11
152.32.143.5 attackbots
Mar 19 23:23:02 OPSO sshd\[18903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.143.5  user=root
Mar 19 23:23:05 OPSO sshd\[18903\]: Failed password for root from 152.32.143.5 port 44240 ssh2
Mar 19 23:31:13 OPSO sshd\[20407\]: Invalid user ftpuser from 152.32.143.5 port 38258
Mar 19 23:31:13 OPSO sshd\[20407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.143.5
Mar 19 23:31:15 OPSO sshd\[20407\]: Failed password for invalid user ftpuser from 152.32.143.5 port 38258 ssh2
2020-03-20 07:00:09
79.137.34.248 attack
Mar 19 23:47:26 lukav-desktop sshd\[10267\]: Invalid user solr from 79.137.34.248
Mar 19 23:47:26 lukav-desktop sshd\[10267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248
Mar 19 23:47:28 lukav-desktop sshd\[10267\]: Failed password for invalid user solr from 79.137.34.248 port 38453 ssh2
Mar 19 23:53:39 lukav-desktop sshd\[10378\]: Invalid user uno85 from 79.137.34.248
Mar 19 23:53:39 lukav-desktop sshd\[10378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248
2020-03-20 06:45:37
111.198.88.86 attack
Mar 19 23:41:59 dev0-dcde-rnet sshd[30716]: Failed password for root from 111.198.88.86 port 37222 ssh2
Mar 19 23:47:01 dev0-dcde-rnet sshd[30755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.88.86
Mar 19 23:47:03 dev0-dcde-rnet sshd[30755]: Failed password for invalid user user from 111.198.88.86 port 57694 ssh2
2020-03-20 07:04:25
195.69.222.166 attackspam
Mar 20 04:20:01 areeb-Workstation sshd[12552]: Failed password for root from 195.69.222.166 port 45715 ssh2
...
2020-03-20 07:07:36
180.76.245.228 attackspambots
2020-03-19T21:45:03.188331abusebot.cloudsearch.cf sshd[19970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.245.228  user=root
2020-03-19T21:45:04.588729abusebot.cloudsearch.cf sshd[19970]: Failed password for root from 180.76.245.228 port 53222 ssh2
2020-03-19T21:49:30.482091abusebot.cloudsearch.cf sshd[20315]: Invalid user testuser from 180.76.245.228 port 41426
2020-03-19T21:49:30.488859abusebot.cloudsearch.cf sshd[20315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.245.228
2020-03-19T21:49:30.482091abusebot.cloudsearch.cf sshd[20315]: Invalid user testuser from 180.76.245.228 port 41426
2020-03-19T21:49:32.876009abusebot.cloudsearch.cf sshd[20315]: Failed password for invalid user testuser from 180.76.245.228 port 41426 ssh2
2020-03-19T21:53:49.821334abusebot.cloudsearch.cf sshd[20640]: Invalid user web from 180.76.245.228 port 57854
...
2020-03-20 06:38:25
103.224.36.226 attackbots
(sshd) Failed SSH login from 103.224.36.226 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 22:05:01 amsweb01 sshd[24545]: Invalid user mikami from 103.224.36.226 port 40614
Mar 19 22:05:03 amsweb01 sshd[24545]: Failed password for invalid user mikami from 103.224.36.226 port 40614 ssh2
Mar 19 22:21:04 amsweb01 sshd[26776]: Invalid user tfc from 103.224.36.226 port 37030
Mar 19 22:21:06 amsweb01 sshd[26776]: Failed password for invalid user tfc from 103.224.36.226 port 37030 ssh2
Mar 19 22:53:40 amsweb01 sshd[30763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226  user=root
2020-03-20 06:42:09
91.193.103.214 attackbots
RDP Brute-Force (honeypot 3)
2020-03-20 06:35:51
185.53.88.41 attackbotsspam
\[2020-03-19 22:53:28\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-19T22:53:28.062+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7f23be2a85f8",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/185.53.88.41/6605",Challenge="3bbd5edf",ReceivedChallenge="3bbd5edf",ReceivedHash="4046eb70ba1a032780632006e6f8ce27"
\[2020-03-19 22:53:28\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-19T22:53:28.303+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="100",SessionID="0x7f23be2b38a8",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/185.53.88.41/6605",Challenge="39528901",ReceivedChallenge="39528901",ReceivedHash="7b7dbfe8c53605a865ada3fe39e7341c"
\[2020-03-19 22:53:28\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-19T22:53:28.346+0100",Severity="Error",Service="SIP",EventVersion="2",AccountI
...
2020-03-20 06:52:21
218.92.0.202 attack
Mar 19 23:53:34 santamaria sshd\[21280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Mar 19 23:53:36 santamaria sshd\[21280\]: Failed password for root from 218.92.0.202 port 38188 ssh2
Mar 19 23:53:38 santamaria sshd\[21280\]: Failed password for root from 218.92.0.202 port 38188 ssh2
...
2020-03-20 07:08:40
46.152.207.173 attack
Mar 19 22:47:48 v22018076622670303 sshd\[19359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.152.207.173  user=root
Mar 19 22:47:50 v22018076622670303 sshd\[19359\]: Failed password for root from 46.152.207.173 port 51754 ssh2
Mar 19 22:53:38 v22018076622670303 sshd\[19426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.152.207.173  user=root
...
2020-03-20 06:45:59
167.71.63.130 attack
firewall-block, port(s): 23/tcp
2020-03-20 07:12:07
49.232.5.122 attack
Mar 19 19:54:16 firewall sshd[27280]: Invalid user webster from 49.232.5.122
Mar 19 19:54:18 firewall sshd[27280]: Failed password for invalid user webster from 49.232.5.122 port 53308 ssh2
Mar 19 19:58:01 firewall sshd[27477]: Invalid user samuel from 49.232.5.122
...
2020-03-20 07:17:55

Recently Reported IPs

77.197.142.86 66.132.195.91 35.205.166.64 216.166.82.18
206.183.108.42 202.12.79.137 8.213.128.92 2606:4700:10::6814:7481
2606:4700:10::6814:9743 2606:4700:10::6814:9843 2606:4700:10::6814:7350 2606:4700:10::6814:8238
2606:4700:10::ac43:1112 2606:4700:10::6816:956 2606:4700:10::6814:7155 2606:4700:10::6814:4796
164.155.74.138 2606:4700:10::6814:5517 2606:4700:10::6816:3165 175.119.202.28