City: Lamar
Region: Missouri
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 69.27.128.0 - 69.27.159.255
CIDR: 69.27.128.0/19
NetName: K-POWERNET
NetHandle: NET-69-27-128-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: KAMO Electric Cooperative, Inc. (KEC-140)
RegDate: 2003-02-28
Updated: 2012-02-24
Ref: https://rdap.arin.net/registry/ip/69.27.128.0
OrgName: KAMO Electric Cooperative, Inc.
OrgId: KEC-140
Address: 500 South KAMO Drive
City: Vinita
StateProv: OK
PostalCode: 74301
Country: US
RegDate: 2007-04-04
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/KEC-140
OrgTechHandle: CSG7-ARIN
OrgTechName: Commputer Systems Group
OrgTechPhone: +1-918-256-5551
OrgTechEmail: abuse@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/CSG7-ARIN
OrgAbuseHandle: CSG7-ARIN
OrgAbuseName: Commputer Systems Group
OrgAbusePhone: +1-918-256-5551
OrgAbuseEmail: abuse@kamopower.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CSG7-ARIN
OrgTechHandle: VANGK10-ARIN
OrgTechName: Vang, Keng
OrgTechPhone: +1-918-526-1840
OrgTechEmail: kvang@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/VANGK10-ARIN
OrgTechHandle: HAYJO1-ARIN
OrgTechName: Hay, Josh
OrgTechPhone: +1-918-256-5551
OrgTechEmail: jhay@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/HAYJO1-ARIN
OrgTechHandle: KAWTI2-ARIN
OrgTechName: Kawtikwar, Abhishek
OrgTechPhone: +1-918-256-5551
OrgTechEmail: akawtikwar@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/KAWTI2-ARIN
# end
# start
NetRange: 69.27.134.192 - 69.27.134.255
CIDR: 69.27.134.192/26
NetName: K-POWERNET-WI-FI
NetHandle: NET-69-27-134-192-1
Parent: K-POWERNET (NET-69-27-128-0-1)
NetType: Reassigned
OriginAS:
Customer: KAMO Power (C02208264)
RegDate: 2009-04-19
Updated: 2009-04-19
Ref: https://rdap.arin.net/registry/ip/69.27.134.192
CustName: KAMO Power
Address: 500 S KAMO Dr
City: Vinita
StateProv: OK
PostalCode: 74503
Country: US
RegDate: 2009-04-19
Updated: 2011-03-19
Ref: https://rdap.arin.net/registry/entity/C02208264
OrgTechHandle: CSG7-ARIN
OrgTechName: Commputer Systems Group
OrgTechPhone: +1-918-256-5551
OrgTechEmail: abuse@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/CSG7-ARIN
OrgAbuseHandle: CSG7-ARIN
OrgAbuseName: Commputer Systems Group
OrgAbusePhone: +1-918-256-5551
OrgAbuseEmail: abuse@kamopower.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CSG7-ARIN
OrgTechHandle: VANGK10-ARIN
OrgTechName: Vang, Keng
OrgTechPhone: +1-918-526-1840
OrgTechEmail: kvang@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/VANGK10-ARIN
OrgTechHandle: HAYJO1-ARIN
OrgTechName: Hay, Josh
OrgTechPhone: +1-918-256-5551
OrgTechEmail: jhay@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/HAYJO1-ARIN
OrgTechHandle: KAWTI2-ARIN
OrgTechName: Kawtikwar, Abhishek
OrgTechPhone: +1-918-256-5551
OrgTechEmail: akawtikwar@kamopower.com
OrgTechRef: https://rdap.arin.net/registry/entity/KAWTI2-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.27.134.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.27.134.199. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025082400 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 25 00:30:04 CST 2025
;; MSG SIZE rcvd: 106
b'Host 199.134.27.69.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.134.27.69.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
103.79.143.225 | attack | 01/23/2020-10:00:50.989899 103.79.143.225 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-24 00:01:03 |
79.103.83.154 | attackbotsspam | 20/1/23@02:46:49: FAIL: Alarm-Telnet address from=79.103.83.154 ... |
2020-01-24 00:02:00 |
210.213.251.146 | attack | Unauthorized connection attempt from IP address 210.213.251.146 on Port 445(SMB) |
2020-01-23 23:47:41 |
218.78.54.84 | attackbots | Unauthorized connection attempt detected from IP address 218.78.54.84 to port 2220 [J] |
2020-01-23 23:53:20 |
222.186.175.154 | attackspam | Jan 23 16:14:48 localhost sshd\[14566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Jan 23 16:14:50 localhost sshd\[14566\]: Failed password for root from 222.186.175.154 port 50346 ssh2 Jan 23 16:14:53 localhost sshd\[14566\]: Failed password for root from 222.186.175.154 port 50346 ssh2 ... |
2020-01-24 00:15:48 |
202.125.159.113 | attackbotsspam | Unauthorized connection attempt from IP address 202.125.159.113 on Port 445(SMB) |
2020-01-23 23:54:23 |
145.44.235.233 | attackspam | Invalid user admin from 145.44.235.233 port 59462 |
2020-01-23 23:44:22 |
222.186.30.218 | attackbots | Jan 23 16:36:07 vpn01 sshd[21574]: Failed password for root from 222.186.30.218 port 11580 ssh2 Jan 23 16:36:09 vpn01 sshd[21574]: Failed password for root from 222.186.30.218 port 11580 ssh2 ... |
2020-01-23 23:43:50 |
180.244.202.190 | attack | Unauthorized connection attempt from IP address 180.244.202.190 on Port 445(SMB) |
2020-01-24 00:00:34 |
83.171.107.216 | attackspam | Invalid user refat from 83.171.107.216 port 34081 |
2020-01-24 00:06:54 |
79.2.24.44 | attackbots | Unauthorized connection attempt detected from IP address 79.2.24.44 to port 4567 [J] |
2020-01-24 00:10:31 |
112.85.42.174 | attackspambots | ssh bruteforce |
2020-01-24 00:14:39 |
185.176.27.110 | attackbotsspam | [portscan] Port scan |
2020-01-24 00:25:09 |
177.184.140.150 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-24 00:24:40 |
106.208.24.0 | attackbots | 1579765603 - 01/23/2020 08:46:43 Host: 106.208.24.0/106.208.24.0 Port: 445 TCP Blocked |
2020-01-24 00:06:16 |