City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 69.3.0.0 - 69.3.255.255
CIDR: 69.3.0.0/16
NetName: MEGAPATH-BLK-59
NetHandle: NET-69-3-0-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GTT Americas, LLC (GAL-104)
RegDate: 2002-09-20
Updated: 2025-05-07
Ref: https://rdap.arin.net/registry/ip/69.3.0.0
OrgName: GTT Americas, LLC
OrgId: GAL-104
Address: 4201 Wilson Blvd -Suite 504
City: Arlington
StateProv: VA
PostalCode: 22203
Country: US
RegDate: 2025-02-11
Updated: 2025-07-08
Ref: https://rdap.arin.net/registry/entity/GAL-104
OrgTechHandle: GLD5-ARIN
OrgTechName: GTT Legal Departement
OrgTechPhone: +359886606
OrgTechEmail: alexander.mutafchiyski@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GLD5-ARIN
OrgNOCHandle: GNOC16-ARIN
OrgNOCName: GTT Network Operations Center
OrgNOCPhone: +1-703-442-5500
OrgNOCEmail: noc@gtt.net
OrgNOCRef: https://rdap.arin.net/registry/entity/GNOC16-ARIN
OrgTechHandle: AS3251-ARIN
OrgTechName: AS3257 Netguard
OrgTechPhone: +49 69 48007422
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/AS3251-ARIN
OrgTechHandle: GIT5-ARIN
OrgTechName: GTT IPAM Team
OrgTechPhone: +1-703-442-5500
OrgTechEmail: netguard@gtt.net
OrgTechRef: https://rdap.arin.net/registry/entity/GIT5-ARIN
OrgAbuseHandle: GAD46-ARIN
OrgAbuseName: GTT Abuse Department
OrgAbusePhone: +1-703-442-5501
OrgAbuseEmail: abuse@gtt.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GAD46-ARIN
# end
# start
NetRange: 69.3.235.0 - 69.3.235.255
CIDR: 69.3.235.0/24
NetName: GTT-ARISK-NET
NetHandle: NET-69-3-235-0-1
Parent: MEGAPATH-BLK-59 (NET-69-3-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Arisk Communications inc. (AC-5396)
RegDate: 2025-10-27
Updated: 2025-10-27
Ref: https://rdap.arin.net/registry/ip/69.3.235.0
OrgName: Arisk Communications inc.
OrgId: AC-5396
Address: 350 NORTHERN BLVD STE 324 -1331 ALBANY NY 12204-1000
City: ALBANY
StateProv: NY
PostalCode: 12204
Country: US
RegDate: 2024-06-28
Updated: 2024-07-03
Ref: https://rdap.arin.net/registry/entity/AC-5396
ReferralServer: rwhois://rwhois.ariskisp.com:4321
OrgTechHandle: WILSO1903-ARIN
OrgTechName: Wilson
OrgTechPhone: +1-518-512-9230
OrgTechEmail: support@ariskisp.com
OrgTechRef: https://rdap.arin.net/registry/entity/WILSO1903-ARIN
OrgAbuseHandle: WILSO1903-ARIN
OrgAbuseName: Wilson
OrgAbusePhone: +1-518-512-9230
OrgAbuseEmail: support@ariskisp.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/WILSO1903-ARIN
# end
# start
NetRange: 69.3.235.0 - 69.3.235.255
CIDR: 69.3.235.0/24
NetName: GTT
NetHandle: NET-69-3-235-0-2
Parent: GTT-ARISK-NET (NET-69-3-235-0-1)
NetType: Reassigned
OriginAS:
Customer: GTT Communications Inc. (C11472729)
RegDate: 2026-01-11
Updated: 2026-01-11
Comment: Geofeed https://ariskisp.com/rfc8805.csv
Ref: https://rdap.arin.net/registry/ip/69.3.235.0
CustName: GTT Communications Inc.
Address: 350 NORTHERN BLVD STE 324 -1331
City: ALBANY
StateProv: NY
PostalCode: 12204
Country: US
RegDate: 2026-01-11
Updated: 2026-01-11
Ref: https://rdap.arin.net/registry/entity/C11472729
OrgTechHandle: WILSO1903-ARIN
OrgTechName: Wilson
OrgTechPhone: +1-518-512-9230
OrgTechEmail: support@ariskisp.com
OrgTechRef: https://rdap.arin.net/registry/entity/WILSO1903-ARIN
OrgAbuseHandle: WILSO1903-ARIN
OrgAbuseName: Wilson
OrgAbusePhone: +1-518-512-9230
OrgAbuseEmail: support@ariskisp.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/WILSO1903-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.ariskisp.com:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.3.235.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.3.235.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042802 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 16:14:29 CST 2026
;; MSG SIZE rcvd: 105
157.235.3.69.in-addr.arpa domain name pointer h-69-3-235-157.atln.ga.globalcapacity.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.235.3.69.in-addr.arpa name = h-69-3-235-157.atln.ga.globalcapacity.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.35.27.97 | attack | Apr 28 14:25:55 localhost sshd[106008]: Invalid user user7 from 112.35.27.97 port 41840 Apr 28 14:25:55 localhost sshd[106008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.27.97 Apr 28 14:25:55 localhost sshd[106008]: Invalid user user7 from 112.35.27.97 port 41840 Apr 28 14:25:57 localhost sshd[106008]: Failed password for invalid user user7 from 112.35.27.97 port 41840 ssh2 Apr 28 14:31:43 localhost sshd[106489]: Invalid user ts3 from 112.35.27.97 port 40354 ... |
2020-04-28 23:42:21 |
| 103.89.91.156 | attackbots | Unauthorized connection attempt detected from IP address 103.89.91.156 to port 3389 [T] |
2020-04-29 00:03:22 |
| 80.82.65.122 | attackbotsspam | Apr 28 17:44:06 ns3042688 courier-pop3d: LOGIN FAILED, user=info@sikla-systems.net, ip=\[::ffff:80.82.65.122\] ... |
2020-04-28 23:44:30 |
| 122.144.211.235 | attackbots | Apr 28 16:45:46 vps333114 sshd[23372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.211.235 Apr 28 16:45:48 vps333114 sshd[23372]: Failed password for invalid user aguirre from 122.144.211.235 port 35628 ssh2 ... |
2020-04-28 23:57:10 |
| 122.116.3.108 | attackspambots | Telnet Server BruteForce Attack |
2020-04-29 00:18:24 |
| 181.62.248.12 | attack | Apr 28 13:57:37 server sshd[50448]: Failed password for invalid user mysql from 181.62.248.12 port 50802 ssh2 Apr 28 14:08:55 server sshd[58962]: Failed password for invalid user vince from 181.62.248.12 port 49776 ssh2 Apr 28 14:12:12 server sshd[61465]: Failed password for invalid user bouncer from 181.62.248.12 port 40594 ssh2 |
2020-04-28 23:39:31 |
| 45.55.177.170 | attack | no |
2020-04-28 23:49:22 |
| 14.162.145.203 | attackspambots | Apr 28 14:11:43 pve1 sshd[2622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.145.203 Apr 28 14:11:45 pve1 sshd[2622]: Failed password for invalid user admin from 14.162.145.203 port 34693 ssh2 ... |
2020-04-29 00:04:25 |
| 97.121.147.44 | attackspam | TCP Port Scanning |
2020-04-28 23:34:12 |
| 146.88.240.4 | attack | firewall-block, port(s): 443/tcp |
2020-04-29 00:19:31 |
| 148.70.101.245 | attackbots | SSH Brute Force |
2020-04-28 23:35:55 |
| 68.183.236.29 | attackspambots | (sshd) Failed SSH login from 68.183.236.29 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 28 14:00:41 amsweb01 sshd[31272]: Invalid user guoyifan from 68.183.236.29 port 37900 Apr 28 14:00:43 amsweb01 sshd[31272]: Failed password for invalid user guoyifan from 68.183.236.29 port 37900 ssh2 Apr 28 14:07:40 amsweb01 sshd[31920]: Invalid user docker from 68.183.236.29 port 50808 Apr 28 14:07:43 amsweb01 sshd[31920]: Failed password for invalid user docker from 68.183.236.29 port 50808 ssh2 Apr 28 14:12:06 amsweb01 sshd[32497]: Invalid user wc from 68.183.236.29 port 33324 |
2020-04-28 23:43:20 |
| 222.186.180.17 | attackspam | Apr 28 17:10:13 home sshd[7319]: Failed password for root from 222.186.180.17 port 27724 ssh2 Apr 28 17:10:26 home sshd[7319]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 27724 ssh2 [preauth] Apr 28 17:10:32 home sshd[7360]: Failed password for root from 222.186.180.17 port 30464 ssh2 ... |
2020-04-28 23:37:02 |
| 185.232.65.216 | attackbotsspam | [Tue Apr 28 19:11:34.814444 2020] [:error] [pid 15134:tid 140575009466112] [client 185.232.65.216:62642] [client 185.232.65.216] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "XqgddkYCcGInluRmZWCZWgAAATs"]
... |
2020-04-29 00:15:39 |
| 45.82.70.238 | attackspambots | Apr 28 18:06:59 debian-2gb-nbg1-2 kernel: \[10348945.165972\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.82.70.238 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=16471 PROTO=TCP SPT=40160 DPT=1027 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-29 00:17:33 |