City: Caldwell
Region: Idaho
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 69.92.0.0 - 69.92.255.255
CIDR: 69.92.0.0/16
NetName: CABLEONE
NetHandle: NET-69-92-0-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CABLE ONE, INC. (CBL1)
RegDate: 2003-11-10
Updated: 2012-03-20
Comment: Please Send abuse complaints to abuse@cableone.net
Ref: https://rdap.arin.net/registry/ip/69.92.0.0
OrgName: CABLE ONE, INC.
OrgId: CBL1
Address: 210 East Earll Drive
City: PHOENIX
StateProv: AZ
PostalCode: 85012
Country: US
RegDate: 1996-09-25
Updated: 2025-02-14
Ref: https://rdap.arin.net/registry/entity/CBL1
ReferralServer: rwhois://rwhois.cableone.net:4321
OrgTechHandle: ARIZP3-ARIN
OrgTechName: Arizpe, Carlos
OrgTechPhone: +1-602-364-6231
OrgTechEmail: Carlos.Arizpe@cableone.biz
OrgTechRef: https://rdap.arin.net/registry/entity/ARIZP3-ARIN
OrgNOCHandle: CONOC-ARIN
OrgNOCName: Cable ONE Network Operations Center
OrgNOCPhone: +1-602-763-6262
OrgNOCEmail: noc@cableone.biz
OrgNOCRef: https://rdap.arin.net/registry/entity/CONOC-ARIN
OrgRoutingHandle: SPRAG67-ARIN
OrgRoutingName: Sprague, Sean
OrgRoutingPhone: +1-480-432-8080
OrgRoutingEmail: sean.sprague@cableone.biz
OrgRoutingRef: https://rdap.arin.net/registry/entity/SPRAG67-ARIN
OrgAbuseHandle: COAD-ARIN
OrgAbuseName: Cable One Abuse Department
OrgAbusePhone: +1-877-692-2253
OrgAbuseEmail: abuse@cableone.biz
OrgAbuseRef: https://rdap.arin.net/registry/entity/COAD-ARIN
OrgTechHandle: AEM41-ARIN
OrgTechName: Morong, Alexander Eugene
OrgTechPhone: +1-602-364-6401
OrgTechEmail: alexander.morong@sparklight.biz
OrgTechRef: https://rdap.arin.net/registry/entity/AEM41-ARIN
OrgTechHandle: DUDGE5-ARIN
OrgTechName: Dudgeon, West
OrgTechPhone: +1-480-600-2002
OrgTechEmail: west.dudgeon@cableone.biz
OrgTechRef: https://rdap.arin.net/registry/entity/DUDGE5-ARIN
OrgTechHandle: NICKS3-ARIN
OrgTechName: Nicksic, Joseph
OrgTechPhone: +1-602-364-6445
OrgTechEmail: joseph.nicksic@sparklight.biz
OrgTechRef: https://rdap.arin.net/registry/entity/NICKS3-ARIN
OrgTechHandle: LAB21-ARIN
OrgTechName: Bedrick, Lauren Ashley
OrgTechPhone: +1-702-560-5616
OrgTechEmail: arin2@brandergroup.net
OrgTechRef: https://rdap.arin.net/registry/entity/LAB21-ARIN
RTechHandle: CONOC-ARIN
RTechName: Cable ONE Network Operations Center
RTechPhone: +1-602-763-6262
RTechEmail: noc@cableone.biz
RTechRef: https://rdap.arin.net/registry/entity/CONOC-ARIN
RAbuseHandle: COAD-ARIN
RAbuseName: Cable One Abuse Department
RAbusePhone: +1-877-692-2253
RAbuseEmail: abuse@cableone.biz
RAbuseRef: https://rdap.arin.net/registry/entity/COAD-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cableone.net:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.92.141.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.92.141.241. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 00:46:32 CST 2026
;; MSG SIZE rcvd: 106
241.141.92.69.in-addr.arpa domain name pointer 69-92-141-241.cpe.sparklight.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
241.141.92.69.in-addr.arpa name = 69-92-141-241.cpe.sparklight.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.122.224.81 | attackbots | Unauthorized connection attempt from IP address 188.122.224.81 on Port 445(SMB) |
2020-09-05 01:48:18 |
| 162.142.125.35 | attackspam | Unauthorized connection attempt from IP address 162.142.125.35 on Port 25(SMTP) |
2020-09-05 02:19:56 |
| 190.72.219.26 | attackbotsspam | Unauthorized connection attempt from IP address 190.72.219.26 on Port 445(SMB) |
2020-09-05 02:21:16 |
| 103.107.150.186 | attackbots | Unauthorized connection attempt from IP address 103.107.150.186 on Port 445(SMB) |
2020-09-05 01:59:08 |
| 144.91.78.125 | attackbots | 1433/tcp 445/tcp... [2020-07-07/09-04]12pkt,2pt.(tcp) |
2020-09-05 02:17:28 |
| 52.231.14.90 | attackspambots | Sep 4 03:41:16 site2 sshd\[36579\]: Invalid user jader from 52.231.14.90Sep 4 03:41:18 site2 sshd\[36579\]: Failed password for invalid user jader from 52.231.14.90 port 37508 ssh2Sep 4 03:43:08 site2 sshd\[36612\]: Failed password for root from 52.231.14.90 port 48262 ssh2Sep 4 03:43:58 site2 sshd\[36655\]: Invalid user centos from 52.231.14.90Sep 4 03:44:00 site2 sshd\[36655\]: Failed password for invalid user centos from 52.231.14.90 port 34910 ssh2 ... |
2020-09-05 01:53:29 |
| 58.152.38.250 | attackspam | Invalid user admin from 58.152.38.250 port 36930 |
2020-09-05 02:14:53 |
| 165.22.55.66 | attack | *Port Scan* detected from 165.22.55.66 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 205 seconds |
2020-09-05 02:00:01 |
| 86.62.93.100 | attackspambots | 1599151526 - 09/03/2020 18:45:26 Host: 86.62.93.100/86.62.93.100 Port: 445 TCP Blocked |
2020-09-05 02:14:00 |
| 207.154.215.3 | attackbots | Sep 4 08:15:46 mail sshd\[40516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.3 user=root ... |
2020-09-05 02:12:16 |
| 117.102.119.34 | attackspambots | Unauthorized connection attempt from IP address 117.102.119.34 on Port 445(SMB) |
2020-09-05 01:52:57 |
| 37.129.30.173 | attackspambots | Unauthorized connection attempt from IP address 37.129.30.173 on Port 445(SMB) |
2020-09-05 01:54:26 |
| 177.220.217.94 | attack |
|
2020-09-05 02:13:18 |
| 90.170.249.175 | attackspambots | Sep 3 18:45:42 mellenthin postfix/smtpd[20478]: NOQUEUE: reject: RCPT from unknown[90.170.249.175]: 554 5.7.1 Service unavailable; Client host [90.170.249.175] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/90.170.249.175; from= |
2020-09-05 01:51:31 |
| 27.148.190.100 | attackspambots | 2020-09-04T14:15:24.520063xentho-1 sshd[473811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100 2020-09-04T14:15:24.511893xentho-1 sshd[473811]: Invalid user vilma from 27.148.190.100 port 36988 2020-09-04T14:15:26.745251xentho-1 sshd[473811]: Failed password for invalid user vilma from 27.148.190.100 port 36988 ssh2 2020-09-04T14:16:17.624365xentho-1 sshd[473832]: Invalid user das from 27.148.190.100 port 48566 2020-09-04T14:16:17.632055xentho-1 sshd[473832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100 2020-09-04T14:16:17.624365xentho-1 sshd[473832]: Invalid user das from 27.148.190.100 port 48566 2020-09-04T14:16:19.798672xentho-1 sshd[473832]: Failed password for invalid user das from 27.148.190.100 port 48566 ssh2 2020-09-04T14:17:16.781412xentho-1 sshd[473842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100 user ... |
2020-09-05 02:19:07 |