City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 98.126.0.0 - 98.126.255.255
CIDR: 98.126.0.0/16
NetName: VPLSNET
NetHandle: NET-98-126-0-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Krypt Technologies (VPLSI)
RegDate: 2008-06-10
Updated: 2026-04-10
Comment: Geofeed https://lg.vpls.net/geofeed.csv
Comment: For legal requests/assistance please use the
Comment: following contact information:
Comment: VPLS Subpoena Phone: 213-406-9088
Comment: VPLS Abuse Fax: 213-406-9001
Comment: VPLS AUP, Terms of Service and DMCA/Copyright notices info:
Comment: http://www.vpls.net/privacy/
Ref: https://rdap.arin.net/registry/ip/98.126.0.0
OrgName: Krypt Technologies
OrgId: VPLSI
Address: 26 Centerpointe Dr. Suite 110
City: La Palma
StateProv: CA
PostalCode: 90248
Country: US
RegDate: 2005-03-25
Updated: 2024-11-25
Comment: For legal requests/assistance please use the
Comment: following contact information:
Comment: VPLS Subpoena Phone: 213-406-9018
Comment: VPLS Abuse Fax: 888-365-2656
Comment: VPLS AUP, Terms of Service and DMCA/Copyright notices info: http://www.vpls.com/aup
Comment: descr: This space is statically assigned.
Ref: https://rdap.arin.net/registry/entity/VPLSI
ReferralServer: rwhois://vault.krypt.com:4321
OrgAbuseHandle: VPLSA-ARIN
OrgAbuseName: VPLS-ARIN
OrgAbusePhone: +1-888-365-2656
OrgAbuseEmail: abuse@vpls.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/VPLSA-ARIN
OrgTechHandle: VPLSA-ARIN
OrgTechName: VPLS-ARIN
OrgTechPhone: +1-888-365-2656
OrgTechEmail: abuse@vpls.net
OrgTechRef: https://rdap.arin.net/registry/entity/VPLSA-ARIN
OrgNOCHandle: NETWO813-ARIN
OrgNOCName: Network Engineering
OrgNOCPhone: +1-213-406-9018
OrgNOCEmail: admin-arin@vpls.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN
RTechHandle: KRYPT-ARIN
RTechName: Krypt Keeper
RTechPhone: +1-888-365-2656
RTechEmail: abuse@vpls.net
RTechRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN
RNOCHandle: NETWO813-ARIN
RNOCName: Network Engineering
RNOCPhone: +1-213-406-9018
RNOCEmail: admin-arin@vpls.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN
RAbuseHandle: KRYPT-ARIN
RAbuseName: Krypt Keeper
RAbusePhone: +1-888-365-2656
RAbuseEmail: abuse@vpls.net
RAbuseRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to vault.krypt.com:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.126.135.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.126.135.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 10:08:47 CST 2026
;; MSG SIZE rcvd: 106
99.135.126.98.in-addr.arpa domain name pointer 98.126.135.99.static.customer.krypt.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.135.126.98.in-addr.arpa name = 98.126.135.99.static.customer.krypt.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.77.15.14 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.77.15.14 to port 11773 [T] |
2020-07-22 05:04:15 |
| 95.142.118.28 | attackspambots | (From stanton.jacka58@msn.com) Would you be interested in advertising that charges less than $40 monthly and sends tons of people who are ready to buy directly to your website? Check out: https://bit.ly/buy-more-visitors |
2020-07-22 05:43:18 |
| 125.212.219.50 | attack | Auto Detect Rule! proto TCP (SYN), 125.212.219.50:55258->gjan.info:3389, len 40 |
2020-07-22 05:09:14 |
| 221.122.119.50 | attack | Jul 21 17:27:55 xeon sshd[43024]: Failed password for invalid user apache from 221.122.119.50 port 43545 ssh2 |
2020-07-22 05:23:33 |
| 45.32.55.131 | attackspam | Unauthorized connection attempt detected from IP address 45.32.55.131 to port 80 [T] |
2020-07-22 05:04:50 |
| 178.202.150.22 | attack | Jul 21 23:28:27 eventyay sshd[7698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.202.150.22 Jul 21 23:28:29 eventyay sshd[7698]: Failed password for invalid user teamspeak3 from 178.202.150.22 port 34910 ssh2 Jul 21 23:34:30 eventyay sshd[7874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.202.150.22 ... |
2020-07-22 05:39:15 |
| 141.98.10.195 | attack | Jul 21 17:45:36 dns1 sshd[14465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.195 Jul 21 17:45:38 dns1 sshd[14465]: Failed password for invalid user 1234 from 141.98.10.195 port 45100 ssh2 Jul 21 17:46:24 dns1 sshd[14582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.195 |
2020-07-22 05:17:51 |
| 51.38.57.78 | attackspam | Jul 21 20:57:21 XXX sshd[58559]: Invalid user es from 51.38.57.78 port 44686 |
2020-07-22 05:17:32 |
| 168.194.161.63 | attack | Invalid user test from 168.194.161.63 port 52453 |
2020-07-22 05:35:01 |
| 54.37.71.207 | attackbots | Jul 21 19:05:41 ws26vmsma01 sshd[70641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.207 Jul 21 19:05:43 ws26vmsma01 sshd[70641]: Failed password for invalid user admin from 54.37.71.207 port 46958 ssh2 ... |
2020-07-22 05:19:27 |
| 193.228.91.11 | attack | Unauthorized connection attempt detected from IP address 193.228.91.11 to port 22 |
2020-07-22 05:28:53 |
| 195.54.160.180 | attack | 2020-07-21T19:24:16.824279upcloud.m0sh1x2.com sshd[31638]: Invalid user admin from 195.54.160.180 port 2847 |
2020-07-22 05:28:21 |
| 135.181.35.245 | attackspam | Invalid user admin from 135.181.35.245 port 52802 |
2020-07-22 05:24:29 |
| 174.219.146.52 | attack | Brute forcing email accounts |
2020-07-22 05:07:57 |
| 46.105.227.206 | attackbotsspam | Jul 21 20:02:51 dhoomketu sshd[1732140]: Invalid user vcsa from 46.105.227.206 port 50186 Jul 21 20:02:51 dhoomketu sshd[1732140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.227.206 Jul 21 20:02:51 dhoomketu sshd[1732140]: Invalid user vcsa from 46.105.227.206 port 50186 Jul 21 20:02:53 dhoomketu sshd[1732140]: Failed password for invalid user vcsa from 46.105.227.206 port 50186 ssh2 Jul 21 20:07:06 dhoomketu sshd[1732253]: Invalid user deploy from 46.105.227.206 port 35140 ... |
2020-07-22 05:25:01 |