City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 99.208.0.0 - 99.223.255.255
CIDR: 99.208.0.0/12
NetName: ROGERS-COM-DPS
NetHandle: NET-99-208-0-0-1
Parent: NET99 (NET-99-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Rogers Communications Canada Inc. (RCC-182)
RegDate: 2007-03-12
Updated: 2017-01-06
Ref: https://rdap.arin.net/registry/ip/99.208.0.0
OrgName: Rogers Communications Canada Inc.
OrgId: RCC-182
Address: 333 Bloor Street East
Address: 9th Floor
City: Toronto
StateProv: ON
PostalCode: M4W 1G9
Country: CA
RegDate: 2016-10-20
Updated: 2025-09-19
Ref: https://rdap.arin.net/registry/entity/RCC-182
OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName: Mckibbon, Peter
OrgAbusePhone: +1-416-268-7454
OrgAbuseEmail: abuse@rogers.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MCKIB27-ARIN
OrgTechHandle: BAKOG1-ARIN
OrgTechName: Bakogiannis, Labros
OrgTechPhone: +1-647-747-1056
OrgTechEmail: labros.bakogiannis@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/BAKOG1-ARIN
OrgTechHandle: LEEJE40-ARIN
OrgTechName: Lee, Jeffrey
OrgTechPhone: +1-416-903-9230
OrgTechEmail: Jeffrey.Lee@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/LEEJE40-ARIN
OrgTechHandle: IPMAN-ARIN
OrgTechName: IP MANAGE
OrgTechPhone: +1-647-747-3294
OrgTechEmail: ipmanage@rogers.wave.ca
OrgTechRef: https://rdap.arin.net/registry/entity/IPMAN-ARIN
# end
# start
NetRange: 99.219.142.0 - 99.219.143.255
CIDR: 99.219.142.0/23
NetName: DPS
NetHandle: NET-99-219-142-0-1
Parent: ROGERS-COM-DPS (NET-99-208-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Rogers Cable Inc. YM (C02140360)
RegDate: 2009-01-22
Updated: 2009-01-22
Ref: https://rdap.arin.net/registry/ip/99.219.142.0
CustName: Rogers Cable Inc. YM
Address: 1 Mount Pleasant Road
City: Toronto
StateProv: ON
PostalCode: M4Y-2Y5
Country: CA
RegDate: 2009-01-22
Updated: 2017-01-06
Ref: https://rdap.arin.net/registry/entity/C02140360
OrgAbuseHandle: MCKIB27-ARIN
OrgAbuseName: Mckibbon, Peter
OrgAbusePhone: +1-416-268-7454
OrgAbuseEmail: abuse@rogers.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MCKIB27-ARIN
OrgTechHandle: BAKOG1-ARIN
OrgTechName: Bakogiannis, Labros
OrgTechPhone: +1-647-747-1056
OrgTechEmail: labros.bakogiannis@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/BAKOG1-ARIN
OrgTechHandle: LEEJE40-ARIN
OrgTechName: Lee, Jeffrey
OrgTechPhone: +1-416-903-9230
OrgTechEmail: Jeffrey.Lee@rci.rogers.com
OrgTechRef: https://rdap.arin.net/registry/entity/LEEJE40-ARIN
OrgTechHandle: IPMAN-ARIN
OrgTechName: IP MANAGE
OrgTechPhone: +1-647-747-3294
OrgTechEmail: ipmanage@rogers.wave.ca
OrgTechRef: https://rdap.arin.net/registry/entity/IPMAN-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.219.142.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.219.142.176. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 14:34:01 CST 2025
;; MSG SIZE rcvd: 107
Host 176.142.219.99.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 176.142.219.99.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 148.70.28.112 | attackbotsspam | st-nyc1-01 recorded 3 login violations from 148.70.28.112 and was blocked at 2019-10-30 21:23:32. 148.70.28.112 has been blocked on 8 previous occasions. 148.70.28.112's first attempt was recorded at 2019-10-30 18:09:50 |
2019-10-31 05:30:44 |
| 118.25.133.121 | attackspam | Oct 30 21:29:00 cavern sshd[27180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121 |
2019-10-31 05:15:41 |
| 10.10.20.56 | attackspambots | Blocked |
2019-10-31 05:49:48 |
| 46.38.144.202 | attackspambots | 2019-10-30T22:13:46.151701mail01 postfix/smtpd[14113]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-10-30T22:13:48.154015mail01 postfix/smtpd[14164]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-10-30T22:14:05.424624mail01 postfix/smtpd[14113]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-10-31 05:33:09 |
| 2001:41d0:2:af56:: | attackbots | xmlrpc attack |
2019-10-31 05:28:58 |
| 78.181.196.10 | attackbots | Chat Spam |
2019-10-31 05:12:05 |
| 51.75.160.215 | attackbotsspam | Oct 30 22:30:41 MK-Soft-VM3 sshd[2279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Oct 30 22:30:43 MK-Soft-VM3 sshd[2279]: Failed password for invalid user pi from 51.75.160.215 port 38010 ssh2 ... |
2019-10-31 05:37:47 |
| 46.185.116.180 | attack | Automatic report - Banned IP Access |
2019-10-31 05:12:36 |
| 213.32.91.71 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-10-31 05:39:03 |
| 113.109.245.151 | attackbotsspam | 2019-10-30T20:59:11.671338abusebot-5.cloudsearch.cf sshd\[21601\]: Invalid user gong from 113.109.245.151 port 48853 |
2019-10-31 05:23:14 |
| 193.112.241.141 | attackbots | Oct 30 21:57:13 srv01 sshd[13583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.241.141 user=root Oct 30 21:57:14 srv01 sshd[13583]: Failed password for root from 193.112.241.141 port 47188 ssh2 Oct 30 22:01:19 srv01 sshd[13797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.241.141 user=root Oct 30 22:01:21 srv01 sshd[13797]: Failed password for root from 193.112.241.141 port 57258 ssh2 Oct 30 22:05:27 srv01 sshd[14027]: Invalid user intranet from 193.112.241.141 ... |
2019-10-31 05:20:15 |
| 117.121.214.50 | attackbotsspam | 2019-10-30T21:02:48.583268abusebot-2.cloudsearch.cf sshd\[10222\]: Invalid user nas from 117.121.214.50 port 49826 |
2019-10-31 05:32:25 |
| 197.234.144.21 | attackbotsspam | Telnetd brute force attack detected by fail2ban |
2019-10-31 05:15:13 |
| 191.252.218.46 | attackspam | Lines containing failures of 191.252.218.46 auth.log:Oct 30 21:19:14 omfg sshd[14062]: Connection from 191.252.218.46 port 59980 on 78.46.60.42 port 22 auth.log:Oct 30 21:19:14 omfg sshd[14062]: Did not receive identification string from 191.252.218.46 auth.log:Oct 30 21:20:13 omfg sshd[15047]: Connection from 191.252.218.46 port 33462 on 78.46.60.42 port 22 auth.log:Oct 30 21:20:15 omfg sshd[15047]: Invalid user samp from 191.252.218.46 auth.log:Oct 30 21:20:15 omfg sshd[15047]: Received disconnect from 191.252.218.46 port 33462:11: Normal Shutdown, Thank you for playing [preauth] auth.log:Oct 30 21:20:15 omfg sshd[15047]: Disconnected from 191.252.218.46 port 33462 [preauth] auth.log:Oct 30 21:20:38 omfg sshd[15212]: Connection from 191.252.218.46 port 38016 on 78.46.60.42 port 22 auth.log:Oct 30 21:20:40 omfg sshd[15212]: Invalid user dkan from 191.252.218.46 auth.log:Oct 30 21:20:40 omfg sshd[15212]: Received disconnect from 191.252.218.46 port 38016:11: Normal Shutd........ ------------------------------ |
2019-10-31 05:45:22 |
| 222.186.180.9 | attack | Oct 30 22:17:03 dedicated sshd[23792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9 user=root Oct 30 22:17:05 dedicated sshd[23792]: Failed password for root from 222.186.180.9 port 29276 ssh2 |
2019-10-31 05:22:19 |