IP: 199.168.141.203 United States Location: Los Angeles, California, United States
City:
Los Angeles
Region:
California
Country:
United States
Postal Code:
90017
Latitude:
34.0584
Longitude:
-118.278
NetRange: 199.168.136.0 - 199.168.143.255
CIDR: 199.168.136.0/21
NetName: CL-1210
NetHandle: NET-199-168-136-0-1
Parent: NET199 (NET-199-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS25820
Organization: Cluster Logic Inc (CL-1210)
RegDate: 2018-09-17
Updated: 2018-09-17
Comment: Abuse desk: abuse@sioru.com
Ref: https://rdap.arin.net/registry/ip/199.168.136.0

OrgName: Cluster Logic Inc
OrgId: CL-1210
Address: 4974 Kingsway Ave
Address: Suite 668
City: Burnaby
StateProv: BC
PostalCode: V5H 4M9
Country: CA
RegDate: 2016-10-11
Updated: 2021-07-12
Ref: https://rdap.arin.net/registry/entity/CL-1210

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-260-5757
OrgAbuseEmail: abuse@sioru.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgTechHandle: TECHN1201-ARIN
OrgTechName: Technical Contact
OrgTechPhone: +1-408-260-5757
OrgTechEmail: arin-tech@sioru.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-260-5757
OrgNOCEmail: arin-noc@sioru.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12969-ARIN

NetRange: 199.168.136.0 - 199.168.143.255
CIDR: 199.168.136.0/21
NetName: CL-199-168-136-0-21
NetHandle: NET-199-168-136-0-2
Parent: CL-1210 (NET-199-168-136-0-1)
NetType: Reassigned
OriginAS: AS25820
Customer: IT7 Networks Inc (C07063613)
RegDate: 2018-09-17
Updated: 2018-09-17
Ref: https://rdap.arin.net/registry/ip/199.168.136.0

CustName: IT7 Networks Inc
Address: 530 W 6th Street
City: Los Angeles
StateProv: CA
PostalCode: 90014
Country: US
RegDate: 2018-09-17
Updated: 2018-09-17
Ref: https://rdap.arin.net/registry/entity/C07063613

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-408-260-5757
OrgAbuseEmail: abuse@sioru.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgTechHandle: TECHN1201-ARIN
OrgTechName: Technical Contact
OrgTechPhone: +1-408-260-5757
OrgTechEmail: arin-tech@sioru.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-408-260-5757
OrgNOCEmail: arin-noc@sioru.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12969-ARIN
DNS BlackList results:
Most recent complaints on 199.168.141.203
Complaint by Andrew :

our server has been subjected to sustained brute force attacks from this IP Oct 21 03:52:29 server1 sshd[23621]: Failed password for invalid user testuser from 199.168.141.203 port 52794 ssh2 Oct 21 03:52:29 server1 sshd[23622]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:29 server1 sshd[23623]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:29 server1 sshd[23624]: input_userauth_request: invalid user testuser Oct 21 03:52:29 server1 sshd[23623]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:29 server1 sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:31 server1 sshd[23623]: Failed password for invalid user testuser from 199.168.141.203 port 53478 ssh2 Oct 21 03:52:31 server1 sshd[23624]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:31 server1 sshd[23626]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:31 server1 sshd[23627]: input_userauth_request: invalid user testuser Oct 21 03:52:31 server1 sshd[23626]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:31 server1 sshd[23626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:33 server1 sshd[23626]: Failed password for invalid user testuser from 199.168.141.203 port 54115 ssh2 Oct 21 03:52:33 server1 sshd[23627]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:33 server1 sshd[23629]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:33 server1 sshd[23630]: input_userauth_request: invalid user testuser Oct 21 03:52:33 server1 sshd[23629]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:33 server1 sshd[23629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:35 server1 sshd[23629]: Failed password for invalid user testuser from 199.168.141.203 port 54742 ssh2 Oct 21 03:52:35 server1 sshd[23630]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:35 server1 sshd[23634]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:35 server1 sshd[23635]: input_userauth_request: invalid user testuser Oct 21 03:52:35 server1 sshd[23634]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:35 server1 sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:37 server1 sshd[23634]: Failed password for invalid user testuser from 199.168.141.203 port 55484 ssh2 Oct 21 03:52:37 server1 sshd[23635]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:37 server1 sshd[23637]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:37 server1 sshd[23638]: input_userauth_request: invalid user testuser Oct 21 03:52:37 server1 sshd[23637]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:37 server1 sshd[23637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br

Reported on: 25th, Oct. 2012

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 199.168.141.203 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.