IP: 174.139.160.69United States Near: Sacramento, California, United States
Country:
United States
Region:
CA
City:
Sacramento
Latitude:
38.6471
Longitude:
-121.5418
NetRange: 174.139.160.0 - 174.139.160.127
CIDR: 174.139.160.0/25
NetName: KRYPT
NetHandle: NET-174-139-160-0-1
Parent: VPLSNET (NET-174-139-0-0-1)
NetType: Reassigned
OriginAS: AS35908
Customer: Krypt Technologies (C02958322)
RegDate: 2012-04-11
Updated: 2012-04-11
Ref: https://rdap.arin.net/registry/ip/174.139.160.0

CustName: Krypt Technologies
Address: 1100 North Market
City: Sacramento
StateProv: CA
PostalCode: 95834
Country: US
RegDate: 2012-04-11
Updated: 2012-04-11
Ref: https://rdap.arin.net/registry/entity/C02958322

OrgTechHandle: TME68-ARIN
OrgTechName: Mektrakarn, Ted
OrgTechPhone: +1-213-406-9000
OrgTechEmail: Ted@vpls.net
OrgTechRef: https://rdap.arin.net/registry/entity/TME68-ARIN

OrgNOCHandle: NETWO813-ARIN
OrgNOCName: Network Engineering
OrgNOCPhone: +1-213-406-9018
OrgNOCEmail: abuse@vpls.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN

OrgAbuseHandle: KRYPT-ARIN
OrgAbuseName: Krypt Keeper
OrgAbusePhone: +1-866-599-9593
OrgAbuseEmail: abuse@krypt.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

OrgTechHandle: KRYPT-ARIN
OrgTechName: Krypt Keeper
OrgTechPhone: +1-866-599-9593
OrgTechEmail: abuse@krypt.com
OrgTechRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RTechHandle: KRYPT-ARIN
RTechName: Krypt Keeper
RTechPhone: +1-866-599-9593
RTechEmail: abuse@krypt.com
RTechRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RAbuseHandle: KRYPT-ARIN
RAbuseName: Krypt Keeper
RAbusePhone: +1-866-599-9593
RAbuseEmail: abuse@krypt.com
RAbuseRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RNOCHandle: NETWO813-ARIN
RNOCName: Network Engineering
RNOCPhone: +1-213-406-9018
RNOCEmail: abuse@vpls.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN

NetRange: 174.139.0.0 - 174.139.255.255
CIDR: 174.139.0.0/16
NetName: VPLSNET
NetHandle: NET-174-139-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS35908
Organization: Krypt Technologies (VPLSI)
RegDate: 2008-11-11
Updated: 2012-03-02
Comment:
Comment: For legal requests/assistance please use the
Comment: following contact information:
Comment: VPLS Subpoena Phone: 213-406-9088
Comment: VPLS Abuse Fax: 213-406-9001
Comment: VPLS AUP, Terms of Service and DMCA/Copyright notices info:
Comment: http://www.vpls.net/privacy/
Ref: https://rdap.arin.net/registry/ip/174.139.0.0

Krypt Technologies (VPLSI)

OrgTechHandle: TME68-ARIN
OrgTechName: Mektrakarn, Ted
OrgTechPhone: +1-213-406-9000
OrgTechEmail: Ted@vpls.net
OrgTechRef: https://rdap.arin.net/registry/entity/TME68-ARIN

OrgNOCHandle: NETWO813-ARIN
OrgNOCName: Network Engineering
OrgNOCPhone: +1-213-406-9018
OrgNOCEmail: abuse@vpls.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN

OrgAbuseHandle: KRYPT-ARIN
OrgAbuseName: Krypt Keeper
OrgAbusePhone: +1-866-599-9593
OrgAbuseEmail: abuse@krypt.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

OrgTechHandle: KRYPT-ARIN
OrgTechName: Krypt Keeper
OrgTechPhone: +1-866-599-9593
OrgTechEmail: abuse@krypt.com
OrgTechRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RTechHandle: KRYPT-ARIN
RTechName: Krypt Keeper
RTechPhone: +1-866-599-9593
RTechEmail: abuse@krypt.com
RTechRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RAbuseHandle: KRYPT-ARIN
RAbuseName: Krypt Keeper
RAbusePhone: +1-866-599-9593
RAbuseEmail: abuse@krypt.com
RAbuseRef: https://rdap.arin.net/registry/entity/KRYPT-ARIN

RNOCHandle: NETWO813-ARIN
RNOCName: Network Engineering
RNOCPhone: +1-213-406-9018
RNOCEmail: abuse@vpls.net
RNOCRef: https://rdap.arin.net/registry/entity/NETWO813-ARIN
DNS BlackList results:
Most recent complaints on 174.139.160.69
Complaint by Bob Carver :

Multiple break-in attemps logged: Oct 5 06:35:20 localhost sshd[3320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.139.160.69 user=root Oct 5 06:35:22 localhost sshd[3320]: Failed password for root from 174.139.160.69 port 45353 ssh2 Oct 5 06:35:22 localhost sshd[3320]: Received disconnect from 174.139.160.69: 11: Bye Bye [preauth] Oct 5 06:35:23 localhost sshd[3322]: Address 174.139.160.69 maps to 174.139.160.69.static.customer.krypt.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 5 06:35:23 localhost sshd[3322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.139.160.69 user=root Oct 5 06:35:25 localhost sshd[3322]: Failed password for root from 174.139.160.69 port 45650 ssh2 Oct 5 06:35:25 localhost sshd[3322]: Received disconnect from 174.139.160.69: 11: Bye Bye [preauth] Oct 5 06:35:26 localhost sshd[3325]: Address 174.139.160.69 maps to 174.139.160.69.static.customer.krypt.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 5 06:35:26 localhost sshd[3325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.139.160.69 user=root Oct 5 06:35:29 localhost sshd[3325]: Failed password for root from 174.139.160.69 port 45994 ssh2 Oct 5 06:35:29 localhost sshd[3325]: Received disconnect from 174.139.160.69: 11: Bye Bye [preauth] Oct 5 06:35:30 localhost sshd[3328]: Address 174.139.160.69 maps to 174.139.160.69.static.customer.krypt.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 5 06:35:30 localhost sshd[3328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.139.160.69 user=root

Reported on: 5th, Oct. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 174.139.160.69 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.