City: Lelystad
Region: Flevoland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.214.57.226 | attackbotsspam | SpamScore above: 10.0 |
2020-05-27 21:32:53 |
| 103.214.54.34 | attack | spam |
2020-03-01 19:14:37 |
| 103.214.55.14 | attack | Automatic report - Banned IP Access |
2019-10-13 07:32:27 |
| 103.214.54.34 | attackbotsspam | "Account brute force using dictionary attack against Exchange Online" |
2019-08-06 08:31:55 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.214.4.0 - 103.214.7.255'
% Abuse contact for '103.214.4.0 - 103.214.7.255' is 'info@hostslim.nl'
inetnum: 103.214.4.0 - 103.214.7.255
netname: RAKAR-AP
descr: RAKAR INVESTMENTS HOLDING B.V.
country: NL
org: ORG-RIHB1-AP
admin-c: RIHB1-AP
tech-c: RIHB1-AP
status: ALLOCATED PORTABLE
abuse-c: AR773-AP
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-RAKAR-AP
mnt-routes: MAINT-RAKAR-AP
mnt-irt: IRT-RAKAR-AP
last-modified: 2026-01-20T02:42:43Z
source: APNIC
irt: IRT-RAKAR-AP
address: Artemisweg 145-G, Lelystad Flevoland 8239DD
e-mail: info@hostslim.nl
abuse-mailbox: info@hostslim.nl
admin-c: RIHB1-AP
tech-c: RIHB1-AP
auth: # Filtered
remarks: info@hostslim.nl was validated on 2026-01-06
mnt-by: MAINT-RAKAR-AP
last-modified: 2026-01-06T13:10:23Z
source: APNIC
organisation: ORG-RIHB1-AP
org-name: RAKAR INVESTMENTS HOLDING B.V.
org-type: LIR
country: NL
address: Artemisweg 145-G
phone: +31320301511
e-mail: abuse@rakar.nl
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:53Z
source: APNIC
role: ABUSE RAKARAP
country: ZZ
address: Artemisweg 145-G, Lelystad Flevoland 8239DD
phone: +000000000
e-mail: info@hostslim.nl
admin-c: RIHB1-AP
tech-c: RIHB1-AP
nic-hdl: AR773-AP
remarks: Generated from irt object IRT-RAKAR-AP
remarks: info@hostslim.nl was validated on 2026-01-06
abuse-mailbox: info@hostslim.nl
mnt-by: APNIC-ABUSE
last-modified: 2026-01-06T13:10:54Z
source: APNIC
role: RAKAR INVESTMENTS HOLDING BV administrator
address: Artemisweg 145-G, Lelystad Flevoland 8239DD
country: NL
phone: +31320301511
fax-no: +31320301511
e-mail: abuse@rakar.nl
admin-c: RIHB1-AP
tech-c: RIHB1-AP
nic-hdl: RIHB1-AP
mnt-by: MAINT-RAKAR-AP
last-modified: 2016-05-18T09:31:32Z
source: APNIC
% Information related to '103.214.4.0/22AS207083'
route: 103.214.4.0/22
origin: AS207083
descr: HostSlim BV
Artemisweg 145-G
8239 DD Lelystad
The Netherlands
mnt-by: MAINT-RAKAR-AP
last-modified: 2026-01-20T02:41:34Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.214.5.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.214.5.133. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 12:31:22 CST 2026
;; MSG SIZE rcvd: 106
b'133.5.214.103.in-addr.arpa has no PTR record
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 133.5.214.103.in-addr.arpa.: No answer
Authoritative answers can be found from:
5.214.103.in-addr.arpa
origin = dns0.hostslim.nl
mail addr = dns0.hostslim.nl
serial = 2025061904
refresh = 28800
retry = 7200
expire = 604800
minimum = 86400
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.220.101.207 | attackspam | IP blocked |
2020-09-05 21:52:42 |
| 182.185.107.30 | attack | Sep 4 18:52:01 mellenthin postfix/smtpd[32306]: NOQUEUE: reject: RCPT from unknown[182.185.107.30]: 554 5.7.1 Service unavailable; Client host [182.185.107.30] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/182.185.107.30; from= |
2020-09-05 21:49:10 |
| 106.54.52.35 | attackbotsspam | (sshd) Failed SSH login from 106.54.52.35 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 5 09:19:01 server sshd[29294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35 user=root Sep 5 09:19:03 server sshd[29294]: Failed password for root from 106.54.52.35 port 56124 ssh2 Sep 5 09:23:58 server sshd[30549]: Invalid user es from 106.54.52.35 port 39318 Sep 5 09:24:00 server sshd[30549]: Failed password for invalid user es from 106.54.52.35 port 39318 ssh2 Sep 5 09:25:18 server sshd[30960]: Invalid user publish from 106.54.52.35 port 51856 |
2020-09-05 21:34:43 |
| 178.86.210.81 | attackspambots | Sep 4 18:51:49 mellenthin postfix/smtpd[32280]: NOQUEUE: reject: RCPT from unknown[178.86.210.81]: 554 5.7.1 Service unavailable; Client host [178.86.210.81] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/178.86.210.81; from= |
2020-09-05 21:58:01 |
| 54.37.71.203 | attackspam | (sshd) Failed SSH login from 54.37.71.203 (FR/France/203.ip-54-37-71.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 5 03:19:37 server sshd[28102]: Failed password for root from 54.37.71.203 port 53028 ssh2 Sep 5 03:33:06 server sshd[510]: Invalid user vlc from 54.37.71.203 port 51796 Sep 5 03:33:08 server sshd[510]: Failed password for invalid user vlc from 54.37.71.203 port 51796 ssh2 Sep 5 03:38:08 server sshd[2168]: Failed password for root from 54.37.71.203 port 59732 ssh2 Sep 5 03:42:45 server sshd[3469]: Invalid user bernd from 54.37.71.203 port 39352 |
2020-09-05 21:36:51 |
| 106.13.123.73 | attackspam | Sep 5 15:17:40 vps647732 sshd[978]: Failed password for root from 106.13.123.73 port 48846 ssh2 ... |
2020-09-05 21:49:52 |
| 201.208.54.75 | attack | Honeypot attack, port: 445, PTR: 201-208-54-75.genericrev.cantv.net. |
2020-09-05 21:42:42 |
| 200.2.190.31 | attackbotsspam | Sep 4 18:51:40 mellenthin postfix/smtpd[32575]: NOQUEUE: reject: RCPT from unknown[200.2.190.31]: 554 5.7.1 Service unavailable; Client host [200.2.190.31] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/200.2.190.31; from= |
2020-09-05 22:03:30 |
| 178.128.161.21 | attack | SmallBizIT.US 1 packets to tcp(22) |
2020-09-05 22:01:11 |
| 103.63.215.38 | attackbots | Honeypot attack, port: 445, PTR: static-ptr.ehost.vn. |
2020-09-05 22:04:44 |
| 60.15.67.178 | attack | sshd jail - ssh hack attempt |
2020-09-05 21:47:01 |
| 177.152.124.19 | attack | *Port Scan* detected from 177.152.124.19 (BR/Brazil/Minas Gerais/Timóteo/-). 4 hits in the last 50 seconds |
2020-09-05 22:07:26 |
| 47.52.112.219 | attack | 3-9-2020 18:45:55 Unauthorized connection attempt (Brute-Force). 3-9-2020 18:45:55 Connection from IP address: 47.52.112.219 on port: 587 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=47.52.112.219 |
2020-09-05 22:06:35 |
| 172.245.186.114 | attack | Sep 5 12:27:14 *** sshd[22304]: Did not receive identification string from 172.245.186.114 |
2020-09-05 21:37:46 |
| 65.49.194.40 | attack | $f2bV_matches |
2020-09-05 21:32:31 |