Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '178.16.53.0 - 178.16.53.255'

% Abuse contact for '178.16.53.0 - 178.16.53.255' is 'abuse@omegatech.sc'

inetnum:        178.16.53.0 - 178.16.53.255
netname:        OMEGATECH
country:        NL
geofeed:        https://omegatech.sc/geofeed.csv
descr:          OMEGATECH
org:            ORG-OL329-RIPE
abuse-c:        CA12141-RIPE
admin-c:        CA12141-RIPE
tech-c:         CA12141-RIPE
mnt-domains:    omegatechsc-mnt
mnt-lower:      omegatechsc-mnt
mnt-routes:     omegatechsc-mnt
status:         ASSIGNED PA
mnt-by:         lir-tr-mgn-1-MNT
created:        2025-08-19T16:04:50Z
last-modified:  2026-01-21T12:56:11Z
source:         RIPE

organisation:   ORG-OL329-RIPE
org-name:       Omegatech LTD
org-type:       OTHER
address:        HOUSE OF FRANCIS ROOM 303, ILE DU PORT, MAHE, SEYCHELLES
country:        SC
abuse-c:        CA12141-RIPE
mnt-ref:        omegatechsc-mnt
mnt-ref:        lir-tr-mgn-1-MNT
created:        2026-01-05T00:10:50Z
last-modified:  2026-01-21T12:55:02Z
source:         RIPE # Filtered
mnt-by:         omegatechsc-mnt

role:           Abuse Contact
address:        abuse@omegatech.sc
nic-hdl:        CA12141-RIPE
abuse-mailbox:  abuse@omegatech.sc
mnt-by:         omegatechsc-mnt
created:        2026-01-05T00:09:14Z
last-modified:  2026-01-21T12:42:42Z
source:         RIPE # Filtered

% Information related to '178.16.53.0/24AS202412'

route:          178.16.53.0/24
origin:         AS202412
created:        2026-01-21T12:34:45Z
last-modified:  2026-01-21T12:34:45Z
source:         RIPE
mnt-by:         lir-tr-mgn-1-MNT

% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.16.53.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.16.53.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031200 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 16:01:15 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 90.53.16.178.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.53.16.178.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.72.214.21 attackbots
Unauthorized connection attempt from IP address 36.72.214.21 on Port 445(SMB)
2020-02-25 06:13:43
134.90.149.146 attackspam
0,39-02/05 [bc01/m08] PostRequest-Spammer scoring: rome
2020-02-25 05:51:15
185.216.212.229 attackspambots
" "
2020-02-25 05:45:43
101.255.65.186 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-25 05:51:46
114.32.52.184 attackspambots
Automatic report - XMLRPC Attack
2020-02-25 06:08:54
85.105.247.208 attackspambots
Unauthorized connection attempt from IP address 85.105.247.208 on Port 445(SMB)
2020-02-25 05:58:05
46.98.203.113 attack
1582550304 - 02/24/2020 14:18:24 Host: 46.98.203.113/46.98.203.113 Port: 445 TCP Blocked
2020-02-25 05:52:25
89.208.228.187 attack
Feb 24 16:12:46 debian-2gb-nbg1-2 kernel: \[4816366.579172\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.208.228.187 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=13518 PROTO=TCP SPT=47537 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-25 06:07:07
14.240.199.180 attack
DATE:2020-02-24 14:16:28, IP:14.240.199.180, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-25 05:48:25
107.189.11.11 attackspambots
2020-02-24T22:38:40.099689vfs-server-01 sshd\[12449\]: Invalid user fake from 107.189.11.11 port 42876
2020-02-24T22:38:40.366992vfs-server-01 sshd\[12451\]: Invalid user admin from 107.189.11.11 port 43298
2020-02-24T22:38:41.537990vfs-server-01 sshd\[12457\]: Invalid user ubnt from 107.189.11.11 port 43966
2020-02-25 06:28:59
190.96.238.229 attack
Port probing on unauthorized port 23
2020-02-25 06:15:26
185.244.39.76 attack
02/24/2020-23:05:02.115054 185.244.39.76 Protocol: 17 ET SCAN Sipvicious Scan
2020-02-25 06:22:52
202.57.45.154 attackspam
1582550315 - 02/24/2020 14:18:35 Host: 202.57.45.154/202.57.45.154 Port: 445 TCP Blocked
2020-02-25 05:48:54
117.200.215.157 attackbots
Automatic report - Port Scan Attack
2020-02-25 06:25:30
185.232.67.5 attack
Feb 24 23:00:39 dedicated sshd[18212]: Invalid user admin from 185.232.67.5 port 44566
2020-02-25 06:04:22

Recently Reported IPs

2600:140e:6::6854:969c 2409:8c54:871:2006::df 2.249.142.165 185.231.33.46
10.36.198.186 254.238.12.218 74.7.241.51 74.7.175.142
149.52.71.138 80.174.222.112 122.162.151.75 192.71.224.103
37.24.235.170 45.142.154.32 178.62.29.13 220.103.92.112
20.23.9.218 91.231.89.68 91.231.89.2 58.240.69.164