City: Hong Kong
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.192.15.0 - 212.192.15.255'
% Abuse contact for '212.192.15.0 - 212.192.15.255' is 'ripe@interlir.com'
inetnum: 212.192.15.0 - 212.192.15.255
netname: BG-NETWORK
country: HK
geofeed: https://geofeed.info/geofeed-net212.192.15.0-24.csv
org: ORG-BGI3-RIPE
mnt-domains: BG-MNT
mnt-routes: BG-MNT
admin-c: BGI13-RIPE
tech-c: BGI13-RIPE
abuse-c: ACRO45564-RIPE
status: ASSIGNED PA
mnt-by: interlir-mnt
created: 2023-04-06T14:32:55Z
last-modified: 2026-01-05T17:17:35Z
source: RIPE
organisation: ORG-BGI3-RIPE
org-name: Baxet Group Inc.
country: US
org-type: OTHER
geoloc: 39.7456 75.5482
language: EN
address: 2093 PHILADELPHIA PIKE, 6009
address: Claymont, DE 19703-2424
address: US
phone: +1 (917) 938-7088
abuse-c: BGI13-RIPE
mnt-ref: MARTON-MNT
mnt-ref: voldeta-mnt
mnt-ref: interlir-mnt
mnt-ref: RELCOMGROUP-EXT-MNT
mnt-ref: BG-MNT
mnt-by: BG-MNT
created: 2022-01-27T10:25:14Z
last-modified: 2025-05-17T16:25:57Z
source: RIPE # Filtered
role: Baxet Group Inc.
address: 2093 PHILADELPHIA PIKE, 6009
address: Claymont, DE 19703-2424
address: US
abuse-mailbox: abuse@baxetgroup.com
nic-hdl: BGI13-RIPE
mnt-by: BG-MNT
created: 2022-01-27T10:23:35Z
last-modified: 2023-01-04T12:49:29Z
source: RIPE # Filtered
% Information related to '212.192.15.0/24AS26383'
route: 212.192.15.0/24
origin: AS26383
mnt-by: BG-MNT
created: 2023-04-06T15:39:57Z
last-modified: 2023-04-06T15:39:57Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.192.15.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.192.15.100. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052101 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 21 20:56:37 CST 2026
;; MSG SIZE rcvd: 107
Host 100.15.192.212.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 100.15.192.212.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.116.24.183 | attackspambots | Unauthorised access (Feb 28) SRC=103.116.24.183 LEN=40 TTL=54 ID=11407 TCP DPT=23 WINDOW=46628 SYN |
2020-02-28 13:38:34 |
| 164.132.145.70 | attackbotsspam | Feb 28 06:41:06 vps647732 sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70 Feb 28 06:41:09 vps647732 sshd[27933]: Failed password for invalid user kristofvps from 164.132.145.70 port 60682 ssh2 ... |
2020-02-28 13:42:38 |
| 187.9.100.82 | attackbotsspam | Honeypot attack, port: 445, PTR: 187-9-100-82.customer.tdatabrasil.net.br. |
2020-02-28 13:53:49 |
| 97.121.167.110 | attackbots | Automatic report - Port Scan Attack |
2020-02-28 13:46:21 |
| 190.177.81.36 | attackbotsspam | Honeypot attack, port: 81, PTR: 190-177-81-36.speedy.com.ar. |
2020-02-28 13:34:07 |
| 45.95.32.253 | attack | Postfix RBL failed |
2020-02-28 13:35:15 |
| 181.48.232.108 | attack | 20/2/27@23:56:30: FAIL: Alarm-Network address from=181.48.232.108 20/2/27@23:56:30: FAIL: Alarm-Network address from=181.48.232.108 ... |
2020-02-28 13:48:17 |
| 103.193.90.210 | attackbots | Honeypot attack, port: 445, PTR: Kol-103.193.90.210.PMPL-Broadband.net. |
2020-02-28 13:47:16 |
| 189.204.159.172 | attackbots | Brute forcing email accounts |
2020-02-28 13:44:38 |
| 37.235.227.170 | attackspam | Honeypot attack, port: 445, PTR: 37-235-227-170.dynamic.customer.lanta.me. |
2020-02-28 13:18:39 |
| 117.84.122.244 | attackspam | Honeypot attack, port: 5555, PTR: 244.122.84.117.broad.wx.js.dynamic.163data.com.cn. |
2020-02-28 13:55:00 |
| 1.243.143.233 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-02-28 13:12:57 |
| 122.51.71.197 | attack | Feb 28 06:26:05 mout sshd[22633]: Invalid user deploy from 122.51.71.197 port 59928 |
2020-02-28 13:53:29 |
| 112.85.42.72 | attackbotsspam | 2020-02-28T05:55:12.598325vps751288.ovh.net sshd\[25867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72 user=root 2020-02-28T05:55:14.271600vps751288.ovh.net sshd\[25867\]: Failed password for root from 112.85.42.72 port 25901 ssh2 2020-02-28T05:55:16.609071vps751288.ovh.net sshd\[25867\]: Failed password for root from 112.85.42.72 port 25901 ssh2 2020-02-28T05:55:19.389981vps751288.ovh.net sshd\[25867\]: Failed password for root from 112.85.42.72 port 25901 ssh2 2020-02-28T05:56:27.532747vps751288.ovh.net sshd\[25883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72 user=root |
2020-02-28 13:51:22 |
| 159.89.86.92 | attack | Automatic report - XMLRPC Attack |
2020-02-28 13:43:18 |