City: Amsterdam
Region: Noord Holland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.176.16.0 - 213.176.16.255'
% Abuse contact for '213.176.16.0 - 213.176.16.255' is 'abuse@globconnex.com'
inetnum: 213.176.16.0 - 213.176.16.255
netname: GCS_SER-NET
org: ORG-GCSL7-RIPE
country: NL
admin-c: EM14633-RIPE
tech-c: EM14633-RIPE
abuse-c: ACRO55365-RIPE
status: ASSIGNED PA
mnt-by: INETTECH-MNT
mnt-by: IROST-MNT
created: 2025-09-16T06:22:04Z
last-modified: 2025-09-16T07:18:49Z
source: RIPE
organisation: ORG-GCSL7-RIPE
descr: Global Connectivity Solutions
org-name: GLOBAL CONNECTIVITY SOLUTIONS LLP
country: GB
org-type: OTHER
address: Suite 310, 21 Hill Street, Haverfordwest, Pembrokeshire, SA61 1QQ
abuse-c: ACRO55365-RIPE
remarks: -----CONTACT-----
remarks: abuse: abuse@globconnex.com
remarks: support: support@globconnex.com
remarks: -------END-------
mnt-ref: GIRnet-mnt
remarks: -----CUSTOMERS-----
mnt-ref: AM-VDS
mnt-ref: INETTECH-MNT
mnt-ref: ru-avm-1-mnt
mnt-ref: ru-pev-1-mnt
mnt-ref: PROEKT-MNT
mnt-ref: proxy-six-mnt
mnt-ref: IPSMAIN
mnt-ref: IEAG
mnt-ref: MNT-DGTL
mnt-ref: MNT-INTERLAN
mnt-ref: AZERONLINE-MNT
mnt-ref: lir-ru-powernet-1-MNT
mnt-ref: lir-ru-llclorien-1-MNT
mnt-ref: ru-permtelecom-1-mnt
mnt-ref: DATAMAX-M
mnt-ref: IVC-MNT
mnt-ref: FREENET-MNT
mnt-ref: BG-MNT
mnt-ref: ru-quasar-1-mnt
mnt-ref: voldeta-mnt
mnt-ref: interlir-mnt
mnt-ref: mnt-ru-ipdenisova-1
mnt-ref: MNT-STRL
mnt-ref: MNT-GCX
mnt-ref: ROSNIIROS-MNT
mnt-ref: IPMAGNAT-MNT
mnt-ref: VPSVILLE-mnt
mnt-ref: lir-ae-royal-1-MNT
mnt-ref: MNT-NETERRA
mnt-ref: SVT-RIPE-MNT
mnt-ref: mnt-ru-am-1
mnt-ref: us-coreip-1-mnt
mnt-ref: mnt-bg-eurocrypt-1
mnt-ref: lir-ae-technology-1-MNT
mnt-ref: sc-rapidseedbox-1-mnt
mnt-ref: sistemaltd-mnt
mnt-ref: mnt-hr-maxko-1
mnt-ref: MNT-TIGRIS
mnt-ref: mnt-yuglink
mnt-ref: ru-ip84-1-mnt
mnt-ref: ru-avm-1-mnt
mnt-ref: IROST-MNT
mnt-ref: AS12890-MNT
mnt-ref: sistemaltd-mnt
mnt-ref: zanemint-mnt
remarks: --------END--------
mnt-by: GCS-MNT
created: 2024-01-25T10:49:19Z
last-modified: 2025-12-26T11:57:30Z
source: RIPE # Filtered
person: Global Connectivity Solutions
address: Suite 310, 21 Hill Street, Haverfordwest, Pembrokeshire, SA61 1QQ
remarks: -----CONTACT-----
remarks: -------END-------
phone: +44 117 409 0977
nic-hdl: EM14633-RIPE
mnt-by: GCS-MNT
created: 2024-01-25T10:42:56Z
last-modified: 2024-10-26T14:02:57Z
source: RIPE # Filtered
% Information related to '213.176.16.0/24AS215540'
route: 213.176.16.0/24
origin: AS215540
mnt-by: INETTECH-MNT
mnt-by: IROST-MNT
created: 2025-09-16T06:21:29Z
last-modified: 2025-09-16T06:21:29Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.120 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.176.16.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.176.16.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020501 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 22:01:11 CST 2026
;; MSG SIZE rcvd: 107
157.16.176.213.in-addr.arpa domain name pointer 155000.ip-ptr.tech.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.16.176.213.in-addr.arpa name = 155000.ip-ptr.tech.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.157.77.168 | attack | Aug 15 08:09:15 mail1 sshd\[19836\]: Invalid user aaa from 157.157.77.168 port 59553 Aug 15 08:09:15 mail1 sshd\[19836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.157.77.168 Aug 15 08:09:17 mail1 sshd\[19836\]: Failed password for invalid user aaa from 157.157.77.168 port 59553 ssh2 Aug 15 08:14:00 mail1 sshd\[21992\]: Invalid user maie from 157.157.77.168 port 57065 Aug 15 08:14:00 mail1 sshd\[21992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.157.77.168 ... |
2019-08-15 15:21:13 |
| 212.159.128.72 | attack | Automatic report - Port Scan Attack |
2019-08-15 14:52:29 |
| 35.185.239.108 | attackspambots | Aug 15 12:29:52 areeb-Workstation sshd\[8410\]: Invalid user steam from 35.185.239.108 Aug 15 12:29:52 areeb-Workstation sshd\[8410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108 Aug 15 12:29:53 areeb-Workstation sshd\[8410\]: Failed password for invalid user steam from 35.185.239.108 port 45578 ssh2 ... |
2019-08-15 15:01:27 |
| 119.29.87.183 | attack | (sshd) Failed SSH login from 119.29.87.183 (-): 5 in the last 3600 secs |
2019-08-15 15:01:59 |
| 54.37.232.108 | attackspambots | Automatic report |
2019-08-15 15:25:18 |
| 159.65.188.101 | attackbots | Port Scan: TCP/23 |
2019-08-15 14:44:51 |
| 54.37.64.101 | attackspambots | $f2bV_matches |
2019-08-15 14:54:34 |
| 117.254.90.20 | attackbots | Unauthorised access (Aug 15) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=41663 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 14) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=10413 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 13) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=4054 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 13) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=19833 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 12) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=27301 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 12) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=50957 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Aug 11) SRC=117.254.90.20 LEN=40 PREC=0x20 TTL=240 ID=1848 TCP DPT=139 WINDOW=1024 SYN |
2019-08-15 15:29:41 |
| 108.193.62.60 | attackspambots | Honeypot attack, port: 23, PTR: 108-193-62-60.lightspeed.moblal.sbcglobal.net. |
2019-08-15 14:56:30 |
| 178.33.185.70 | attackspambots | Aug 15 09:07:20 OPSO sshd\[6058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.185.70 user=root Aug 15 09:07:22 OPSO sshd\[6058\]: Failed password for root from 178.33.185.70 port 37138 ssh2 Aug 15 09:14:45 OPSO sshd\[6918\]: Invalid user hexin from 178.33.185.70 port 31968 Aug 15 09:14:45 OPSO sshd\[6918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.185.70 Aug 15 09:14:47 OPSO sshd\[6918\]: Failed password for invalid user hexin from 178.33.185.70 port 31968 ssh2 |
2019-08-15 15:22:57 |
| 82.202.197.233 | attackspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-08-15 15:10:30 |
| 60.168.163.78 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-15 14:39:31 |
| 43.228.221.50 | attack | Password spraying over SMTP |
2019-08-15 15:26:29 |
| 200.116.160.38 | attackspambots | $f2bV_matches |
2019-08-15 15:00:38 |
| 194.243.6.150 | attackbotsspam | Aug 15 06:45:52 XXX sshd[45183]: Invalid user ofsaa from 194.243.6.150 port 45240 |
2019-08-15 14:53:06 |