City: Columbus
Region: Ohio
Country: United States
Internet Service Provider: RTC Communications LLC
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.73.208.0 - 216.73.219.255
CIDR: 216.73.208.0/21, 216.73.216.0/22
NetName: AMAZO-4
NetHandle: NET-216-73-208-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon.com, Inc. (AMAZO-4)
RegDate: 2024-03-26
Updated: 2024-03-26
Ref: https://rdap.arin.net/registry/ip/216.73.208.0
OrgName: Amazon.com, Inc.
OrgId: AMAZO-4
Address: Amazon Web Services, Inc.
Address: P.O. Box 81226
City: Seattle
StateProv: WA
PostalCode: 98108-1226
Country: US
RegDate: 2005-09-29
Updated: 2022-09-30
Comment: For details of this service please see
Comment: http://ec2.amazonaws.com
Ref: https://rdap.arin.net/registry/entity/AMAZO-4
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-555-0000
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: ARMP-ARIN
OrgRoutingName: AWS RPKI Management POC
OrgRoutingPhone: +1-206-555-0000
OrgRoutingEmail: aws-rpki-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-555-0000
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-555-0000
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
# end
# start
NetRange: 216.73.216.0 - 216.73.219.255
CIDR: 216.73.216.0/22
NetName: AWS-ANTHROPIC
NetHandle: NET-216-73-216-0-1
Parent: AMAZO-4 (NET-216-73-208-0-1)
NetType: Reassigned
OriginAS:
Organization: Anthropic, PBC (AP-2440)
RegDate: 2024-06-05
Updated: 2024-06-05
Ref: https://rdap.arin.net/registry/ip/216.73.216.0
OrgName: Anthropic, PBC
OrgId: AP-2440
Address: 548 Market St.
Address: PMB 90375
City: San Francisco
StateProv: CA
PostalCode: 94104-5401
Country: US
RegDate: 2023-07-31
Updated: 2023-08-22
Ref: https://rdap.arin.net/registry/entity/AP-2440
OrgDNSHandle: ANTHR5-ARIN
OrgDNSName: Anthropic
OrgDNSPhone: +1-415-236-0599
OrgDNSEmail: arin@anthropic.com
OrgDNSRef: https://rdap.arin.net/registry/entity/ANTHR5-ARIN
OrgAbuseHandle: ANTHR5-ARIN
OrgAbuseName: Anthropic
OrgAbusePhone: +1-415-236-0599
OrgAbuseEmail: arin@anthropic.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ANTHR5-ARIN
OrgRoutingHandle: ANTHR5-ARIN
OrgRoutingName: Anthropic
OrgRoutingPhone: +1-415-236-0599
OrgRoutingEmail: arin@anthropic.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ANTHR5-ARIN
OrgTechHandle: ANTHR5-ARIN
OrgTechName: Anthropic
OrgTechPhone: +1-415-236-0599
OrgTechEmail: arin@anthropic.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANTHR5-ARIN
OrgNOCHandle: ANTHR5-ARIN
OrgNOCName: Anthropic
OrgNOCPhone: +1-415-236-0599
OrgNOCEmail: arin@anthropic.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ANTHR5-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.73.216.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.73.216.215. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 21:30:41 CST 2026
;; MSG SIZE rcvd: 107
Host 215.216.73.216.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 215.216.73.216.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.100.222.146 | attackspambots | port 23 |
2020-02-19 03:06:12 |
| 155.133.92.158 | attack | TCP port 8080: Scan and connection |
2020-02-19 03:22:44 |
| 92.190.153.246 | attackspambots | 20 attempts against mh-ssh on cloud |
2020-02-19 03:25:11 |
| 128.199.169.146 | attackspambots | Feb 18 20:01:19 dedicated sshd[32689]: Invalid user css from 128.199.169.146 port 56822 |
2020-02-19 03:05:44 |
| 222.186.175.151 | attackspambots | 2020-02-18T19:10:30.803590abusebot-8.cloudsearch.cf sshd[13645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root 2020-02-18T19:10:32.390701abusebot-8.cloudsearch.cf sshd[13645]: Failed password for root from 222.186.175.151 port 14010 ssh2 2020-02-18T19:10:35.320748abusebot-8.cloudsearch.cf sshd[13645]: Failed password for root from 222.186.175.151 port 14010 ssh2 2020-02-18T19:10:30.803590abusebot-8.cloudsearch.cf sshd[13645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root 2020-02-18T19:10:32.390701abusebot-8.cloudsearch.cf sshd[13645]: Failed password for root from 222.186.175.151 port 14010 ssh2 2020-02-18T19:10:35.320748abusebot-8.cloudsearch.cf sshd[13645]: Failed password for root from 222.186.175.151 port 14010 ssh2 2020-02-18T19:10:30.803590abusebot-8.cloudsearch.cf sshd[13645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... |
2020-02-19 03:14:25 |
| 193.32.163.123 | attack | 2020-02-19T04:03:56.789885luisaranguren sshd[3197442]: Invalid user admin from 193.32.163.123 port 53664 2020-02-19T04:03:58.859019luisaranguren sshd[3197442]: Failed password for invalid user admin from 193.32.163.123 port 53664 ssh2 ... |
2020-02-19 03:05:16 |
| 91.229.10.94 | attackbots | Automatic report - Port Scan Attack |
2020-02-19 03:00:53 |
| 45.95.35.149 | attackbots | eMail SPAM |
2020-02-19 03:19:38 |
| 71.14.37.12 | attackspam | tcp 9530 |
2020-02-19 03:27:16 |
| 178.32.163.202 | attackspambots | Feb 18 20:06:29 MK-Soft-VM5 sshd[12037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.163.202 Feb 18 20:06:31 MK-Soft-VM5 sshd[12037]: Failed password for invalid user debian from 178.32.163.202 port 59932 ssh2 ... |
2020-02-19 03:40:44 |
| 185.243.53.78 | attackspambots | Feb 18 14:05:28 twattle sshd[26037]: Did not receive identification str= ing from 185.243.53.78 Feb 18 14:05:47 twattle sshd[26038]: Received disconnect from 185.243.5= 3.78: 11: Normal Shutdown, Thank you for playing [preauth] Feb 18 14:06:07 twattle sshd[26040]: Invalid user oracle from 185.243.5= 3.78 Feb 18 14:06:07 twattle sshd[26040]: Received disconnect from 185.243.5= 3.78: 11: Normal Shutdown, Thank you for playing [preauth] Feb 18 14:06:27 twattle sshd[26042]: Received disconnect from 185.243.5= 3.78: 11: Normal Shutdown, Thank you for playing [preauth] Feb 18 14:06:47 twattle sshd[26046]: Invalid user postgres from 185.243= .53.78 Feb 18 14:06:47 twattle sshd[26046]: Received disconnect from 185.243.5= 3.78: 11: Normal Shutdown, Thank you for playing [preauth] Feb 18 14:07:07 twattle sshd[26048]: Received disconnect from 185.243.5= 3.78: 11: Normal Shutdown, Thank you for playing [preauth] Feb 18 14:07:28 twattle sshd[26050]: Invalid user hadoop from 185.243......... ------------------------------- |
2020-02-19 03:25:39 |
| 52.172.136.92 | attackspambots | Feb 18 15:12:29 vps46666688 sshd[4758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.136.92 Feb 18 15:12:31 vps46666688 sshd[4758]: Failed password for invalid user florida from 52.172.136.92 port 41964 ssh2 ... |
2020-02-19 03:14:38 |
| 59.17.104.98 | attack | DATE:2020-02-18 14:19:57, IP:59.17.104.98, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-02-19 03:01:09 |
| 49.88.226.153 | attack | Feb 18 14:07:21 tux postfix/smtpd[17103]: connect from unknown[49.88.226.153] Feb x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=49.88.226.153 |
2020-02-19 03:04:20 |
| 94.1.67.165 | attackspambots | Port probing on unauthorized port 23 |
2020-02-19 03:23:46 |