City: Amsterdam
Region: Noord Holland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.139.136.0 - 45.150.51.255
CIDR: 45.150.0.0/19, 45.144.0.0/14, 45.139.136.0/21, 45.139.192.0/18, 45.150.48.0/22, 45.148.0.0/15, 45.139.144.0/20, 45.139.160.0/19, 45.150.32.0/20, 45.140.0.0/14
NetName: RIPE
NetHandle: NET-45-139-136-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-05-22
Updated: 2025-04-14
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.139.136.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.140.222.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.140.222.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:01:48 CST 2026
;; MSG SIZE rcvd: 107
140.222.140.45.in-addr.arpa domain name pointer security.criminalip.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.222.140.45.in-addr.arpa name = security.criminalip.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 181.53.251.181 | attackspam | $f2bV_matches |
2020-07-17 01:44:07 |
| 13.77.154.108 | attack | 2020-07-16T18:20:41.939316scmdmz1 sshd[24201]: Failed password for root from 13.77.154.108 port 16145 ssh2 2020-07-16T18:28:08.040839scmdmz1 sshd[25210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.154.108 user=root 2020-07-16T18:28:09.621637scmdmz1 sshd[25210]: Failed password for root from 13.77.154.108 port 5960 ssh2 ... |
2020-07-17 01:39:26 |
| 159.203.27.146 | attackbotsspam | k+ssh-bruteforce |
2020-07-17 01:54:28 |
| 113.142.144.3 | attackspam | Jul 16 13:41:15 ny01 sshd[17563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.144.3 Jul 16 13:41:17 ny01 sshd[17563]: Failed password for invalid user will from 113.142.144.3 port 52523 ssh2 Jul 16 13:48:37 ny01 sshd[18519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.144.3 |
2020-07-17 01:52:48 |
| 13.74.179.179 | attackspam | Jul 16 17:20:01 ssh2 sshd[56987]: User root from 13.74.179.179 not allowed because not listed in AllowUsers Jul 16 17:20:01 ssh2 sshd[56987]: Failed password for invalid user root from 13.74.179.179 port 1470 ssh2 Jul 16 17:20:01 ssh2 sshd[56987]: Disconnected from invalid user root 13.74.179.179 port 1470 [preauth] ... |
2020-07-17 01:49:53 |
| 190.232.106.248 | attackspambots | 2020-07-16T17:33:54.085803v22018076590370373 sshd[29040]: Invalid user qun from 190.232.106.248 port 55847 2020-07-16T17:33:54.092575v22018076590370373 sshd[29040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.232.106.248 2020-07-16T17:33:54.085803v22018076590370373 sshd[29040]: Invalid user qun from 190.232.106.248 port 55847 2020-07-16T17:33:56.285346v22018076590370373 sshd[29040]: Failed password for invalid user qun from 190.232.106.248 port 55847 ssh2 2020-07-16T18:23:15.296272v22018076590370373 sshd[32535]: Invalid user shreya from 190.232.106.248 port 46828 ... |
2020-07-17 02:05:07 |
| 95.12.115.139 | attackspambots | Unauthorized connection attempt from IP address 95.12.115.139 on Port 445(SMB) |
2020-07-17 01:55:39 |
| 20.185.31.250 | attack | SSH brute-force attempt |
2020-07-17 01:36:59 |
| 84.38.187.184 | attackbotsspam | Jul 16 16:47:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=84.38.187.184 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=48113 PROTO=TCP SPT=43163 DPT=389 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:47:33 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=84.38.187.184 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=21478 PROTO=TCP SPT=43163 DPT=510 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:49:42 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=84.38.187.184 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=22324 PROTO=TCP SPT=43163 DPT=242 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:50:31 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=84.38.187.184 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=63292 PROTO=TCP SPT=43163 DPT=156 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:52:58 *hidden* kernel: ... |
2020-07-17 01:59:39 |
| 104.42.75.167 | attackspambots | Jul 16 20:56:12 lunarastro sshd[10536]: Failed password for root from 104.42.75.167 port 64148 ssh2 Jul 16 22:48:18 lunarastro sshd[13661]: Failed password for root from 104.42.75.167 port 44968 ssh2 |
2020-07-17 01:32:31 |
| 129.204.177.7 | attack | Jul 16 15:54:04 rush sshd[21913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7 Jul 16 15:54:06 rush sshd[21913]: Failed password for invalid user huang from 129.204.177.7 port 45640 ssh2 Jul 16 15:59:23 rush sshd[22068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7 ... |
2020-07-17 01:33:31 |
| 86.166.31.114 | attack | *Port Scan* detected from 86.166.31.114 (GB/United Kingdom/England/London (South Bank)/host86-166-31-114.range86-166.btcentralplus.com). 4 hits in the last 86 seconds |
2020-07-17 01:53:50 |
| 82.148.17.37 | attackbotsspam | bruteforce detected |
2020-07-17 01:32:45 |
| 52.163.240.162 | attackbotsspam | Jul 16 18:31:26 ns382633 sshd\[10197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.240.162 user=root Jul 16 18:31:28 ns382633 sshd\[10197\]: Failed password for root from 52.163.240.162 port 38432 ssh2 Jul 16 18:34:45 ns382633 sshd\[10557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.240.162 user=root Jul 16 18:34:46 ns382633 sshd\[10557\]: Failed password for root from 52.163.240.162 port 3584 ssh2 Jul 16 18:38:59 ns382633 sshd\[11382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.240.162 user=root |
2020-07-17 01:57:32 |
| 192.241.214.88 | attack |
|
2020-07-17 01:54:02 |