City: Amsterdam
Region: Noord Holland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.152.220.0 - 45.154.215.255
CIDR: 45.154.0.0/17, 45.154.192.0/20, 45.152.220.0/22, 45.152.224.0/19, 45.154.128.0/18, 45.153.0.0/16, 45.154.208.0/21
NetName: RIPE
NetHandle: NET-45-152-220-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2014-05-22
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/45.152.220.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.154.98.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.154.98.144. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110801 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 09 03:00:10 CST 2025
;; MSG SIZE rcvd: 106
144.98.154.45.in-addr.arpa domain name pointer 45.154.98.144.powered.by.rdp.sh.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
144.98.154.45.in-addr.arpa name = 45.154.98.144.powered.by.rdp.sh.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.53.114.5 | attackbots | Oct 9 04:39:08 server sshd[8151]: Failed password for invalid user cpanel from 106.53.114.5 port 45296 ssh2 Oct 9 04:52:35 server sshd[11247]: Failed password for invalid user sysadmin from 106.53.114.5 port 59566 ssh2 Oct 9 05:01:26 server sshd[13108]: Failed password for root from 106.53.114.5 port 41184 ssh2 |
2020-10-09 12:07:35 |
| 51.15.214.21 | attack | Oct 9 02:01:20 buvik sshd[6595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.214.21 Oct 9 02:01:22 buvik sshd[6595]: Failed password for invalid user rpm from 51.15.214.21 port 55800 ssh2 Oct 9 02:04:13 buvik sshd[6974]: Invalid user mailman from 51.15.214.21 ... |
2020-10-09 08:06:08 |
| 2.206.214.120 | attackspambots | Unauthorized connection attempt detected Error 401 |
2020-10-09 12:22:52 |
| 188.166.247.82 | attackbotsspam | SSH bruteforce |
2020-10-09 12:32:35 |
| 125.99.242.202 | attackbotsspam | $f2bV_matches |
2020-10-09 08:05:45 |
| 42.180.206.192 | attackspam | Oct 08 21:02:26 askasleikir sshd[3487]: Failed password for invalid user nagios from 42.180.206.192 port 37116 ssh2 |
2020-10-09 12:35:22 |
| 125.117.168.14 | attackspam | Oct 8 22:47:55 srv01 postfix/smtpd\[23398\]: warning: unknown\[125.117.168.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 22:48:07 srv01 postfix/smtpd\[23398\]: warning: unknown\[125.117.168.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 22:48:23 srv01 postfix/smtpd\[23398\]: warning: unknown\[125.117.168.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 22:48:42 srv01 postfix/smtpd\[23398\]: warning: unknown\[125.117.168.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 22:48:54 srv01 postfix/smtpd\[23398\]: warning: unknown\[125.117.168.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-09 12:23:22 |
| 134.175.59.225 | attack | prod8 ... |
2020-10-09 12:05:11 |
| 148.72.208.210 | attackspambots | bruteforce detected |
2020-10-09 12:06:49 |
| 119.102.24.183 | attackbots | Fail2Ban - SMTP Bruteforce Attempt |
2020-10-09 12:15:17 |
| 49.234.60.118 | attackbots | Oct 9 04:51:14 ajax sshd[20191]: Failed password for root from 49.234.60.118 port 36760 ssh2 Oct 9 04:52:00 ajax sshd[20452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.60.118 |
2020-10-09 12:33:05 |
| 212.60.20.219 | attackspam | C1,Magento Bruteforce Login Attack POST /index.php/admin/ |
2020-10-09 12:01:33 |
| 188.163.109.153 | attackbotsspam | 0,91-02/27 [bc01/m26] PostRequest-Spammer scoring: luanda |
2020-10-09 12:03:53 |
| 43.226.144.63 | attackbots | Oct 9 00:55:25 con01 sshd[2947580]: Failed password for root from 43.226.144.63 port 49430 ssh2 Oct 9 00:59:25 con01 sshd[2955494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.144.63 user=root Oct 9 00:59:27 con01 sshd[2955494]: Failed password for root from 43.226.144.63 port 54148 ssh2 Oct 9 01:03:22 con01 sshd[2963388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.144.63 user=root Oct 9 01:03:24 con01 sshd[2963388]: Failed password for root from 43.226.144.63 port 58860 ssh2 ... |
2020-10-09 12:33:32 |
| 217.116.26.90 | attack | Suspicious access to SMTP/POP/IMAP services. |
2020-10-09 12:25:54 |