City: Epping
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '86.53.160.0 - 86.53.163.255'
% Abuse contact for '86.53.160.0 - 86.53.163.255' is 'abuse@gtt.net'
inetnum: 86.53.160.0 - 86.53.163.255
descr: GTT-CUSTOMER
netname: GTT-CUSTOMER
country: GB
admin-c: JC12685-RIPE
tech-c: JC12685-RIPE
status: SUB-ALLOCATED PA
created: 2026-01-07T06:27:34Z
last-modified: 2026-01-07T06:27:34Z
source: RIPE
mnt-by: AS3257-IPAM-MNT
person: Joyce Cheung
address: Harbour Exchange Square
address: London
address: E14 9GE
phone: +85265963746
nic-hdl: JC12685-RIPE
created: 2026-01-07T06:26:21Z
last-modified: 2026-01-07T06:26:21Z
source: RIPE # Filtered
mnt-by: AS3257-IPAM-MNT
% Information related to '86.53.0.0/16AS3257'
route: 86.53.0.0/16
descr: GTT
origin: AS3257
mnt-by: AS3257-ROUTE-MNT
mnt-lower: AS3257-IPAM-MNT
created: 2023-03-22T16:34:53Z
last-modified: 2025-11-11T10:34:39Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.53.161.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;86.53.161.154. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050301 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 14:10:48 CST 2026
;; MSG SIZE rcvd: 106
b'Host 154.161.53.86.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 154.161.53.86.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 197.44.128.130 | attackspam | Automatic report - Port Scan Attack |
2020-08-18 00:10:42 |
| 49.49.35.181 | attackbotsspam | Unauthorized connection attempt from IP address 49.49.35.181 on Port 445(SMB) |
2020-08-18 00:05:29 |
| 180.101.145.234 | attack | Aug 17 14:25:25 mail postfix/smtpd[14508]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: generic failure Aug 17 14:25:27 mail postfix/smtpd[14508]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: generic failure Aug 17 14:25:28 mail postfix/smtpd[14508]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: generic failure ... |
2020-08-17 23:47:49 |
| 129.204.45.15 | attackspambots | Aug 17 15:44:16 PorscheCustomer sshd[9348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.45.15 Aug 17 15:44:18 PorscheCustomer sshd[9348]: Failed password for invalid user dasusr1 from 129.204.45.15 port 44366 ssh2 Aug 17 15:46:56 PorscheCustomer sshd[9398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.45.15 ... |
2020-08-18 00:04:04 |
| 51.77.220.127 | attack | 51.77.220.127 - - [17/Aug/2020:18:32:16 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-08-17 23:56:59 |
| 192.42.116.16 | attackbots | Aug 17 17:27:26 minden010 sshd[2617]: Failed none for invalid user a from 192.42.116.16 port 19303 ssh2 Aug 17 17:27:27 minden010 sshd[2632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.16 Aug 17 17:27:29 minden010 sshd[2632]: Failed password for invalid user a1 from 192.42.116.16 port 19863 ssh2 ... |
2020-08-18 00:12:01 |
| 201.33.91.170 | attackspambots | Unauthorized connection attempt from IP address 201.33.91.170 on Port 445(SMB) |
2020-08-18 00:16:15 |
| 106.12.161.118 | attack | Aug 17 16:05:24 nextcloud sshd\[16250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.118 user=backup Aug 17 16:05:26 nextcloud sshd\[16250\]: Failed password for backup from 106.12.161.118 port 34658 ssh2 Aug 17 16:09:01 nextcloud sshd\[19978\]: Invalid user confluence from 106.12.161.118 Aug 17 16:09:01 nextcloud sshd\[19978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.118 |
2020-08-17 23:56:39 |
| 67.158.239.26 | attackspam | 2020-08-17T12:03:43+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-08-17 23:50:12 |
| 85.53.160.67 | attack | fail2ban detected bruce force on ssh iptables |
2020-08-18 00:15:29 |
| 31.209.21.17 | attackspambots | Aug 17 16:07:56 electroncash sshd[61388]: Invalid user ubnt from 31.209.21.17 port 45656 Aug 17 16:07:56 electroncash sshd[61388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.209.21.17 Aug 17 16:07:56 electroncash sshd[61388]: Invalid user ubnt from 31.209.21.17 port 45656 Aug 17 16:07:58 electroncash sshd[61388]: Failed password for invalid user ubnt from 31.209.21.17 port 45656 ssh2 Aug 17 16:11:54 electroncash sshd[62443]: Invalid user jeff from 31.209.21.17 port 55802 ... |
2020-08-18 00:07:24 |
| 202.137.10.182 | attack | SSH Bruteforce attack |
2020-08-18 00:03:07 |
| 36.189.253.226 | attackspam | 2020-08-17T11:51:24.846891ionos.janbro.de sshd[32011]: Invalid user Test from 36.189.253.226 port 43841 2020-08-17T11:51:26.968277ionos.janbro.de sshd[32011]: Failed password for invalid user Test from 36.189.253.226 port 43841 ssh2 2020-08-17T11:55:24.687084ionos.janbro.de sshd[32016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226 user=root 2020-08-17T11:55:26.327672ionos.janbro.de sshd[32016]: Failed password for root from 36.189.253.226 port 36064 ssh2 2020-08-17T11:59:14.915742ionos.janbro.de sshd[32021]: Invalid user beast from 36.189.253.226 port 56518 2020-08-17T11:59:14.952693ionos.janbro.de sshd[32021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226 2020-08-17T11:59:14.915742ionos.janbro.de sshd[32021]: Invalid user beast from 36.189.253.226 port 56518 2020-08-17T11:59:17.170878ionos.janbro.de sshd[32021]: Failed password for invalid user beast from 36.189.253.226 ... |
2020-08-18 00:25:56 |
| 113.170.162.71 | attackspambots | Port Scan ... |
2020-08-17 23:51:58 |
| 178.128.247.181 | attack | Aug 17 17:15:07 ns382633 sshd\[29846\]: Invalid user marketing from 178.128.247.181 port 53664 Aug 17 17:15:07 ns382633 sshd\[29846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181 Aug 17 17:15:09 ns382633 sshd\[29846\]: Failed password for invalid user marketing from 178.128.247.181 port 53664 ssh2 Aug 17 17:21:54 ns382633 sshd\[31078\]: Invalid user twl from 178.128.247.181 port 41696 Aug 17 17:21:54 ns382633 sshd\[31078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181 |
2020-08-18 00:18:01 |