City: unknown
Region: unknown
Country: Iran
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '109.162.128.0 - 109.162.255.255'
% Abuse contact for '109.162.128.0 - 109.162.255.255' is 'ripe@datak.ir'
inetnum: 109.162.128.0 - 109.162.255.255
netname: IR-DATAK-20100325
country: IR
org: ORG-DIEI1-RIPE
admin-c: EB8923-RIPE
tech-c: EB8923-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: TA59784-MNT
mnt-lower: TA59784-MNT
mnt-routes: TA59784-MNT
created: 2010-03-25T07:35:19Z
last-modified: 2022-07-03T10:22:22Z
source: RIPE # Filtered
organisation: ORG-DIEI1-RIPE
org-name: Datak Company LLC
country: IR
org-type: LIR
address: No. 14, Ibn Yamin St., North Sohrevardi St., Tehran, Iran
address: 1556835311
address: Tehran
address: IRAN, ISLAMIC REPUBLIC OF
phone: +982181681000
fax-no: +982188512650
admin-c: RT6724-RIPE
abuse-c: RA8422-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: TA59784-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: TA59784-MNT
created: 2004-04-17T11:28:05Z
last-modified: 2026-02-09T07:11:50Z
source: RIPE # Filtered
person: RighTel Co
address: 9th floor, Chooka Building, No 8 , west Armaghan Street, Vali-e-Asr Street (After Niayesh Highway), Tehran, Iran
org: ORG-ETSN1-RIPE
phone: + 982127654530
nic-hdl: EB8923-RIPE
mnt-by: TA59784-MNT
created: 2013-01-31T09:24:40Z
last-modified: 2019-01-13T08:30:41Z
source: RIPE # Filtered
% Information related to '109.162.251.0/24AS39650'
route: 109.162.251.0/24
origin: AS39650
mnt-by: MNT-RasouliTaher
mnt-by: MNT-DATAK
mnt-by: TA59784-MNT
created: 2023-05-02T09:18:58Z
last-modified: 2023-05-02T09:18:58Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.162.251.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.162.251.229. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 01:05:32 CST 2026
;; MSG SIZE rcvd: 108
Host 229.251.162.109.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 229.251.162.109.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.140 | attackbotsspam | Oct 16 20:27:28 pkdns2 sshd\[41847\]: Failed password for root from 222.186.175.140 port 55312 ssh2Oct 16 20:27:41 pkdns2 sshd\[41847\]: Failed password for root from 222.186.175.140 port 55312 ssh2Oct 16 20:27:44 pkdns2 sshd\[41847\]: Failed password for root from 222.186.175.140 port 55312 ssh2Oct 16 20:27:56 pkdns2 sshd\[41851\]: Failed password for root from 222.186.175.140 port 64468 ssh2Oct 16 20:28:00 pkdns2 sshd\[41851\]: Failed password for root from 222.186.175.140 port 64468 ssh2Oct 16 20:28:04 pkdns2 sshd\[41851\]: Failed password for root from 222.186.175.140 port 64468 ssh2 ... |
2019-10-17 01:31:05 |
| 189.232.100.142 | attack | Automatic report - Banned IP Access |
2019-10-17 01:28:29 |
| 150.95.199.179 | attackbotsspam | SSH bruteforce |
2019-10-17 01:40:06 |
| 45.55.67.128 | attack | SSH Brute Force, server-1 sshd[1999]: Failed password for invalid user toilatoi from 45.55.67.128 port 51109 ssh2 |
2019-10-17 01:45:12 |
| 198.108.67.102 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-17 01:56:29 |
| 211.220.27.191 | attackbotsspam | SSH Brute Force, server-1 sshd[31528]: Failed password for invalid user oms from 211.220.27.191 port 40168 ssh2 |
2019-10-17 01:37:17 |
| 123.214.186.186 | attackspambots | FTP Brute-Force reported by Fail2Ban |
2019-10-17 01:34:55 |
| 45.40.203.242 | attackspam | Invalid user at from 45.40.203.242 port 36354 |
2019-10-17 01:49:31 |
| 201.48.65.147 | attackspam | Oct 16 13:38:15 vps01 sshd[29251]: Failed password for root from 201.48.65.147 port 33012 ssh2 |
2019-10-17 01:47:40 |
| 23.129.64.162 | attackbots | Automatic report - Banned IP Access |
2019-10-17 01:49:57 |
| 198.108.67.101 | attackspambots | firewall-block, port(s): 8808/tcp |
2019-10-17 01:53:27 |
| 196.52.43.65 | attack | port scan and connect, tcp 443 (https) |
2019-10-17 01:29:41 |
| 144.217.60.211 | attackspambots | 10 probes eg: /wp-x1rp.php |
2019-10-17 01:18:12 |
| 200.54.170.198 | attack | SSH Brute Force, server-1 sshd[2041]: Failed password for root from 200.54.170.198 port 58618 ssh2 |
2019-10-17 01:38:06 |
| 197.50.14.206 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-17 01:48:11 |