City: unknown
Region: unknown
Country: Slovakia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '185.66.200.193 - 185.66.200.193'
% Abuse contact for '185.66.200.193 - 185.66.200.193' is '185.66.200.193@abuse.skhosting.eu'
inetnum: 185.66.200.193 - 185.66.200.193
org: ORG-SA2036-RIPE
netname: SK-SKHOSTING
descr: https://www.skhosting.eu
country: SK
admin-c: SKHO1-RIPE
tech-c: SKHO1-RIPE
status: ASSIGNED PA
mnt-by: SKHOSTING-MNT
mnt-routes: SKHOSTING-MNT
created: 2015-11-18T12:51:04Z
last-modified: 2015-11-18T16:28:44Z
source: RIPE
organisation: ORG-SA2036-RIPE
org-name: skHosting.eu-185.66.200.193
abuse-c: SA34067-RIPE
org-type: OTHER
address: Zavadska 10075/16A
address: Bratislava
address: 83106
address: Slovakia
mnt-by: SKHOSTING-MNT
mnt-ref: SKHOSTING-MNT
created: 2015-11-18T16:23:00Z
last-modified: 2019-09-07T22:33:18Z
source: RIPE # Filtered
role: skHosting.eu s.r.o.
remarks: www.skhosting.eu - server provider
address: Zavadska 10075/16A
address: 83106
address: Bratislava
address: Slovakia
abuse-mailbox: abuse@skhosting.eu
admin-c: LJ2008-RIPE
tech-c: LJ2008-RIPE
nic-hdl: SKHO1-RIPE
mnt-by: SKHOSTING-MNT
created: 2015-06-08T03:32:03Z
last-modified: 2020-07-03T22:26:50Z
source: RIPE # Filtered
% Information related to '185.66.200.0/23AS201702'
route: 185.66.200.0/23
origin: AS201702
mnt-by: SKHOSTING-MNT
created: 2020-06-01T03:40:20Z
last-modified: 2020-06-01T03:40:20Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.66.200.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.66.200.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 00:12:12 CST 2026
;; MSG SIZE rcvd: 107
193.200.66.185.in-addr.arpa domain name pointer 185.66.200.193.skhosting.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.200.66.185.in-addr.arpa name = 185.66.200.193.skhosting.eu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 68.183.238.151 | attackspam | Jan 19 10:26:05 work-partkepr sshd\[30047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.151 user=root Jan 19 10:26:07 work-partkepr sshd\[30047\]: Failed password for root from 68.183.238.151 port 55180 ssh2 ... |
2020-01-19 20:36:29 |
| 189.242.14.120 | attackbotsspam | Unauthorized connection attempt detected from IP address 189.242.14.120 to port 23 [J] |
2020-01-19 20:46:03 |
| 218.92.0.201 | attackspambots | Jan 19 14:03:25 silence02 sshd[27232]: Failed password for root from 218.92.0.201 port 17485 ssh2 Jan 19 14:04:52 silence02 sshd[27272]: Failed password for root from 218.92.0.201 port 64176 ssh2 |
2020-01-19 21:06:46 |
| 94.65.173.70 | attack | Unauthorized connection attempt detected from IP address 94.65.173.70 to port 4567 [J] |
2020-01-19 20:58:36 |
| 209.141.46.240 | attack | Jan 19 13:56:54 localhost sshd\[4044\]: Invalid user sarah from 209.141.46.240 Jan 19 13:56:54 localhost sshd\[4044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240 Jan 19 13:56:56 localhost sshd\[4044\]: Failed password for invalid user sarah from 209.141.46.240 port 33824 ssh2 Jan 19 13:59:05 localhost sshd\[4091\]: Invalid user ta from 209.141.46.240 Jan 19 13:59:05 localhost sshd\[4091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240 ... |
2020-01-19 21:09:06 |
| 185.197.35.201 | attackspam | Honeypot attack, port: 81, PTR: pptp-201-35-197-185.lk-t.ru. |
2020-01-19 20:48:24 |
| 170.253.45.203 | attackbotsspam | Unauthorized connection attempt detected from IP address 170.253.45.203 to port 81 [J] |
2020-01-19 20:50:51 |
| 1.52.201.111 | attackspam | 1579438750 - 01/19/2020 13:59:10 Host: 1.52.201.111/1.52.201.111 Port: 445 TCP Blocked |
2020-01-19 21:06:28 |
| 159.203.201.165 | attackbots | 01/19/2020-11:37:46.414075 159.203.201.165 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-19 20:52:11 |
| 109.87.47.97 | attackspambots | Unauthorized connection attempt detected from IP address 109.87.47.97 to port 8080 [J] |
2020-01-19 20:26:57 |
| 89.201.83.3 | attack | Unauthorized connection attempt detected from IP address 89.201.83.3 to port 5555 [J] |
2020-01-19 20:31:01 |
| 94.187.238.5 | attackbotsspam | Unauthorized connection attempt detected from IP address 94.187.238.5 to port 81 [J] |
2020-01-19 20:29:11 |
| 159.89.168.88 | attackbots | Automatic report - XMLRPC Attack |
2020-01-19 21:06:04 |
| 162.62.26.113 | attackbots | Unauthorized connection attempt detected from IP address 162.62.26.113 to port 6443 [J] |
2020-01-19 20:51:48 |
| 86.91.187.144 | attack | Unauthorized connection attempt detected from IP address 86.91.187.144 to port 2222 [J] |
2020-01-19 20:32:49 |