City: Kyiv
Region: Kyyiv
Country: Ukraine
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '188.190.224.0 - 188.190.255.255'
% Abuse contact for '188.190.224.0 - 188.190.255.255' is 'abuse@lan.ua'
inetnum: 188.190.224.0 - 188.190.255.255
netname: LANUA-NETWORK
descr: LocalNet
country: UA
org: ORG-LOCA1-RIPE
admin-c: VOLO2-RIPE
tech-c: VOLO2-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: ADMINLANUA-MNT
mnt-routes: ADMINLANUA-MNT
mnt-domains: ADMINLANUA-MNT
created: 2011-02-17T12:03:55Z
last-modified: 2016-04-14T10:59:21Z
source: RIPE # Filtered
sponsoring-org: ORG-Vs35-RIPE
organisation: ORG-LOCA1-RIPE
org-name: LocalNet Ltd.
country: UA
org-type: OTHER
address: Ukraine, 04213, Kiev, Prirechnaya ul. 25A
abuse-c: AR19344-RIPE
mnt-ref: ADMINLANUA-MNT
mnt-by: ADMINLANUA-MNT
created: 2011-09-10T13:12:54Z
last-modified: 2022-12-01T16:35:47Z
source: RIPE # Filtered
person: Denis Volobuev
address: 04214, Kiev, Ukraine, pryrichna st 25a of 3
phone: +380442212828
nic-hdl: VOLO2-RIPE
mnt-by: ADMINLANUA-MNT
created: 2011-02-14T10:52:08Z
last-modified: 2011-02-14T10:52:08Z
source: RIPE
% Information related to '188.190.224.0/19AS56433'
route: 188.190.224.0/19
descr: LANUA-NETWORK route object
origin: AS56433
mnt-by: ADMINLANUA-MNT
created: 2011-05-03T18:20:03Z
last-modified: 2011-05-03T18:20:03Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.120 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.190.225.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;188.190.225.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020200 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 02 19:31:04 CST 2026
;; MSG SIZE rcvd: 107
b'94.225.190.188.in-addr.arpa domain name pointer unallocated.sta.lan.ua.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.225.190.188.in-addr.arpa name = unallocated.sta.lan.ua.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 216.155.93.77 | attack | Jun 5 06:23:14 server sshd[4604]: Failed password for root from 216.155.93.77 port 35106 ssh2 Jun 5 06:27:37 server sshd[5085]: Failed password for root from 216.155.93.77 port 39800 ssh2 ... |
2020-06-05 12:39:46 |
| 222.186.175.202 | attackbotsspam | Jun 5 06:40:38 nas sshd[12541]: Failed password for root from 222.186.175.202 port 59710 ssh2 Jun 5 06:40:41 nas sshd[12541]: Failed password for root from 222.186.175.202 port 59710 ssh2 Jun 5 06:40:44 nas sshd[12541]: Failed password for root from 222.186.175.202 port 59710 ssh2 Jun 5 06:40:48 nas sshd[12541]: Failed password for root from 222.186.175.202 port 59710 ssh2 ... |
2020-06-05 12:44:34 |
| 114.119.164.50 | attackspam | Automatic report - Banned IP Access |
2020-06-05 12:40:33 |
| 185.176.27.42 | attackbotsspam | Jun 5 07:48:37 debian kernel: [235079.093785] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.176.27.42 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=34258 PROTO=TCP SPT=41797 DPT=9949 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-05 13:00:47 |
| 221.122.78.202 | attackbots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-06-05 12:56:17 |
| 190.130.147.8 | attackspam | 2020-06-05 12:44:58 | |
| 14.29.244.7 | attackbotsspam | Jun 5 09:28:09 gw1 sshd[2705]: Failed password for root from 14.29.244.7 port 36323 ssh2 ... |
2020-06-05 12:39:03 |
| 111.229.31.134 | attack | Jun 5 05:40:10 vps sshd[8133]: Failed password for root from 111.229.31.134 port 35088 ssh2 Jun 5 05:54:31 vps sshd[8857]: Failed password for root from 111.229.31.134 port 46312 ssh2 ... |
2020-06-05 12:34:48 |
| 183.15.179.147 | attackbotsspam | Jun 5 06:09:50 legacy sshd[17045]: Failed password for root from 183.15.179.147 port 60082 ssh2 Jun 5 06:13:42 legacy sshd[17153]: Failed password for root from 183.15.179.147 port 55226 ssh2 ... |
2020-06-05 12:32:47 |
| 201.235.168.104 | attack | 2020-06-05 12:41:25 | |
| 222.186.15.115 | attack | Jun 5 06:42:02 MainVPS sshd[23281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 5 06:42:04 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 port 41115 ssh2 Jun 5 06:42:07 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 port 41115 ssh2 Jun 5 06:42:02 MainVPS sshd[23281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 5 06:42:04 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 port 41115 ssh2 Jun 5 06:42:07 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 port 41115 ssh2 Jun 5 06:42:02 MainVPS sshd[23281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 5 06:42:04 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 port 41115 ssh2 Jun 5 06:42:07 MainVPS sshd[23281]: Failed password for root from 222.186.15.115 |
2020-06-05 12:48:29 |
| 171.235.79.29 | attack | Automatic report - Port Scan Attack |
2020-06-05 12:27:27 |
| 110.77.220.230 | attackspam | Unauthorised access (Jun 5) SRC=110.77.220.230 LEN=40 TTL=242 ID=15282 TCP DPT=1433 WINDOW=1024 SYN |
2020-06-05 12:33:20 |
| 196.52.43.121 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-06-05 12:43:47 |
| 203.150.242.25 | attackspambots | Jun 5 06:25:41 OPSO sshd\[15329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.150.242.25 user=root Jun 5 06:25:43 OPSO sshd\[15329\]: Failed password for root from 203.150.242.25 port 53652 ssh2 Jun 5 06:29:06 OPSO sshd\[15566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.150.242.25 user=root Jun 5 06:29:07 OPSO sshd\[15566\]: Failed password for root from 203.150.242.25 port 50394 ssh2 Jun 5 06:32:38 OPSO sshd\[16144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.150.242.25 user=root |
2020-06-05 12:35:57 |