City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '192.71.171.0 - 192.71.171.255'
% Abuse contact for '192.71.171.0 - 192.71.171.255' is 'abuse@zyner.org'
inetnum: 192.71.171.0 - 192.71.171.255
netname: NET-ZYNER-192-71-171-0
descr: Zyner
org: ORG-ZA281-RIPE
country: SE
geofeed: https://zyner.org/geofeed.csv
admin-c: ZN660-RIPE
admin-c: AOH19-RIPE
admin-c: HEAN2-RIPE
tech-c: ZN660-RIPE
tech-c: AOH19-RIPE
tech-c: HEAN2-RIPE
status: LEGACY
mnt-by: RESILANS-MNT
mnt-routes: RESILANS-MNT
mnt-routes: ZYNER-MNT
created: 2026-03-20T11:37:04Z
last-modified: 2026-03-20T15:53:23Z
source: RIPE # Filtered
organisation: ORG-ZA281-RIPE
org-name: Zyner
country: SE
org-type: OTHER
address: Havsfrugatan 7
address: 72358 Vsters, Sweden
phone: +46 10 808 63 53
mnt-ref: ZYNER-MNT
mnt-ref: ESAB-MNT
mnt-ref: RESILANS-MNT
mnt-by: ZYNER-MNT
admin-c: ZN660-RIPE
abuse-c: ZN660-RIPE
created: 2024-12-01T18:13:48Z
last-modified: 2026-03-20T11:31:44Z
source: RIPE # Filtered
role: Zyner NOC
address: Havsfrugatan 7
address: 72358 Vsters, Sweden
abuse-mailbox: abuse@zyner.org
nic-hdl: ZN660-RIPE
mnt-by: ZYNER-MNT
created: 2024-12-01T20:25:33Z
last-modified: 2026-01-15T18:27:08Z
source: RIPE # Filtered
person: Axel Olausson Holtenas
address: Havsfrugatan 7
address: SE-723 58 Vasteras
address: Sweden
phone: +46 760476822
nic-hdl: AOH19-RIPE
mnt-by: RESILANS-MNT
created: 2026-03-20T11:37:04Z
last-modified: 2026-03-20T11:37:04Z
source: RIPE # Filtered
person: Herman Andgart
address: Femmotesvagen 48
address: SE-247 33 Sodra Sandby
address: Sweden
phone: +46 760241396
nic-hdl: HEAN2-RIPE
mnt-by: RESILANS-MNT
created: 2026-03-20T11:37:04Z
last-modified: 2026-03-20T11:37:04Z
source: RIPE # Filtered
% Information related to '192.71.171.0/24AS39351'
route: 192.71.171.0/24
descr: Zyner
origin: AS39351
mnt-by: RESILANS-MNT
created: 2026-03-20T12:00:12Z
last-modified: 2026-03-20T12:00:12Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.71.171.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.71.171.180. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:34:59 CST 2026
;; MSG SIZE rcvd: 107
Host 180.171.71.192.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 180.171.71.192.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.65.144.233 | attack | Jun 26 11:08:29 debian sshd\[20790\]: Invalid user user from 159.65.144.233 port 21948 Jun 26 11:08:29 debian sshd\[20790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.233 ... |
2019-06-26 18:19:33 |
| 37.186.46.9 | attackspam | LGS,WP GET /wp-login.php |
2019-06-26 18:40:12 |
| 140.255.214.2 | attackspambots | Scanning and Vuln Attempts |
2019-06-26 18:15:36 |
| 13.81.249.149 | attackbotsspam | 2019-06-25 02:42:45 dovecot_login authenticator failed for (OMIPnu) [13.81.249.149]:51693: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:43:09 dovecot_login authenticator failed for (md3WCki) [13.81.249.149]:64537: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:43:33 dovecot_login authenticator failed for (iK8uhE) [13.81.249.149]:55452: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:43:56 dovecot_login authenticator failed for (W5ryWRYL) [13.81.249.149]:59507: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:44:20 dovecot_login authenticator failed for (M4HdcDC5Is) [13.81.249.149]:55274: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:44:43 dovecot_login authenticator failed for (SMzyrxi3hZ) [13.81.249.149]:60178: 535 Incorrect authentication data (set_id=info) 2019-06-25 02:45:06 dovecot_login authenticator failed for (j4shPx1N) [13.81.249.149]:59699: 535 Incorrect authentication data (set_id=info)........ ------------------------------ |
2019-06-26 18:58:58 |
| 181.48.116.50 | attackbots | Jun 26 09:46:31 XXXXXX sshd[41364]: Invalid user juraserver from 181.48.116.50 port 46380 |
2019-06-26 18:32:45 |
| 190.119.190.122 | attackbots | Triggered by Fail2Ban at Vostok web server |
2019-06-26 18:15:19 |
| 138.197.146.200 | attack | fail2ban honeypot |
2019-06-26 18:40:59 |
| 140.255.212.109 | attackbots | Scanning and Vuln Attempts |
2019-06-26 18:21:17 |
| 122.116.33.104 | attackbotsspam | Telnetd brute force attack detected by fail2ban |
2019-06-26 18:36:18 |
| 185.228.235.3 | attack | 1561520698 - 06/26/2019 05:44:58 Host: 185.228.235.3/185.228.235.3 Port: 5683 UDP Blocked |
2019-06-26 18:57:02 |
| 138.197.73.65 | attack | WordPress login Brute force / Web App Attack on client site. |
2019-06-26 18:35:22 |
| 223.71.139.97 | attackspam | Jun 26 04:53:47 db sshd\[32286\]: Invalid user GardenUser from 223.71.139.97 Jun 26 04:53:47 db sshd\[32286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 Jun 26 04:53:49 db sshd\[32286\]: Failed password for invalid user GardenUser from 223.71.139.97 port 37438 ssh2 Jun 26 05:00:23 db sshd\[32359\]: Invalid user rao from 223.71.139.97 Jun 26 05:00:23 db sshd\[32359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 ... |
2019-06-26 18:50:47 |
| 198.245.50.81 | attackbots | Jun 25 23:05:03 cac1d2 sshd\[20728\]: Invalid user bie from 198.245.50.81 port 48152 Jun 25 23:05:03 cac1d2 sshd\[20728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 Jun 25 23:05:05 cac1d2 sshd\[20728\]: Failed password for invalid user bie from 198.245.50.81 port 48152 ssh2 ... |
2019-06-26 18:31:08 |
| 182.100.69.116 | attack | 2019-06-26T05:44:52.316355mail01 postfix/smtpd[25629]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-26T05:45:01.396055mail01 postfix/smtpd[9523]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-26T05:45:28.253476mail01 postfix/smtpd[31007]: warning: unknown[182.100.69.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-26 18:37:45 |
| 171.227.106.220 | attackbotsspam | Unauthorized connection attempt from IP address 171.227.106.220 on Port 445(SMB) |
2019-06-26 18:33:21 |