City: Tranbjerg
Region: Region Midtjylland
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '193.242.107.0 - 193.242.107.255'
% Abuse contact for '193.242.107.0 - 193.242.107.255' is 'postmaster@abuse.mail.dk'
inetnum: 193.242.107.0 - 193.242.107.255
netname: MIT-DK
country: DK
org: ORG-MI14-RIPE
admin-c: AS5071-RIPE
tech-c: AS5071-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: TDK-MNT
mnt-routes: TDK-MNT
mnt-routes: nia-mnt
mnt-domains: TDK-MNT
created: 2010-09-16T06:57:20Z
last-modified: 2016-04-14T08:23:56Z
source: RIPE
sponsoring-org: ORG-TD1-RIPE
organisation: ORG-MI14-RIPE
org-name: Mariendal El-Teknik A/S
country: DK
org-type: other
remarks: Lars Dreier
address: Gl. Gugvej 51 DK-9000 Aalborg
phone: +45 96317792
abuse-c: AR30166-RIPE
mnt-ref: TDK-MNT
mnt-by: TDK-MNT
created: 2007-06-26T11:30:24Z
last-modified: 2022-12-01T16:37:12Z
source: RIPE # Filtered
role: AS3292 Staff
address: TDC A/S
address: Sletvej 30, 8-062
address: DK-8310 Tranbjerg
address: Denmark
remarks: contact info: http://as3292.peeringdb.com
admin-c: NCB1-RIPE
admin-c: MBP137-RIPE
tech-c: NCB1-RIPE
tech-c: CP11490-RIPE
tech-c: MBP137-RIPE
nic-hdl: AS5071-RIPE
mnt-by: AS3292-MNT
created: 2002-07-02T13:36:00Z
last-modified: 2024-05-21T09:07:14Z
source: RIPE # Filtered
% Information related to '193.242.107.0/24AS31027'
route: 193.242.107.0/24
descr: Mariendal-Elteknik
origin: AS31027
mnt-by: nia-mnt
created: 2010-05-05T07:22:48Z
last-modified: 2010-05-05T07:22:48Z
source: RIPE
% Information related to '193.242.107.0/24AS3292'
route: 193.242.107.0/24
descr: MARIENDAL-EL-TEKNIK
origin: AS3292
remarks: +---------------------------------------+
remarks: | For abuse and security issues contact |
remarks: | csirt@csirt.dk, http://www.csirt.dk |
remarks: +---------------------------------------+
mnt-by: TDK-MNT
mnt-by: nia-mnt
created: 2007-07-30T07:46:21Z
last-modified: 2010-03-27T10:20:32Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.242.107.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.242.107.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:57:53 CST 2026
;; MSG SIZE rcvd: 107
Host 70.107.242.193.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 70.107.242.193.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.106.30.99 | attack | /wp-includes/pomo/so.php?x=1 |
2019-08-09 14:59:37 |
| 1.192.218.179 | attackspam | firewall-block, port(s): 445/tcp |
2019-08-09 14:58:44 |
| 107.172.80.131 | attackspam | firewall-block, port(s): 445/tcp |
2019-08-09 14:50:26 |
| 62.4.27.96 | attackspam | port 23 attempt blocked |
2019-08-09 14:55:52 |
| 78.245.118.141 | attackspambots | Aug 9 03:58:02 icinga sshd[24722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.245.118.141 Aug 9 03:58:04 icinga sshd[24722]: Failed password for invalid user prueba01 from 78.245.118.141 port 55544 ssh2 ... |
2019-08-09 14:40:22 |
| 156.197.45.232 | attack | 23/tcp [2019-08-09]1pkt |
2019-08-09 15:19:46 |
| 89.46.107.174 | attackspam | xmlrpc attack |
2019-08-09 15:17:48 |
| 14.34.28.131 | attackbotsspam | Aug 9 02:32:05 vps647732 sshd[2654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.34.28.131 Aug 9 02:32:08 vps647732 sshd[2654]: Failed password for invalid user webster from 14.34.28.131 port 32918 ssh2 ... |
2019-08-09 14:57:44 |
| 40.112.220.119 | attack | leo_www |
2019-08-09 15:15:29 |
| 35.246.244.55 | attackspam | Triggered by Fail2Ban at Vostok web server |
2019-08-09 14:42:40 |
| 165.227.69.39 | attackspam | Aug 9 07:26:16 www sshd\[14466\]: Invalid user stephan from 165.227.69.39 port 44580 ... |
2019-08-09 14:43:06 |
| 37.187.54.45 | attackbotsspam | Aug 9 08:50:48 SilenceServices sshd[21257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45 Aug 9 08:50:50 SilenceServices sshd[21257]: Failed password for invalid user hadoop from 37.187.54.45 port 41158 ssh2 Aug 9 08:54:58 SilenceServices sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45 |
2019-08-09 15:07:25 |
| 189.4.1.12 | attackspam | Aug 7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934 Aug 7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 Aug 7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934 Aug 7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 Aug 7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934 Aug 7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 Aug 7 09:06:50 tuxlinux sshd[47712]: Failed password for invalid user yong from 189.4.1.12 port 54934 ssh2 ... |
2019-08-09 14:53:26 |
| 178.32.35.79 | attackbotsspam | Aug 9 02:06:50 lnxded63 sshd[316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.35.79 |
2019-08-09 14:42:22 |
| 41.185.65.29 | attackspam | xmlrpc attack |
2019-08-09 15:14:34 |