City: Singapore
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '193.8.186.0 - 193.8.186.255'
% Abuse contact for '193.8.186.0 - 193.8.186.255' is 'ban-me-please@zerolimit-servers.cool'
inetnum: 193.8.186.0 - 193.8.186.255
org: ORG-ZA297-RIPE
netname: CojuhariSolutions
abuse-c: ACRO62718-RIPE
country: GB
admin-c: AR62526-RIPE
tech-c: AR62526-RIPE
status: SUB-ALLOCATED PA
created: 2026-05-04T06:47:09Z
last-modified: 2026-05-04T06:47:09Z
source: RIPE
mnt-by: MNT-NETERRA
organisation: ORG-ZA297-RIPE
org-name: Vlad Cojuhari
org-type: OTHER
address: Constantin Brancusi St 3
country: MD
reg-nr: Not Applicable
phone: +373
language: EN
remarks: CERTs, LEAs and Gov Agents - please use email: legal (dog) zerolimit-servers.cool
remarks: For non-automatic abuses - please use email: abuse-request (dog) zerolimit-servers.cool
remarks: We have very strict NO SPAM tolerance policy and carefully review any abuse, exclude spammers emails
remarks: Spammers: ban-me-please@zerolimit-servers.cool <-- send email here if you want permanent banning on our mail server
remarks: Because some senders sending abuse requests on not appropriate email - their emails will accepted, but be ignored
abuse-c: ACRO62718-RIPE
mnt-ref: zerolimit-mnt
mnt-ref: MNT-NETERRA
mnt-ref: LocalNCC-mnt
mnt-by: zerolimit-mnt
created: 2025-12-07T13:09:31Z
last-modified: 2026-05-13T06:09:19Z
source: RIPE # Filtered
role: Abuse-C Role
address: Ukraine, Dnipro, st. Odynkivska, build. 25
phone: +380635062303
nic-hdl: AR62526-RIPE
abuse-mailbox: abusepwnx@gmail.com
mnt-by: MEREZHA-MNT
mnt-by: FDN3-MNT
created: 2021-02-23T22:11:15Z
last-modified: 2023-08-20T19:07:58Z
source: RIPE # Filtered
% Information related to '193.8.186.0/24AS201002'
route: 193.8.186.0/24
origin: AS201002
created: 2026-05-04T06:48:11Z
last-modified: 2026-05-04T06:48:11Z
source: RIPE
mnt-by: MNT-NETERRA
% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.8.186.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.8.186.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 00:00:23 CST 2026
;; MSG SIZE rcvd: 105
Host 29.186.8.193.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.186.8.193.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 132.232.48.121 | attackspambots | Unauthorized connection attempt detected from IP address 132.232.48.121 to port 2220 [J] |
2020-01-07 17:53:49 |
| 219.77.119.35 | attackspam | Unauthorized connection attempt detected from IP address 219.77.119.35 to port 5555 [J] |
2020-01-07 17:45:16 |
| 62.219.144.48 | attackspambots | Unauthorized connection attempt detected from IP address 62.219.144.48 to port 23 [J] |
2020-01-07 17:40:26 |
| 59.126.221.140 | attack | Unauthorized connection attempt detected from IP address 59.126.221.140 to port 4567 [J] |
2020-01-07 17:41:28 |
| 186.73.101.186 | attack | Unauthorized connection attempt detected from IP address 186.73.101.186 to port 8080 [J] |
2020-01-07 17:49:24 |
| 221.130.82.56 | attackspambots | Unauthorized connection attempt detected from IP address 221.130.82.56 to port 23 [J] |
2020-01-07 17:45:02 |
| 177.192.143.248 | attackbotsspam | Unauthorized connection attempt detected from IP address 177.192.143.248 to port 82 [J] |
2020-01-07 17:51:41 |
| 96.114.71.146 | attackbotsspam | Unauthorized connection attempt detected from IP address 96.114.71.146 to port 2220 [J] |
2020-01-07 18:03:04 |
| 112.135.95.235 | attack | Unauthorized connection attempt detected from IP address 112.135.95.235 to port 8080 [J] |
2020-01-07 17:59:03 |
| 51.68.174.177 | attackbotsspam | Unauthorized connection attempt detected from IP address 51.68.174.177 to port 2220 [J] |
2020-01-07 18:10:33 |
| 120.77.223.23 | attackbots | Unauthorized connection attempt detected from IP address 120.77.223.23 to port 7002 [J] |
2020-01-07 17:55:04 |
| 179.154.73.89 | attackbotsspam | Unauthorized connection attempt detected from IP address 179.154.73.89 to port 23 [J] |
2020-01-07 17:49:57 |
| 200.194.22.234 | attackbots | Unauthorized connection attempt detected from IP address 200.194.22.234 to port 23 [J] |
2020-01-07 17:47:36 |
| 42.114.102.231 | attackspambots | Unauthorized connection attempt detected from IP address 42.114.102.231 to port 23 [J] |
2020-01-07 18:12:40 |
| 176.12.64.118 | attack | Unauthorized connection attempt detected from IP address 176.12.64.118 to port 23 [J] |
2020-01-07 17:51:55 |