Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Velikiy Novgorod

Region: Novgorod

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.147.90.0 - 194.147.90.255'

% Abuse contact for '194.147.90.0 - 194.147.90.255' is 'support@castles.pro'

inetnum:        194.147.90.0 - 194.147.90.255
netname:        RS-CASTLES
country:        RU
org:            ORG-CL628-RIPE
admin-c:        CA10110-RIPE
tech-c:         CA10110-RIPE
status:         ASSIGNED PA
mnt-by:         IP-RIPE
created:        2020-11-19T14:04:20Z
last-modified:  2026-03-06T19:46:36Z
source:         RIPE

organisation:   ORG-CL628-RIPE
org-name:       Castles LLC
country:        RU
address:        pr-kt Aleksandra Korsunova, d. 14A, pom. 38N
address:        173016 Velikiy Novgorod
address:        Russia
abuse-c:        CA10110-RIPE
mnt-ref:        IP-RIPE
mnt-by:         IP-RIPE
org-type:       OTHER
created:        2021-04-16T08:46:43Z
last-modified:  2025-09-18T12:11:12Z
source:         RIPE # Filtered

role:           Castles.pro
nic-hdl:        CA10110-RIPE
address:        pr-kt Aleksandra Korsunova, d. 14A, pom. 38N
address:        173016 Velikiy Novgorod
address:        Russia
abuse-mailbox:  support@castles.pro
mnt-by:         IP-RIPE
created:        2021-04-16T08:46:44Z
last-modified:  2025-09-18T12:11:16Z
source:         RIPE # Filtered

% Information related to '194.147.90.0/24AS214833'

route:          194.147.90.0/24
origin:         AS214833
mnt-by:         IP-RIPE
created:        2026-03-04T14:53:54Z
last-modified:  2026-03-04T14:53:54Z
source:         RIPE

% Information related to '194.147.90.0/24AS43278'

route:          194.147.90.0/24
origin:         AS43278
mnt-by:         IP-RIPE
created:        2020-11-19T14:04:24Z
last-modified:  2020-11-19T14:04:24Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.147.90.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.147.90.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 11:20:22 CST 2026
;; MSG SIZE  rcvd: 106
Host info
23.90.147.194.in-addr.arpa domain name pointer partner-protected-23.90.147.194.hostingrust.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
23.90.147.194.in-addr.arpa	name = partner-protected-23.90.147.194.hostingrust.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.14 attackbotsspam
08/01/2020-06:46:28.773492 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-08-01 19:32:29
112.133.232.85 attackbotsspam
07/31/2020-23:47:20.016713 112.133.232.85 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-01 19:23:50
164.155.93.4 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-01 19:38:36
91.121.86.22 attackbots
SSH brutforce
2020-08-01 19:22:07
222.35.80.63 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-01 19:24:09
132.232.68.138 attackspam
$f2bV_matches
2020-08-01 19:12:00
183.166.136.139 attackspambots
Aug  1 08:21:07 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:21:19 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:21:35 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:21:54 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:22:14 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
...
2020-08-01 19:22:28
85.52.217.114 attack
Brute forcing email accounts
2020-08-01 19:17:38
45.117.42.125 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-08-01 19:28:49
206.189.181.12 attackbots
Aug  1 12:59:49 [host] kernel: [1946758.550258] [U
Aug  1 13:02:13 [host] kernel: [1946902.607763] [U
Aug  1 13:04:13 [host] kernel: [1947022.712331] [U
Aug  1 13:05:47 [host] kernel: [1947116.631307] [U
Aug  1 13:18:08 [host] kernel: [1947857.591404] [U
Aug  1 13:21:15 [host] kernel: [1948044.420835] [U
2020-08-01 19:37:16
94.189.143.132 attack
Jul 27 20:35:05 foo sshd[29652]: Invalid user zhangyang from 94.189.143.132
Jul 27 20:35:05 foo sshd[29652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-94-189-143-132.dynamic.sbb.rs 
Jul 27 20:35:07 foo sshd[29652]: Failed password for invalid user zhangyang from 94.189.143.132 port 50766 ssh2
Jul 27 20:35:08 foo sshd[29652]: Received disconnect from 94.189.143.132: 11: Bye Bye [preauth]
Jul 27 20:42:00 foo sshd[29756]: Invalid user hechen from 94.189.143.132
Jul 27 20:42:00 foo sshd[29756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-94-189-143-132.dynamic.sbb.rs 
Jul 27 20:42:02 foo sshd[29756]: Failed password for invalid user hechen from 94.189.143.132 port 57778 ssh2
Jul 27 20:42:02 foo sshd[29756]: Received disconnect from 94.189.143.132: 11: Bye Bye [preauth]
Jul 27 20:44:33 foo sshd[29820]: Invalid user server from 94.189.143.132
Jul 27 20:44:33 foo sshd[29820]: ........
-------------------------------
2020-08-01 19:09:46
139.155.38.67 attack
Brute-force attempt banned
2020-08-01 19:25:36
42.81.142.176 attackbotsspam
2020-08-01T13:14:55.001820ks3355764 sshd[19649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.81.142.176  user=root
2020-08-01T13:14:56.937556ks3355764 sshd[19649]: Failed password for root from 42.81.142.176 port 57692 ssh2
...
2020-08-01 19:40:58
104.223.197.240 attackbotsspam
Invalid user zhangshengwei from 104.223.197.240 port 42238
2020-08-01 19:23:17
106.13.41.25 attack
Failed password for root from 106.13.41.25 port 52524 ssh2
2020-08-01 19:12:20

Recently Reported IPs

119.130.0.127 194.147.90.21 178.57.118.48 43.247.4.40
2606:4700:10::ac43:2808 219.140.5.111 113.213.4.84 36.101.150.151
2606:4700:10::6816:1406 121.237.149.167 2606:4700:10::6814:8384 2606:4700:10::6814:4750
2606:4700:10::6814:7363 2606:4700:10::6816:2511 103.82.228.55 240e:454:412c:1355:2c44:c2ff:fe1d:4e6f
66.132.195.92 178.128.114.205 45.207.221.17 111.33.154.219