City: Velikiy Novgorod
Region: Novgorod
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '194.147.90.0 - 194.147.90.255'
% Abuse contact for '194.147.90.0 - 194.147.90.255' is 'support@castles.pro'
inetnum: 194.147.90.0 - 194.147.90.255
netname: RS-CASTLES
country: RU
org: ORG-CL628-RIPE
admin-c: CA10110-RIPE
tech-c: CA10110-RIPE
status: ASSIGNED PA
mnt-by: IP-RIPE
created: 2020-11-19T14:04:20Z
last-modified: 2026-03-06T19:46:36Z
source: RIPE
organisation: ORG-CL628-RIPE
org-name: Castles LLC
country: RU
address: pr-kt Aleksandra Korsunova, d. 14A, pom. 38N
address: 173016 Velikiy Novgorod
address: Russia
abuse-c: CA10110-RIPE
mnt-ref: IP-RIPE
mnt-by: IP-RIPE
org-type: OTHER
created: 2021-04-16T08:46:43Z
last-modified: 2025-09-18T12:11:12Z
source: RIPE # Filtered
role: Castles.pro
nic-hdl: CA10110-RIPE
address: pr-kt Aleksandra Korsunova, d. 14A, pom. 38N
address: 173016 Velikiy Novgorod
address: Russia
abuse-mailbox: support@castles.pro
mnt-by: IP-RIPE
created: 2021-04-16T08:46:44Z
last-modified: 2025-09-18T12:11:16Z
source: RIPE # Filtered
% Information related to '194.147.90.0/24AS214833'
route: 194.147.90.0/24
origin: AS214833
mnt-by: IP-RIPE
created: 2026-03-04T14:53:54Z
last-modified: 2026-03-04T14:53:54Z
source: RIPE
% Information related to '194.147.90.0/24AS43278'
route: 194.147.90.0/24
origin: AS43278
mnt-by: IP-RIPE
created: 2020-11-19T14:04:24Z
last-modified: 2020-11-19T14:04:24Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.147.90.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.147.90.23. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 11:20:22 CST 2026
;; MSG SIZE rcvd: 106
23.90.147.194.in-addr.arpa domain name pointer partner-protected-23.90.147.194.hostingrust.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
23.90.147.194.in-addr.arpa name = partner-protected-23.90.147.194.hostingrust.ru.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.175.93.14 | attackbotsspam | 08/01/2020-06:46:28.773492 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-08-01 19:32:29 |
| 112.133.232.85 | attackbotsspam | 07/31/2020-23:47:20.016713 112.133.232.85 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-08-01 19:23:50 |
| 164.155.93.4 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-08-01 19:38:36 |
| 91.121.86.22 | attackbots | SSH brutforce |
2020-08-01 19:22:07 |
| 222.35.80.63 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-08-01 19:24:09 |
| 132.232.68.138 | attackspam | $f2bV_matches |
2020-08-01 19:12:00 |
| 183.166.136.139 | attackspambots | Aug 1 08:21:07 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 08:21:19 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 08:21:35 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 08:21:54 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 08:22:14 srv01 postfix/smtpd\[1447\]: warning: unknown\[183.166.136.139\]: SASL LOGIN authentication failed: Invalid base64 data in continued response ... |
2020-08-01 19:22:28 |
| 85.52.217.114 | attack | Brute forcing email accounts |
2020-08-01 19:17:38 |
| 45.117.42.125 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-08-01 19:28:49 |
| 206.189.181.12 | attackbots | Aug 1 12:59:49 [host] kernel: [1946758.550258] [U Aug 1 13:02:13 [host] kernel: [1946902.607763] [U Aug 1 13:04:13 [host] kernel: [1947022.712331] [U Aug 1 13:05:47 [host] kernel: [1947116.631307] [U Aug 1 13:18:08 [host] kernel: [1947857.591404] [U Aug 1 13:21:15 [host] kernel: [1948044.420835] [U |
2020-08-01 19:37:16 |
| 94.189.143.132 | attack | Jul 27 20:35:05 foo sshd[29652]: Invalid user zhangyang from 94.189.143.132 Jul 27 20:35:05 foo sshd[29652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-94-189-143-132.dynamic.sbb.rs Jul 27 20:35:07 foo sshd[29652]: Failed password for invalid user zhangyang from 94.189.143.132 port 50766 ssh2 Jul 27 20:35:08 foo sshd[29652]: Received disconnect from 94.189.143.132: 11: Bye Bye [preauth] Jul 27 20:42:00 foo sshd[29756]: Invalid user hechen from 94.189.143.132 Jul 27 20:42:00 foo sshd[29756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-94-189-143-132.dynamic.sbb.rs Jul 27 20:42:02 foo sshd[29756]: Failed password for invalid user hechen from 94.189.143.132 port 57778 ssh2 Jul 27 20:42:02 foo sshd[29756]: Received disconnect from 94.189.143.132: 11: Bye Bye [preauth] Jul 27 20:44:33 foo sshd[29820]: Invalid user server from 94.189.143.132 Jul 27 20:44:33 foo sshd[29820]: ........ ------------------------------- |
2020-08-01 19:09:46 |
| 139.155.38.67 | attack | Brute-force attempt banned |
2020-08-01 19:25:36 |
| 42.81.142.176 | attackbotsspam | 2020-08-01T13:14:55.001820ks3355764 sshd[19649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.81.142.176 user=root 2020-08-01T13:14:56.937556ks3355764 sshd[19649]: Failed password for root from 42.81.142.176 port 57692 ssh2 ... |
2020-08-01 19:40:58 |
| 104.223.197.240 | attackbotsspam | Invalid user zhangshengwei from 104.223.197.240 port 42238 |
2020-08-01 19:23:17 |
| 106.13.41.25 | attack | Failed password for root from 106.13.41.25 port 52524 ssh2 |
2020-08-01 19:12:20 |