City: London
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '194.50.235.128 - 194.50.235.159'
% Abuse contact for '194.50.235.128 - 194.50.235.159' is 'abuse@infrawat.ch'
inetnum: 194.50.235.128 - 194.50.235.159
netname: INFRAWATCH
remarks: -----------------------------------------------------
remarks: Real time internet intelligence data
remarks: infrawat.ch
remarks: -----------------------------------------------------
country: GB
geoloc: 51.494840911758295 -0.018682268947961784
org: ORG-IL948-RIPE
admin-c: LD7399-RIPE
tech-c: LD7399-RIPE
status: ASSIGNED PA
created: 2026-04-26T03:20:17Z
last-modified: 2026-04-26T03:20:17Z
source: RIPE
mnt-by: HYDRA-MNT
organisation: ORG-IL948-RIPE
org-name: Infrawatch Limited
org-type: OTHER
address: 128 City Road
address: London
address: EC1V 2NX
country: GB
abuse-c: ACRO64026-RIPE
mnt-ref: HYDRA-MNT
created: 2026-03-26T04:32:13Z
last-modified: 2026-04-27T01:46:41Z
source: RIPE # Filtered
mnt-by: HYDRA-MNT
person: Lloyd Davies
address: 128 City Road
address: London
address: EC1V 2NX
address: United Kingdom
phone: +448000803330
nic-hdl: LD7399-RIPE
created: 2026-03-26T04:34:31Z
last-modified: 2026-04-27T01:47:59Z
source: RIPE # Filtered
mnt-by: HYDRA-MNT
% Information related to '194.50.234.0/23AS25369'
route: 194.50.234.0/23
origin: AS25369
mnt-by: HYDRA-MNT
created: 2022-09-23T15:39:09Z
last-modified: 2022-09-23T15:39:09Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122.1 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.50.235.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.50.235.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 17:31:05 CST 2026
;; MSG SIZE rcvd: 107
150.235.50.194.in-addr.arpa domain name pointer 194-50-235-150.infrawat.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.235.50.194.in-addr.arpa name = 194-50-235-150.infrawat.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.45.26.117 | attack | Oct 6 09:36:44 vpn01 sshd[22897]: Failed password for root from 119.45.26.117 port 39268 ssh2 ... |
2020-10-06 18:19:19 |
| 198.45.212.244 | attack | ssh 22 |
2020-10-06 18:50:50 |
| 105.29.155.182 | normal | Need to get some school work done of grade 1.2 |
2020-10-06 18:14:23 |
| 140.143.19.237 | attackspambots | Oct 6 11:33:59 router sshd[20439]: Failed password for root from 140.143.19.237 port 52966 ssh2 Oct 6 11:37:41 router sshd[20460]: Failed password for root from 140.143.19.237 port 35880 ssh2 ... |
2020-10-06 18:35:29 |
| 180.76.161.203 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-05T21:20:24Z and 2020-10-05T21:28:43Z |
2020-10-06 18:17:57 |
| 122.51.192.105 | attack | (sshd) Failed SSH login from 122.51.192.105 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 6 06:24:42 optimus sshd[20014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105 user=root Oct 6 06:24:43 optimus sshd[20014]: Failed password for root from 122.51.192.105 port 53810 ssh2 Oct 6 06:28:08 optimus sshd[20939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105 user=root Oct 6 06:28:11 optimus sshd[20939]: Failed password for root from 122.51.192.105 port 48728 ssh2 Oct 6 06:31:40 optimus sshd[22042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105 user=root |
2020-10-06 18:46:03 |
| 37.34.183.228 | attackbots | 445/tcp 445/tcp [2020-10-05]2pkt |
2020-10-06 18:42:10 |
| 23.94.204.232 | attack | 23.94.204.232 (US/United States/yithay.org), 12 distributed sshd attacks on account [root] in the last 3600 secs |
2020-10-06 18:50:11 |
| 82.64.46.144 | attackbotsspam | 5x Failed Password |
2020-10-06 18:21:18 |
| 103.82.15.160 | attackspambots | Icarus honeypot on github |
2020-10-06 18:52:10 |
| 94.179.140.150 | attack | 23/tcp [2020-10-05]1pkt |
2020-10-06 18:24:56 |
| 42.235.90.55 | attackspambots | 23/tcp [2020-10-05]1pkt |
2020-10-06 18:42:56 |
| 85.204.200.50 | attackbots | 445/tcp [2020-10-05]1pkt |
2020-10-06 18:20:55 |
| 119.96.86.193 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-10-06 18:28:53 |
| 85.235.53.153 | attackbots | Port scan on 1 port(s): 445 |
2020-10-06 18:33:30 |