City: unknown
Region: unknown
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '195.43.136.0 - 195.43.136.255'
% Abuse contact for '195.43.136.0 - 195.43.136.255' is 'abuse@sb.lt'
inetnum: 195.43.136.0 - 195.43.136.255
netname: LT-FINASTA
country: LT
org: ORG-SB633-RIPE
sponsoring-org: ORG-LT1-RIPE
admin-c: SBA65-RIPE
tech-c: SBA65-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: TELECOMLT-MNT
mnt-routes: AS8764-MNT
mnt-domains: TELECOMLT-MNT
created: 2008-06-09T14:10:41Z
last-modified: 2021-05-24T07:33:15Z
source: RIPE
organisation: ORG-SB633-RIPE
org-name: AB "Artea bankas"
country: LT
org-type: OTHER
address: AB "Artea" bankas"
address: Tilzes g. 149
address: LT-76348 Siauliai
address: LITHUANIA
phone: +370 610 44447
admin-c: IS7951-RIPE
abuse-c: SBA65-RIPE
mnt-by: BITE-NOC
mnt-ref: BITE-NOC
created: 2020-11-20T00:51:04Z
last-modified: 2026-01-28T09:47:08Z
source: RIPE # Filtered
role: Siauliu Bankas Administrator
address: Siauliu bankas
address: Tilzes g. 149
address: LT-76348 Siauliai
address: LITHUANIA
admin-c: IS7951-RIPE
tech-c: IS7951-RIPE
abuse-mailbox: abuse@sb.lt
nic-hdl: SBA65-RIPE
mnt-by: BITE-NOC
created: 2020-11-20T00:35:52Z
last-modified: 2021-03-16T07:39:12Z
source: RIPE # Filtered
% Information related to '195.43.136.0/24AS47512'
route: 195.43.136.0/24
descr: LT-FINASTA
origin: AS47512
mnt-by: TELECOMLT-MNT
created: 2008-06-30T13:44:03Z
last-modified: 2011-06-30T11:23:16Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.43.136.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.43.136.207. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 04:26:23 CST 2026
;; MSG SIZE rcvd: 107
Host 207.136.43.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 207.136.43.195.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.231.142.79 | attack | Jan 19 15:00:37 ns41 sshd[3835]: Failed password for root from 111.231.142.79 port 33052 ssh2 Jan 19 15:00:37 ns41 sshd[3835]: Failed password for root from 111.231.142.79 port 33052 ssh2 |
2020-01-19 22:07:42 |
| 40.126.120.73 | attackspambots | ssh intrusion attempt |
2020-01-19 22:06:05 |
| 14.225.3.47 | attack | Invalid user visitor from 14.225.3.47 port 47578 |
2020-01-19 21:46:05 |
| 147.139.5.31 | attackbots | Unauthorized connection attempt detected from IP address 147.139.5.31 to port 2220 [J] |
2020-01-19 21:51:40 |
| 79.124.62.34 | attackspambots | 01/19/2020-07:58:46.516517 79.124.62.34 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-19 22:05:34 |
| 188.166.237.191 | attack | Invalid user ext from 188.166.237.191 port 58998 |
2020-01-19 21:50:13 |
| 200.186.178.2 | attackspam | Jan 19 14:55:11 vps691689 sshd[17507]: Failed password for root from 200.186.178.2 port 18177 ssh2 Jan 19 14:59:52 vps691689 sshd[17633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.186.178.2 ... |
2020-01-19 22:19:40 |
| 109.194.54.126 | attackbotsspam | Invalid user service from 109.194.54.126 port 42108 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 Failed password for invalid user service from 109.194.54.126 port 42108 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 user=root Failed password for root from 109.194.54.126 port 43504 ssh2 |
2020-01-19 22:17:11 |
| 211.25.57.84 | attack | Jan 19 14:23:33 vpn01 sshd[20707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.25.57.84 Jan 19 14:23:34 vpn01 sshd[20707]: Failed password for invalid user simon from 211.25.57.84 port 43977 ssh2 ... |
2020-01-19 21:47:28 |
| 49.48.86.165 | attackspambots | 1579438719 - 01/19/2020 13:58:39 Host: 49.48.86.165/49.48.86.165 Port: 445 TCP Blocked |
2020-01-19 22:09:20 |
| 119.29.129.88 | attackbots | Invalid user will from 119.29.129.88 port 50814 |
2020-01-19 21:54:21 |
| 93.84.111.7 | attack | Invalid user pi from 93.84.111.7 port 55744 |
2020-01-19 21:56:02 |
| 222.186.30.57 | attackspam | SSH brutforce |
2020-01-19 22:02:55 |
| 123.16.140.50 | attackbots | Brute force attempt |
2020-01-19 22:02:07 |
| 14.63.167.192 | attack | Unauthorized connection attempt detected from IP address 14.63.167.192 to port 2220 [J] |
2020-01-19 21:46:18 |