Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '212.193.152.0 - 212.193.159.255'

% Abuse contact for '212.193.152.0 - 212.193.159.255' is 'support@ngenix.net'

inetnum:        212.193.152.0 - 212.193.159.255
org:            ORG-LN125-RIPE
netname:        NGENIX-INFRASTRUCTURE-NET
country:        RU
admin-c:        RN1863-RIPE
tech-c:         RN1863-RIPE
status:         ASSIGNED PA
mnt-by:         RUIX-MNT
created:        2020-11-12T13:25:40Z
last-modified:  2020-11-16T06:19:06Z
source:         RIPE

organisation:   ORG-LN125-RIPE
org-name:       LLC NGENIX
org-type:       OTHER
address:        127083, Moscow, 8 Marta Street 1, bld. 12
abuse-c:        LN3560-RIPE
mnt-ref:        RUIX-MNT
mnt-by:         RUIX-MNT
created:        2020-11-16T06:18:03Z
last-modified:  2020-11-16T06:18:03Z
source:         RIPE # Filtered

role:           MSK-IX NOC
address:        JSC "MSK-IX"
address:        8 Marta Street 1, bld. 12, office XXXV, room 19
address:        Moscow 127083, Russian Federation
phone:          +7 495 7370685
phone:          +7 499 1929179
fax-no:         +7 499 1964984
admin-c:        IA5224-RIPE
tech-c:         IA5224-RIPE
tech-c:         MAGR-RIPE
tech-c:         DYK9-RIPE
nic-hdl:        RN1863-RIPE
mnt-by:         RUIX-MNT
created:        2009-03-26T15:52:51Z
last-modified:  2023-09-25T09:56:47Z
source:         RIPE # Filtered

% Information related to '212.193.153.0/24AS204878'

route:          212.193.153.0/24
descr:          NGENIX-INFRASTRUCTURE-NET
origin:         AS204878
mnt-by:         RUIX-MNT
created:        2025-07-16T13:37:08Z
last-modified:  2025-07-16T13:37:08Z
source:         RIPE

% Information related to '212.193.153.0/24AS34879'

route:          212.193.153.0/24
descr:          NGENIX-INFRASTRUCTURE-NET
origin:         AS34879
mnt-by:         RUIX-MNT
created:        2018-03-19T08:28:44Z
last-modified:  2019-04-26T06:00:14Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.193.153.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.193.153.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 01:37:05 CST 2026
;; MSG SIZE  rcvd: 108
Host info
133.153.193.212.in-addr.arpa domain name pointer cdn.ngenix.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.153.193.212.in-addr.arpa	name = cdn.ngenix.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.220 attackbotsspam
Jun 16 17:51:28 game-panel sshd[32417]: Failed password for root from 218.92.0.220 port 55677 ssh2
Jun 16 17:51:37 game-panel sshd[32420]: Failed password for root from 218.92.0.220 port 45813 ssh2
2020-06-17 01:56:16
186.228.221.176 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-17 02:00:30
67.48.50.124 attackbotsspam
Brute forcing email accounts
2020-06-17 02:06:16
137.74.159.147 attackspam
Failed password for invalid user girish from 137.74.159.147 port 35402 ssh2
2020-06-17 01:55:34
185.153.196.230 attackbotsspam
Jun 16 19:41:10 vps sshd[5195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.196.230 
Jun 16 19:41:12 vps sshd[5195]: Failed password for invalid user 0 from 185.153.196.230 port 51785 ssh2
Jun 16 19:41:17 vps sshd[5199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.196.230 
...
2020-06-17 02:04:05
106.54.229.142 attackspambots
Jun 16 15:14:40 *** sshd[17179]: Invalid user administrador from 106.54.229.142
2020-06-17 02:02:08
203.109.82.54 attackspambots
Brute-Force
2020-06-17 02:26:29
94.102.56.215 attackspambots
Jun 16 20:20:32 debian-2gb-nbg1-2 kernel: \[14590334.323279\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.215 DST=195.201.40.59 LEN=57 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=52274 DPT=41197 LEN=37
2020-06-17 02:21:13
218.92.0.223 attack
Unauthorized connection attempt detected from IP address 218.92.0.223 to port 22 [T]
2020-06-17 01:50:07
49.232.16.241 attack
Jun 16 10:22:15 firewall sshd[19863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.16.241
Jun 16 10:22:15 firewall sshd[19863]: Invalid user alexis from 49.232.16.241
Jun 16 10:22:17 firewall sshd[19863]: Failed password for invalid user alexis from 49.232.16.241 port 38950 ssh2
...
2020-06-17 02:32:14
68.183.156.109 attack
Jun 16 16:05:13 abendstille sshd\[13963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109  user=root
Jun 16 16:05:15 abendstille sshd\[13963\]: Failed password for root from 68.183.156.109 port 57874 ssh2
Jun 16 16:08:30 abendstille sshd\[17422\]: Invalid user ftp2 from 68.183.156.109
Jun 16 16:08:30 abendstille sshd\[17422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109
Jun 16 16:08:33 abendstille sshd\[17422\]: Failed password for invalid user ftp2 from 68.183.156.109 port 57610 ssh2
...
2020-06-17 02:09:34
200.119.112.204 attack
Jun 16 14:14:52 serwer sshd\[12693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.119.112.204  user=root
Jun 16 14:14:54 serwer sshd\[12693\]: Failed password for root from 200.119.112.204 port 40878 ssh2
Jun 16 14:18:05 serwer sshd\[13148\]: Invalid user content from 200.119.112.204 port 60866
Jun 16 14:18:05 serwer sshd\[13148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.119.112.204
...
2020-06-17 02:23:03
180.175.242.221 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-17 02:27:03
106.12.220.84 attackbots
Jun 16 15:23:20 mout sshd[3897]: Invalid user webcam from 106.12.220.84 port 42292
2020-06-17 02:11:17
195.54.166.101 attack
[portscan] Port scan
2020-06-17 02:07:33

Recently Reported IPs

213.180.199.9 37.220.164.100 87.245.138.105 212.193.157.240
80.67.43.1 46.235.186.237 109.238.90.239 77.83.39.84
2606:4700:10::6814:8230 2606:4700:10::ac43:2425 2606:4700:10::6816:3691 14.207.194.44
2606:4700:10::6814:8710 164.155.74.111 180.153.236.185 39.52.134.130
2606:4700:10::6814:7685 2606:4700:10::ac43:745 58.46.200.202 185.169.155.119