City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.193.152.0 - 212.193.159.255'
% Abuse contact for '212.193.152.0 - 212.193.159.255' is 'support@ngenix.net'
inetnum: 212.193.152.0 - 212.193.159.255
org: ORG-LN125-RIPE
netname: NGENIX-INFRASTRUCTURE-NET
country: RU
admin-c: RN1863-RIPE
tech-c: RN1863-RIPE
status: ASSIGNED PA
mnt-by: RUIX-MNT
created: 2020-11-12T13:25:40Z
last-modified: 2020-11-16T06:19:06Z
source: RIPE
organisation: ORG-LN125-RIPE
org-name: LLC NGENIX
org-type: OTHER
address: 127083, Moscow, 8 Marta Street 1, bld. 12
abuse-c: LN3560-RIPE
mnt-ref: RUIX-MNT
mnt-by: RUIX-MNT
created: 2020-11-16T06:18:03Z
last-modified: 2020-11-16T06:18:03Z
source: RIPE # Filtered
role: MSK-IX NOC
address: JSC "MSK-IX"
address: 8 Marta Street 1, bld. 12, office XXXV, room 19
address: Moscow 127083, Russian Federation
phone: +7 495 7370685
phone: +7 499 1929179
fax-no: +7 499 1964984
admin-c: IA5224-RIPE
tech-c: IA5224-RIPE
tech-c: MAGR-RIPE
tech-c: DYK9-RIPE
nic-hdl: RN1863-RIPE
mnt-by: RUIX-MNT
created: 2009-03-26T15:52:51Z
last-modified: 2023-09-25T09:56:47Z
source: RIPE # Filtered
% Information related to '212.193.153.0/24AS204878'
route: 212.193.153.0/24
descr: NGENIX-INFRASTRUCTURE-NET
origin: AS204878
mnt-by: RUIX-MNT
created: 2025-07-16T13:37:08Z
last-modified: 2025-07-16T13:37:08Z
source: RIPE
% Information related to '212.193.153.0/24AS34879'
route: 212.193.153.0/24
descr: NGENIX-INFRASTRUCTURE-NET
origin: AS34879
mnt-by: RUIX-MNT
created: 2018-03-19T08:28:44Z
last-modified: 2019-04-26T06:00:14Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.193.153.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.193.153.133. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 01:37:05 CST 2026
;; MSG SIZE rcvd: 108
133.153.193.212.in-addr.arpa domain name pointer cdn.ngenix.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
133.153.193.212.in-addr.arpa name = cdn.ngenix.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.220 | attackbotsspam | Jun 16 17:51:28 game-panel sshd[32417]: Failed password for root from 218.92.0.220 port 55677 ssh2 Jun 16 17:51:37 game-panel sshd[32420]: Failed password for root from 218.92.0.220 port 45813 ssh2 |
2020-06-17 01:56:16 |
| 186.228.221.176 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-06-17 02:00:30 |
| 67.48.50.124 | attackbotsspam | Brute forcing email accounts |
2020-06-17 02:06:16 |
| 137.74.159.147 | attackspam | Failed password for invalid user girish from 137.74.159.147 port 35402 ssh2 |
2020-06-17 01:55:34 |
| 185.153.196.230 | attackbotsspam | Jun 16 19:41:10 vps sshd[5195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.196.230 Jun 16 19:41:12 vps sshd[5195]: Failed password for invalid user 0 from 185.153.196.230 port 51785 ssh2 Jun 16 19:41:17 vps sshd[5199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.196.230 ... |
2020-06-17 02:04:05 |
| 106.54.229.142 | attackspambots | Jun 16 15:14:40 *** sshd[17179]: Invalid user administrador from 106.54.229.142 |
2020-06-17 02:02:08 |
| 203.109.82.54 | attackspambots | Brute-Force |
2020-06-17 02:26:29 |
| 94.102.56.215 | attackspambots | Jun 16 20:20:32 debian-2gb-nbg1-2 kernel: \[14590334.323279\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.215 DST=195.201.40.59 LEN=57 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=52274 DPT=41197 LEN=37 |
2020-06-17 02:21:13 |
| 218.92.0.223 | attack | Unauthorized connection attempt detected from IP address 218.92.0.223 to port 22 [T] |
2020-06-17 01:50:07 |
| 49.232.16.241 | attack | Jun 16 10:22:15 firewall sshd[19863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.16.241 Jun 16 10:22:15 firewall sshd[19863]: Invalid user alexis from 49.232.16.241 Jun 16 10:22:17 firewall sshd[19863]: Failed password for invalid user alexis from 49.232.16.241 port 38950 ssh2 ... |
2020-06-17 02:32:14 |
| 68.183.156.109 | attack | Jun 16 16:05:13 abendstille sshd\[13963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 user=root Jun 16 16:05:15 abendstille sshd\[13963\]: Failed password for root from 68.183.156.109 port 57874 ssh2 Jun 16 16:08:30 abendstille sshd\[17422\]: Invalid user ftp2 from 68.183.156.109 Jun 16 16:08:30 abendstille sshd\[17422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 Jun 16 16:08:33 abendstille sshd\[17422\]: Failed password for invalid user ftp2 from 68.183.156.109 port 57610 ssh2 ... |
2020-06-17 02:09:34 |
| 200.119.112.204 | attack | Jun 16 14:14:52 serwer sshd\[12693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.119.112.204 user=root Jun 16 14:14:54 serwer sshd\[12693\]: Failed password for root from 200.119.112.204 port 40878 ssh2 Jun 16 14:18:05 serwer sshd\[13148\]: Invalid user content from 200.119.112.204 port 60866 Jun 16 14:18:05 serwer sshd\[13148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.119.112.204 ... |
2020-06-17 02:23:03 |
| 180.175.242.221 | attackbotsspam | Unauthorized IMAP connection attempt |
2020-06-17 02:27:03 |
| 106.12.220.84 | attackbots | Jun 16 15:23:20 mout sshd[3897]: Invalid user webcam from 106.12.220.84 port 42292 |
2020-06-17 02:11:17 |
| 195.54.166.101 | attack | [portscan] Port scan |
2020-06-17 02:07:33 |