City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.193.152.0 - 212.193.159.255'
% Abuse contact for '212.193.152.0 - 212.193.159.255' is 'support@ngenix.net'
inetnum: 212.193.152.0 - 212.193.159.255
org: ORG-LN125-RIPE
netname: NGENIX-INFRASTRUCTURE-NET
country: RU
admin-c: RN1863-RIPE
tech-c: RN1863-RIPE
status: ASSIGNED PA
mnt-by: RUIX-MNT
created: 2020-11-12T13:25:40Z
last-modified: 2020-11-16T06:19:06Z
source: RIPE
organisation: ORG-LN125-RIPE
org-name: LLC NGENIX
org-type: OTHER
address: 127083, Moscow, 8 Marta Street 1, bld. 12
abuse-c: LN3560-RIPE
mnt-ref: RUIX-MNT
mnt-by: RUIX-MNT
created: 2020-11-16T06:18:03Z
last-modified: 2020-11-16T06:18:03Z
source: RIPE # Filtered
role: MSK-IX NOC
address: JSC "MSK-IX"
address: 8 Marta Street 1, bld. 12, office XXXV, room 19
address: Moscow 127083, Russian Federation
phone: +7 495 7370685
phone: +7 499 1929179
fax-no: +7 499 1964984
admin-c: IA5224-RIPE
tech-c: IA5224-RIPE
tech-c: MAGR-RIPE
tech-c: DYK9-RIPE
nic-hdl: RN1863-RIPE
mnt-by: RUIX-MNT
created: 2009-03-26T15:52:51Z
last-modified: 2023-09-25T09:56:47Z
source: RIPE # Filtered
% Information related to '212.193.157.0/24AS34879'
route: 212.193.157.0/24
descr: NGENIX-INFRASTRUCTURE-NET
origin: AS34879
mnt-by: RUIX-MNT
created: 2017-02-17T10:30:24Z
last-modified: 2019-04-26T06:02:37Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.193.157.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.193.157.240. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 01:23:50 CST 2026
;; MSG SIZE rcvd: 108
240.157.193.212.in-addr.arpa domain name pointer cdn.ngenix.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
240.157.193.212.in-addr.arpa name = cdn.ngenix.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.232.127.51 | attack | Jun 18 20:47:29 dhoomketu sshd[857786]: Invalid user cable from 117.232.127.51 port 48020 Jun 18 20:47:29 dhoomketu sshd[857786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.232.127.51 Jun 18 20:47:29 dhoomketu sshd[857786]: Invalid user cable from 117.232.127.51 port 48020 Jun 18 20:47:31 dhoomketu sshd[857786]: Failed password for invalid user cable from 117.232.127.51 port 48020 ssh2 Jun 18 20:50:38 dhoomketu sshd[857811]: Invalid user abc123 from 117.232.127.51 port 53964 ... |
2020-06-18 23:27:15 |
| 180.76.156.150 | attack | prod6 ... |
2020-06-18 23:06:33 |
| 93.177.102.220 | attack | IP: 93.177.102.220
Ports affected
Simple Mail Transfer (25)
Found in DNSBL('s)
ASN Details
AS202505 Onlinenet Bil. Turzm. Teks. San. Ve Tic. Ltd. Sti.
Turkey (TR)
CIDR 93.177.102.0/24
Log Date: 18/06/2020 11:53:51 AM UTC |
2020-06-18 23:20:33 |
| 115.159.153.180 | attackspam | SSH Brute-Force reported by Fail2Ban |
2020-06-18 23:09:09 |
| 62.234.90.140 | attackspambots | SSH brute force attempt |
2020-06-18 22:56:15 |
| 94.237.73.111 | attackbots | Jun 18 17:00:09 vps sshd[749595]: Failed password for invalid user sammy from 94.237.73.111 port 48738 ssh2 Jun 18 17:05:00 vps sshd[768387]: Invalid user yqc from 94.237.73.111 port 55358 Jun 18 17:05:00 vps sshd[768387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-237-73-111.sg-sin1.upcloud.host Jun 18 17:05:02 vps sshd[768387]: Failed password for invalid user yqc from 94.237.73.111 port 55358 ssh2 Jun 18 17:08:05 vps sshd[784413]: Invalid user vncuser from 94.237.73.111 port 45804 ... |
2020-06-18 23:19:51 |
| 201.179.195.33 | attack | Jun 18 13:37:10 h2034429 sshd[10911]: Invalid user tg from 201.179.195.33 Jun 18 13:37:10 h2034429 sshd[10911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.179.195.33 Jun 18 13:37:12 h2034429 sshd[10911]: Failed password for invalid user tg from 201.179.195.33 port 44102 ssh2 Jun 18 13:37:12 h2034429 sshd[10911]: Received disconnect from 201.179.195.33 port 44102:11: Bye Bye [preauth] Jun 18 13:37:12 h2034429 sshd[10911]: Disconnected from 201.179.195.33 port 44102 [preauth] Jun 18 13:41:05 h2034429 sshd[10982]: Invalid user israel from 201.179.195.33 Jun 18 13:41:05 h2034429 sshd[10982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.179.195.33 Jun 18 13:41:07 h2034429 sshd[10982]: Failed password for invalid user israel from 201.179.195.33 port 41118 ssh2 Jun 18 13:41:07 h2034429 sshd[10982]: Received disconnect from 201.179.195.33 port 41118:11: Bye Bye [preauth] Jun 18 13:41........ ------------------------------- |
2020-06-18 23:24:07 |
| 101.255.65.138 | attackbots | Jun 18 17:09:08 eventyay sshd[6132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.65.138 Jun 18 17:09:10 eventyay sshd[6132]: Failed password for invalid user terraria from 101.255.65.138 port 49440 ssh2 Jun 18 17:12:41 eventyay sshd[6281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.65.138 ... |
2020-06-18 23:16:50 |
| 95.111.255.187 | attackbotsspam | Jun 18 12:15:59 localhost sshd[58518]: Invalid user ts from 95.111.255.187 port 40404 Jun 18 12:15:59 localhost sshd[58518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi397735.contaboserver.net Jun 18 12:15:59 localhost sshd[58518]: Invalid user ts from 95.111.255.187 port 40404 Jun 18 12:16:01 localhost sshd[58518]: Failed password for invalid user ts from 95.111.255.187 port 40404 ssh2 Jun 18 12:24:28 localhost sshd[59622]: Invalid user ts from 95.111.255.187 port 54474 ... |
2020-06-18 23:09:43 |
| 218.92.0.220 | attackspam | Jun 18 17:15:31 abendstille sshd\[19629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=root Jun 18 17:15:33 abendstille sshd\[19629\]: Failed password for root from 218.92.0.220 port 62983 ssh2 Jun 18 17:15:35 abendstille sshd\[19629\]: Failed password for root from 218.92.0.220 port 62983 ssh2 Jun 18 17:15:38 abendstille sshd\[19629\]: Failed password for root from 218.92.0.220 port 62983 ssh2 Jun 18 17:15:49 abendstille sshd\[19921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=root ... |
2020-06-18 23:18:23 |
| 185.86.164.104 | attack | Automatic report - Banned IP Access |
2020-06-18 23:26:39 |
| 187.188.90.141 | attack | Too many connections or unauthorized access detected from Arctic banned ip |
2020-06-18 23:15:18 |
| 122.51.69.116 | attackbotsspam | 2020-06-18T12:32:21.089116shield sshd\[15680\]: Invalid user soporte from 122.51.69.116 port 43708 2020-06-18T12:32:21.093297shield sshd\[15680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 2020-06-18T12:32:23.178062shield sshd\[15680\]: Failed password for invalid user soporte from 122.51.69.116 port 43708 ssh2 2020-06-18T12:34:39.837222shield sshd\[15962\]: Invalid user info from 122.51.69.116 port 41518 2020-06-18T12:34:39.841211shield sshd\[15962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 |
2020-06-18 23:08:45 |
| 218.92.0.191 | attack | Jun 18 16:04:42 cdc sshd[15137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191 user=root Jun 18 16:04:45 cdc sshd[15137]: Failed password for invalid user root from 218.92.0.191 port 44444 ssh2 |
2020-06-18 23:05:10 |
| 45.7.138.40 | attack | Jun 18 17:11:44 inter-technics sshd[27414]: Invalid user le from 45.7.138.40 port 46705 Jun 18 17:11:44 inter-technics sshd[27414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.138.40 Jun 18 17:11:44 inter-technics sshd[27414]: Invalid user le from 45.7.138.40 port 46705 Jun 18 17:11:46 inter-technics sshd[27414]: Failed password for invalid user le from 45.7.138.40 port 46705 ssh2 Jun 18 17:15:18 inter-technics sshd[27653]: Invalid user user1 from 45.7.138.40 port 46111 ... |
2020-06-18 23:25:49 |