City: unknown
Region: unknown
Country: Poland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.23.222.0 - 212.23.222.255'
% Abuse contact for '212.23.222.0 - 212.23.222.255' is 'abuse@mevspace.com'
inetnum: 212.23.222.0 - 212.23.222.255
netname: PL-MEV-20211105
remarks:
remarks: --------------------------------------------------------------
remarks: For DMCA or abuse reports, please use our online form:
remarks: https://mevspace.com/abuse-report
remarks:
remarks: Or contact us via email at: abuse@mevspace.com
remarks:
remarks: Reports submitted through other channels may not be
remarks: processed or acknowledged.
remarks: --------------------------------------------------------------
remarks:
org: ORG-MSZO78-RIPE
country: PL
abuse-c: AR49979-RIPE
admin-c: mevs2-ripe
tech-c: mevs2-ripe
status: ALLOCATED PA
mnt-by: SKYTECH-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2024-01-02T13:51:41Z
last-modified: 2025-05-13T13:04:40Z
source: RIPE
organisation: ORG-MSZO78-RIPE
org-name: MEVSPACE sp. z o.o.
country: PL
org-type: LIR
address: Augustyna Locciego 33
address: 02-928
address: Warszawa
address: POLAND
phone: +48221004144
admin-c: mevs2-ripe
tech-c: mevs2-ripe
abuse-c: AR49979-RIPE
mnt-ref: SKYTECH-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SKYTECH-MNT
created: 2018-12-20T08:55:28Z
last-modified: 2023-01-16T12:16:04Z
source: RIPE # Filtered
role: Mevspace Admins
address: MEVSPACE Sp. z o.o.
address: Augustyna Locciego 33
address: 02-928 Warszawa
admin-c: AO3529-RIPE
admin-c: SO4268-RIPE
admin-c: DP17971-RIPE
admin-c: HK7240-RIPE
admin-c: PK10813-RIPE
admin-c: MW12122-RIPE
tech-c: AO3529-RIPE
tech-c: SO4268-RIPE
tech-c: DP17971-RIPE
tech-c: HK7240-RIPE
tech-c: PK10813-RIPE
tech-c: MW12122-RIPE
nic-hdl: mevs2-ripe
mnt-by: SKYTECH-MNT
created: 2022-12-07T13:04:36Z
last-modified: 2026-02-27T12:18:14Z
source: RIPE # Filtered
% Information related to '212.23.222.0/24as201814'
route: 212.23.222.0/24
origin: as201814
mnt-by: SKYTECH-MNT
created: 2022-01-25T15:54:16Z
last-modified: 2022-01-25T15:54:16Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.23.222.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.23.222.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 04:30:06 CST 2026
;; MSG SIZE rcvd: 106
Host 58.222.23.212.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 58.222.23.212.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.89.36.2 | attackbotsspam | Unauthorized connection attempt from IP address 41.89.36.2 on Port 445(SMB) |
2019-11-05 01:11:31 |
| 164.163.237.119 | attackbotsspam | Unauthorized connection attempt from IP address 164.163.237.119 on Port 445(SMB) |
2019-11-05 01:23:38 |
| 61.160.215.24 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 54 - port: 3306 proto: TCP cat: Misc Attack |
2019-11-05 01:16:37 |
| 142.93.141.35 | attackbots | Nov 4 13:00:57 ws22vmsma01 sshd[150155]: Failed password for root from 142.93.141.35 port 48180 ssh2 ... |
2019-11-05 01:28:29 |
| 77.234.68.2 | attack | Unauthorized connection attempt from IP address 77.234.68.2 on Port 445(SMB) |
2019-11-05 01:39:27 |
| 177.139.167.7 | attack | Nov 4 10:50:44 TORMINT sshd\[21539\]: Invalid user 12 from 177.139.167.7 Nov 4 10:50:44 TORMINT sshd\[21539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.167.7 Nov 4 10:50:46 TORMINT sshd\[21539\]: Failed password for invalid user 12 from 177.139.167.7 port 51315 ssh2 ... |
2019-11-05 01:01:26 |
| 45.82.153.76 | attackbots | 2019-11-04T18:11:45.376681mail01 postfix/smtpd[18229]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-04T18:12:01.427962mail01 postfix/smtpd[18228]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-04T18:12:34.419099mail01 postfix/smtpd[14627]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-05 01:14:03 |
| 110.78.23.131 | attackspambots | Unauthorized connection attempt from IP address 110.78.23.131 on Port 445(SMB) |
2019-11-05 01:35:02 |
| 182.72.31.173 | attack | Unauthorized connection attempt from IP address 182.72.31.173 on Port 445(SMB) |
2019-11-05 01:37:49 |
| 41.38.59.113 | attack | Unauthorized connection attempt from IP address 41.38.59.113 on Port 445(SMB) |
2019-11-05 01:18:54 |
| 190.200.160.192 | attack | Unauthorized connection attempt from IP address 190.200.160.192 on Port 445(SMB) |
2019-11-05 01:14:57 |
| 54.39.129.162 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: ns563649.ip-54-39-129.net. |
2019-11-05 01:19:47 |
| 114.143.210.139 | attackbotsspam | Unauthorized connection attempt from IP address 114.143.210.139 on Port 445(SMB) |
2019-11-05 01:42:46 |
| 194.61.24.7 | attackbots | Connection by 194.61.24.7 on port: 3495 got caught by honeypot at 11/4/2019 4:06:43 PM |
2019-11-05 01:22:37 |
| 118.24.2.69 | attack | $f2bV_matches |
2019-11-05 01:26:47 |