City: Tashkent
Region: Toshkent city
Country: Uzbekistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.230.90.55 | attackspambots | Jul 9 05:50:53 smtp postfix/smtpd[35300]: NOQUEUE: reject: RCPT from unknown[213.230.90.55]: 554 5.7.1 Service unavailable; Client host [213.230.90.55] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?213.230.90.55; from= |
2020-07-09 19:08:41 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.230.90.0 - 213.230.90.255'
% Abuse contact for '213.230.90.0 - 213.230.90.255' is 'ripe@bkm.uz'
inetnum: 213.230.90.0 - 213.230.90.255
netname: UZTELECOM
country: UZ
admin-c: ROJ1-RIPE
tech-c: ROJ1-RIPE
geofeed: https://minio.uzdc.uz/uztelecom-web-bucket/geofeed.csv
status: ASSIGNED PA
mnt-by: AS8193-MNT
created: 2008-12-19T04:34:41Z
last-modified: 2025-07-09T04:48:56Z
source: RIPE
role: Role of Uzbektelecom JSC
address: Alisher Navoi Avenue, 28A, Shaykhontohur District
address: Tashkent, Uzbekistan
org: ORG-JC7-RIPE
org: ORG-UNCN1-RIPE
nic-hdl: ROJ1-RIPE
admin-c: BM2509-RIPE
tech-c: BS10923-RIPE
tech-c: SHI1990-RIPE
abuse-mailbox: ripe@bkm.uz
mnt-by: AS8193-MNT
mnt-by: UZTELECOM-MNT
created: 2018-10-09T04:28:53Z
last-modified: 2021-05-26T05:11:22Z
source: RIPE # Filtered
% Information related to '213.230.90.0/24AS8193'
route: 213.230.90.0/24
descr: Uzbektelecom JSC
org: ORG-UNCN1-RIPE
origin: AS8193
mnt-by: AS8193-MNT
created: 2018-10-09T08:20:08Z
last-modified: 2018-10-10T10:14:25Z
source: RIPE
organisation: ORG-UNCN1-RIPE
org-name: "Uzbektelekom" Joint Stock Company
country: UZ
org-type: LIR
address: ALISHER NAVOI AVENUE, 28A
address: 100011
address: TASHKENT
address: UZBEKISTAN
phone: +998712146129
phone: +998712448042
fax-no: +998712443443
reg-nr: 203366731
admin-c: ROJ1-RIPE
tech-c: ROJ1-RIPE
abuse-c: ROJ1-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: AS8193-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS8193-MNT
created: 2004-04-17T12:24:40Z
last-modified: 2026-04-29T05:08:21Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.230.90.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63264
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.230.90.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042900 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 19:31:28 CST 2026
;; MSG SIZE rcvd: 107
b'Host 238.90.230.213.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 238.90.230.213.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.172.14.241 | attack | Feb 10 10:31:09 plusreed sshd[22686]: Invalid user fqu from 5.172.14.241 ... |
2020-02-10 23:34:04 |
| 123.124.158.23 | attackbots | Unauthorized connection attempt detected from IP address 123.124.158.23 to port 1433 |
2020-02-10 23:57:22 |
| 82.221.105.7 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-10 23:42:48 |
| 171.225.252.180 | attackbots | Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn. |
2020-02-10 23:49:14 |
| 177.23.107.73 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-10 23:12:59 |
| 119.27.167.231 | attack | Feb 10 10:25:55 plusreed sshd[21332]: Invalid user fnm from 119.27.167.231 ... |
2020-02-10 23:32:39 |
| 117.13.46.221 | attackspambots | Port 1433 Scan |
2020-02-10 23:51:07 |
| 111.229.118.227 | attack | Feb 10 15:44:42 * sshd[8456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.118.227 Feb 10 15:44:43 * sshd[8456]: Failed password for invalid user fpv from 111.229.118.227 port 59056 ssh2 |
2020-02-10 23:23:29 |
| 185.156.177.176 | attackspambots | RDP Bruteforce |
2020-02-10 23:37:59 |
| 218.22.129.38 | attackspambots | Brute force attempt |
2020-02-10 23:29:30 |
| 219.143.126.169 | attackbotsspam | ICMP MH Probe, Scan /Distributed - |
2020-02-10 23:24:09 |
| 203.249.22.202 | attack | $f2bV_matches |
2020-02-10 23:16:21 |
| 168.205.76.35 | attack | Feb 10 14:52:19 silence02 sshd[23336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.205.76.35 Feb 10 14:52:21 silence02 sshd[23336]: Failed password for invalid user rwy from 168.205.76.35 port 47392 ssh2 Feb 10 14:56:16 silence02 sshd[23551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.205.76.35 |
2020-02-10 23:27:39 |
| 107.179.19.68 | attackbots | ENG,WP GET /wp-login.php |
2020-02-10 23:17:37 |
| 203.220.158.124 | attackbots | $f2bV_matches |
2020-02-10 23:40:53 |