City: Kazanlak
Region: Stara Zagora
Country: Bulgaria
Internet Service Provider: Vivacom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.91.128.0 - 213.91.255.255'
% Abuse contact for '213.91.128.0 - 213.91.255.255' is 'abuse-ip@vivacom.bg'
inetnum: 213.91.128.0 - 213.91.255.255
netname: BG-BTC-20020905
descr: PROVIDER LIR
country: BG
org: ORG-BTCP1-RIPE
admin-c: BTC3-RIPE
tech-c: BTC3-RIPE
tech-c: BTC3-RIPE
status: ALLOCATED PA
remarks: -------------------------------------------
remarks: For Hacking, Spamming or Security problems
remarks: send mail to abuse@btc-net.bg
remarks: ----------------------------------------------
mnt-by: RIPE-NCC-HM-MNT
mnt-by: BT95-ADM
mnt-lower: BTC-PROV-ADM
mnt-lower: BT95-ADM
mnt-domains: MNT-BTCNET
mnt-domains: BTC-PROV-ADM
mnt-routes: BTC-PROV-ADM
mnt-routes: BT95-ADM
created: 2002-09-05T08:32:54Z
last-modified: 2020-12-04T11:34:24Z
source: RIPE
organisation: ORG-BTCP1-RIPE
org-name: Vivacom Bulgaria EAD
country: BG
org-type: LIR
address: 115I, Tsarigradsko shose Blvd.
address: 1784
address: Sofia
address: BULGARIA
phone: +35929494600
fax-no: +35929331200
admin-c: BTC3-RIPE
admin-c: LG700-RIPE
admin-c: VB2225-RIPE
admin-c: NP2222-RIPE
admin-c: IR778-RIPE
admin-c: SS4127-RIPE
admin-c: PT1549-RIPE
abuse-c: BTC3-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: BT95-ADM
mnt-ref: MNT-GNET
mnt-by: RIPE-NCC-HM-MNT
mnt-by: BT95-ADM
created: 2004-04-17T11:01:01Z
last-modified: 2022-10-06T13:19:37Z
source: RIPE # Filtered
role: BTC IP ADDRESS SPACE administration
address: Bulgarian Telecommunications Company Plc.
address: 115I, Tsarigradsko shose Blvd.
address: 1784, Sofia
address: Bulgaria
remarks: www.vivacom.bg
nic-hdl: BTC3-RIPE
remarks: hostmaster role account
mnt-by: BT95-ADM
created: 2001-11-30T11:48:48Z
last-modified: 2024-08-30T13:28:41Z
source: RIPE # Filtered
abuse-mailbox: abuse-ip@vivacom.bg
% Information related to '213.91.248.0/22AS8866'
route: 213.91.248.0/22
descr: BTC-BROADBAND-NET
origin: AS8866
mnt-by: BT95-ADM
created: 2005-06-20T15:19:57Z
last-modified: 2015-09-29T11:34:23Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.91.251.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.91.251.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 11:32:04 CST 2026
;; MSG SIZE rcvd: 107
124.251.91.213.in-addr.arpa domain name pointer 213-91-251-124.ip.btc-net.bg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.251.91.213.in-addr.arpa name = 213-91-251-124.ip.btc-net.bg.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.162.201 | attackbots | Invalid user fangbingkun from 106.12.162.201 port 39720 |
2020-03-20 09:48:00 |
| 113.172.16.224 | attackbots | Mar 19 22:50:24 haigwepa sshd[15496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.16.224 Mar 19 22:50:26 haigwepa sshd[15496]: Failed password for invalid user admin from 113.172.16.224 port 35943 ssh2 ... |
2020-03-20 09:09:26 |
| 206.189.204.63 | attack | Invalid user deploy from 206.189.204.63 port 57226 |
2020-03-20 09:29:42 |
| 106.13.45.131 | attackspam | Mar 19 22:44:21 ourumov-web sshd\[31909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131 user=root Mar 19 22:44:23 ourumov-web sshd\[31909\]: Failed password for root from 106.13.45.131 port 36574 ssh2 Mar 19 22:49:41 ourumov-web sshd\[32256\]: Invalid user libuuid from 106.13.45.131 port 42518 Mar 19 22:49:41 ourumov-web sshd\[32256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131 ... |
2020-03-20 09:44:54 |
| 178.67.196.85 | attackspambots | cow-Joomla User : try to access forms... |
2020-03-20 09:47:31 |
| 101.95.162.58 | attackspambots | 20/3/19@17:49:55: FAIL: Alarm-Network address from=101.95.162.58 20/3/19@17:49:56: FAIL: Alarm-Network address from=101.95.162.58 ... |
2020-03-20 09:36:52 |
| 203.104.31.27 | attackbotsspam | $f2bV_matches |
2020-03-20 09:18:29 |
| 101.231.154.154 | attackbots | 2020-03-20T00:57:48.925750ns386461 sshd\[21518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.154.154 user=root 2020-03-20T00:57:51.446356ns386461 sshd\[21518\]: Failed password for root from 101.231.154.154 port 5019 ssh2 2020-03-20T01:01:07.123620ns386461 sshd\[24698\]: Invalid user phpmyadmin from 101.231.154.154 port 5020 2020-03-20T01:01:07.128798ns386461 sshd\[24698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.154.154 2020-03-20T01:01:08.636756ns386461 sshd\[24698\]: Failed password for invalid user phpmyadmin from 101.231.154.154 port 5020 ssh2 ... |
2020-03-20 09:16:04 |
| 185.253.217.55 | attack | serveres are UTC -0400 Lines containing failures of 185.253.217.55 Mar 19 11:00:11 tux2 sshd[21121]: Failed password for r.r from 185.253.217.55 port 53032 ssh2 Mar 19 11:00:12 tux2 sshd[21121]: Received disconnect from 185.253.217.55 port 53032:11: Bye Bye [preauth] Mar 19 11:00:12 tux2 sshd[21121]: Disconnected from authenticating user r.r 185.253.217.55 port 53032 [preauth] Mar 19 11:10:46 tux2 sshd[21783]: Failed password for r.r from 185.253.217.55 port 51344 ssh2 Mar 19 11:10:47 tux2 sshd[21783]: Received disconnect from 185.253.217.55 port 51344:11: Bye Bye [preauth] Mar 19 11:10:47 tux2 sshd[21783]: Disconnected from authenticating user r.r 185.253.217.55 port 51344 [preauth] Mar 19 11:16:19 tux2 sshd[22081]: Failed password for r.r from 185.253.217.55 port 54570 ssh2 Mar 19 11:16:20 tux2 sshd[22081]: Received disconnect from 185.253.217.55 port 54570:11: Bye Bye [preauth] Mar 19 11:16:20 tux2 sshd[22081]: Disconnected from authenticating user r.r 185.253.217.55 ........ ------------------------------ |
2020-03-20 09:20:33 |
| 197.32.203.197 | attack | Mar 19 22:50:00 haigwepa sshd[15417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.32.203.197 Mar 19 22:50:02 haigwepa sshd[15417]: Failed password for invalid user admin from 197.32.203.197 port 44938 ssh2 ... |
2020-03-20 09:31:57 |
| 68.183.19.63 | attackspam | Mar 20 00:17:10 vps647732 sshd[9441]: Failed password for root from 68.183.19.63 port 58424 ssh2 Mar 20 00:17:55 vps647732 sshd[9445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.63 ... |
2020-03-20 09:48:32 |
| 84.17.46.209 | attackbots | Brute force VPN server |
2020-03-20 09:51:37 |
| 177.188.37.73 | attackbotsspam | Mar 19 21:49:42 *** sshd[9432]: User root from 177.188.37.73 not allowed because not listed in AllowUsers |
2020-03-20 09:43:17 |
| 122.152.210.200 | attack | 5x Failed Password |
2020-03-20 09:24:33 |
| 222.186.30.187 | attackspambots | Mar 20 06:36:38 areeb-Workstation sshd[21445]: Failed password for root from 222.186.30.187 port 30817 ssh2 Mar 20 06:36:42 areeb-Workstation sshd[21445]: Failed password for root from 222.186.30.187 port 30817 ssh2 ... |
2020-03-20 09:09:04 |