City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '217.195.96.0 - 217.195.96.255'
% Abuse contact for '217.195.96.0 - 217.195.96.255' is 'lir@phosagro.ru'
inetnum: 217.195.96.0 - 217.195.96.255
netname: APATIT
descr: JSC Apatit Corporate Network Kirovsk, Murmansk reg., Russia
country: RU
admin-c: MVG102-RIPE
tech-c: MVG102-RIPE
status: ASSIGNED PA
mnt-by: APATIT-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2012-08-02T13:55:43Z
source: RIPE # Filtered
person: Mikhail V Gavrilov
address: Leningradskaya str. 1, Kirovsk
address: 184250, Russia, Murmansk reg.
phone: +78153135452
nic-hdl: MVG102-RIPE
mnt-by: APATIT-MNT
created: 2009-05-07T04:54:20Z
last-modified: 2010-12-01T16:32:08Z
source: RIPE # Filtered
% Information related to '217.195.96.0/24AS20690'
route: 217.195.96.0/24
descr: JSC Apatit address block
origin: AS20690
mnt-by: APATIT-MNT
created: 2010-12-29T10:44:17Z
last-modified: 2010-12-29T10:44:17Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.195.96.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;217.195.96.173. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 11:43:23 CST 2026
;; MSG SIZE rcvd: 107
b'Host 173.96.195.217.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 217.195.96.173.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.71.242.140 | attack | SSH Invalid Login |
2020-05-10 06:14:17 |
| 47.29.39.236 | attack | SSH login attempts brute force. |
2020-05-10 06:26:03 |
| 46.101.204.20 | attack | May 9 23:14:15 jane sshd[27920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20 May 9 23:14:17 jane sshd[27920]: Failed password for invalid user cobra from 46.101.204.20 port 47380 ssh2 ... |
2020-05-10 06:11:28 |
| 79.134.144.27 | attackbots | "Unauthorized connection attempt on SSHD detected" |
2020-05-10 06:06:21 |
| 179.184.57.194 | attackbots | SSH Invalid Login |
2020-05-10 06:30:14 |
| 202.149.89.84 | attackbots | SSH Invalid Login |
2020-05-10 06:13:38 |
| 93.184.20.70 | attackspambots | 2020-05-09T21:43:43.484294shield sshd\[30328\]: Invalid user wf from 93.184.20.70 port 53402 2020-05-09T21:43:43.488476shield sshd\[30328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-93-184-20-70.customer.ggaweb.ch 2020-05-09T21:43:45.553139shield sshd\[30328\]: Failed password for invalid user wf from 93.184.20.70 port 53402 ssh2 2020-05-09T21:47:50.761747shield sshd\[31596\]: Invalid user luc from 93.184.20.70 port 36434 2020-05-09T21:47:50.765934shield sshd\[31596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-93-184-20-70.customer.ggaweb.ch |
2020-05-10 06:25:12 |
| 45.32.223.147 | attackbotsspam | RDP Brute-Force (honeypot 11) |
2020-05-10 06:19:22 |
| 3.215.163.241 | attackbots | 20 attempts against mh-ssh on boat |
2020-05-10 06:14:37 |
| 159.138.65.33 | attackspam | May 10 00:29:57 [host] sshd[6971]: Invalid user lu May 10 00:29:57 [host] sshd[6971]: pam_unix(sshd:a May 10 00:29:59 [host] sshd[6971]: Failed password |
2020-05-10 06:41:51 |
| 89.163.132.37 | attackbots | (sshd) Failed SSH login from 89.163.132.37 (DE/Germany/rs003578.fastrootserver.de): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 9 22:28:43 ubnt-55d23 sshd[3795]: Invalid user jenkins from 89.163.132.37 port 50495 May 9 22:28:45 ubnt-55d23 sshd[3795]: Failed password for invalid user jenkins from 89.163.132.37 port 50495 ssh2 |
2020-05-10 06:45:07 |
| 106.51.113.15 | attackbots | SSH Invalid Login |
2020-05-10 06:16:47 |
| 122.51.21.208 | attackbotsspam | May 9 23:50:16 home sshd[30689]: Failed password for root from 122.51.21.208 port 57330 ssh2 May 9 23:52:55 home sshd[31093]: Failed password for root from 122.51.21.208 port 38254 ssh2 ... |
2020-05-10 06:39:00 |
| 109.225.107.159 | attackbotsspam | May 10 00:08:08 OPSO sshd\[2359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.225.107.159 user=admin May 10 00:08:10 OPSO sshd\[2359\]: Failed password for admin from 109.225.107.159 port 24677 ssh2 May 10 00:16:05 OPSO sshd\[3451\]: Invalid user ts2 from 109.225.107.159 port 13891 May 10 00:16:05 OPSO sshd\[3451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.225.107.159 May 10 00:16:07 OPSO sshd\[3451\]: Failed password for invalid user ts2 from 109.225.107.159 port 13891 ssh2 |
2020-05-10 06:23:57 |
| 209.85.220.41 | attack | Pretends to be renting apartments on craigslist, seeks personal information. Actual location is not for rent and people residing there are fed up with numerous people going there. The craigslist photos were obtained from an online real estate website. |
2020-05-10 06:46:53 |