City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.133.192.168 - 5.133.192.171'
% Abuse contact for '5.133.192.168 - 5.133.192.171' is 'abuse@internetvikings.com'
inetnum: 5.133.192.168 - 5.133.192.171
netname: SE-ETTNET-20200729
country: SE
org: ORG-EA45-RIPE
admin-c: FB9451-RIPE
tech-c: FB9451-RIPE
status: ASSIGNED PA
mnt-by: ETTNET-LIR
created: 2020-07-29T08:05:50Z
last-modified: 2020-07-29T08:05:50Z
source: RIPE
organisation: ORG-EA45-RIPE
org-name: Internet Vikings International AB
country: SE
org-type: LIR
address: Roslagsgatan 26 A
address: 11355
address: Stockholm
address: SWEDEN
phone: +4684414499
fax-no: +4684414498
abuse-c: AR17147-RIPE
mnt-ref: ETTNET-LIR
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: ETTNET-LIR
created: 2004-04-17T12:03:12Z
last-modified: 2024-12-03T15:12:32Z
source: RIPE # Filtered
admin-c: FB9451-RIPE
person: Fredik Berglund
address: Internetbolaget Sweden AB
address: Birkagatan 28
address: SE 100 31 Stockholm
address: SWEDEN
phone: +46 8 4414499
fax-no: +46 8 4414498
nic-hdl: FB9451-RIPE
mnt-by: ETTNET-LIR
created: 2011-04-12T09:21:26Z
last-modified: 2011-04-12T09:21:26Z
source: RIPE # Filtered
% Information related to '5.133.192.0/19AS51747'
route: 5.133.192.0/19
origin: AS51747
mnt-by: ETTNET-LIR
created: 2020-07-15T15:36:08Z
last-modified: 2020-07-15T15:36:08Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.133.192.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.133.192.171. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 23:01:00 CST 2026
;; MSG SIZE rcvd: 106
b'Host 171.192.133.5.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 5.133.192.171.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 148.70.61.60 | attack | Aug 31 19:50:34 plusreed sshd[28223]: Invalid user jb from 148.70.61.60 ... |
2019-09-01 13:48:52 |
| 104.248.149.214 | attack | DATE:2019-08-31 23:42:24, IP:104.248.149.214, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-09-01 14:27:49 |
| 60.29.188.134 | attack | 31.08.2019 23:42:28 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2019-09-01 14:26:39 |
| 59.148.43.97 | attackbotsspam | Invalid user admin from 59.148.43.97 port 48558 |
2019-09-01 14:43:44 |
| 93.153.83.115 | attack | Automatic report - Banned IP Access |
2019-09-01 14:39:40 |
| 42.157.128.188 | attackspam | $f2bV_matches |
2019-09-01 13:50:23 |
| 23.129.64.186 | attack | Sep 1 08:23:00 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2Sep 1 08:23:03 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2Sep 1 08:23:06 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2Sep 1 08:23:09 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2Sep 1 08:23:11 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2Sep 1 08:23:15 rotator sshd\[10559\]: Failed password for root from 23.129.64.186 port 51544 ssh2 ... |
2019-09-01 14:32:41 |
| 209.97.163.26 | attackspam | Sep 1 06:15:02 mail sshd\[8530\]: Failed password for invalid user mauro from 209.97.163.26 port 39750 ssh2 Sep 1 06:19:42 mail sshd\[9210\]: Invalid user studen from 209.97.163.26 port 44616 Sep 1 06:19:42 mail sshd\[9210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.163.26 Sep 1 06:19:44 mail sshd\[9210\]: Failed password for invalid user studen from 209.97.163.26 port 44616 ssh2 Sep 1 06:24:27 mail sshd\[9828\]: Invalid user ts3 from 209.97.163.26 port 49228 |
2019-09-01 14:13:09 |
| 61.183.35.44 | attackspam | Invalid user admin from 61.183.35.44 port 38868 |
2019-09-01 13:53:12 |
| 200.46.248.130 | attackspam | SSH-BruteForce |
2019-09-01 13:44:39 |
| 62.234.55.221 | attackbotsspam | fail2ban honeypot |
2019-09-01 13:55:35 |
| 193.47.72.15 | attack | Automatic report - Banned IP Access |
2019-09-01 14:09:25 |
| 177.39.112.18 | attackbotsspam | Aug 31 16:01:01 php1 sshd\[22961\]: Invalid user jswd from 177.39.112.18 Aug 31 16:01:01 php1 sshd\[22961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.112.18 Aug 31 16:01:04 php1 sshd\[22961\]: Failed password for invalid user jswd from 177.39.112.18 port 57082 ssh2 Aug 31 16:06:05 php1 sshd\[23407\]: Invalid user 123qwe from 177.39.112.18 Aug 31 16:06:05 php1 sshd\[23407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.112.18 |
2019-09-01 14:33:55 |
| 78.100.18.81 | attackbotsspam | Aug 31 18:50:27 lcprod sshd\[25025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81 user=root Aug 31 18:50:28 lcprod sshd\[25025\]: Failed password for root from 78.100.18.81 port 48172 ssh2 Aug 31 18:55:06 lcprod sshd\[25461\]: Invalid user mschwartz from 78.100.18.81 Aug 31 18:55:06 lcprod sshd\[25461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81 Aug 31 18:55:09 lcprod sshd\[25461\]: Failed password for invalid user mschwartz from 78.100.18.81 port 40326 ssh2 |
2019-09-01 14:24:05 |
| 221.194.137.28 | attackspambots | Sep 1 09:03:14 yabzik sshd[13356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28 Sep 1 09:03:17 yabzik sshd[13356]: Failed password for invalid user httpfs from 221.194.137.28 port 35148 ssh2 Sep 1 09:07:28 yabzik sshd[14972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.194.137.28 |
2019-09-01 14:10:51 |