City: Vilnius
Region: Vilnius
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.20.131.6 | attackspam | Nov 8 17:13:18 aragorn sshd[10228]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers Nov 8 17:15:31 aragorn sshd[11124]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers Nov 8 17:15:45 aragorn sshd[11129]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers Nov 8 17:38:14 aragorn sshd[14749]: Invalid user user1 from 5.20.131.6 ... |
2019-11-09 08:14:13 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.20.128.0 - 5.20.223.255'
% Abuse contact for '5.20.128.0 - 5.20.223.255' is 'abuse@cgates.lt'
inetnum: 5.20.128.0 - 5.20.223.255
netname: LT-CGATES
descr: Cgates, UAB
descr: Internet services
country: LT
admin-c: CG6399-RIPE
tech-c: CG6399-RIPE
status: ASSIGNED PA
mnt-by: CGATES-LT
mnt-lower: CGATES-LT
mnt-routes: CGATES-LT
org: ORG-UKRT1-RIPE
created: 2012-05-04T17:18:14Z
last-modified: 2012-05-04T17:18:14Z
source: RIPE
organisation: ORG-UKRT1-RIPE
org-name: UAB "Cgates"
country: LT
org-type: LIR
address: Ukmerges st. 120
address: LT-08105
address: Vilnius
address: LITHUANIA
phone: +37052150000
fax-no: +37052137799
admin-c: MS41406-RIPE
tech-c: CG6399-RIPE
abuse-c: CNA24-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: CGATES-LT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: CGATES-LT
created: 2004-04-17T11:37:12Z
last-modified: 2020-12-16T12:24:41Z
source: RIPE # Filtered
person: Cgates NOC
address: Cgates UAB
address: Ukmerges g. 120
address: LT-08105 Vilnius, Lithuania
phone: +370 5 215 0000
nic-hdl: CG6399-RIPE
mnt-by: CGATES-LT
created: 2012-05-03T07:42:59Z
last-modified: 2018-10-31T11:34:42Z
source: RIPE # Filtered
% Information related to '5.20.128.0/19AS21412'
route: 5.20.128.0/19
descr: CGATES-LT
origin: AS21412
mnt-by: CGATES-LT
created: 2012-05-04T17:33:47Z
last-modified: 2012-05-04T17:33:47Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.20.131.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.20.131.166. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 13:19:44 CST 2026
;; MSG SIZE rcvd: 105
166.131.20.5.in-addr.arpa domain name pointer data-131-166.cgates.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
166.131.20.5.in-addr.arpa name = data-131-166.cgates.lt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 18.224.72.113 | attackspam | Jul 25 01:00:15 host sshd\[19842\]: Invalid user oo from 18.224.72.113 port 54604 Jul 25 01:00:17 host sshd\[19842\]: Failed password for invalid user oo from 18.224.72.113 port 54604 ssh2 ... |
2019-07-25 07:22:04 |
| 61.162.214.126 | attackbotsspam | 61.162.214.126 - - [24/Jul/2019:18:35:34 +0200] "GET /plus/bookfeedback.php HTTP/1.1" 302 535 ... |
2019-07-25 07:15:05 |
| 189.135.198.242 | attackspam | Automatic report - Port Scan Attack |
2019-07-25 07:15:56 |
| 201.234.253.3 | attackspambots | Jul 24 10:34:02 mail postfix/postscreen[93611]: PREGREET 41 after 1.7 from [201.234.253.3]:56109: EHLO 201-234-253-3.static.impsat.net.ar ... |
2019-07-25 07:36:53 |
| 187.112.148.225 | attack | Automatic report - Port Scan Attack |
2019-07-25 07:37:29 |
| 41.41.77.39 | attackbotsspam | Automatic report - Port Scan Attack |
2019-07-25 07:28:22 |
| 210.176.100.37 | attack | Automatic report - Banned IP Access |
2019-07-25 07:23:57 |
| 185.176.26.101 | attackbots | Splunk® : port scan detected: Jul 24 18:53:42 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.176.26.101 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38198 PROTO=TCP SPT=41515 DPT=7079 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-07-25 07:07:31 |
| 112.85.42.182 | attackspambots | 2019-07-24T22:47:04.020705abusebot-3.cloudsearch.cf sshd\[7833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root |
2019-07-25 07:11:33 |
| 178.148.12.229 | attackspambots | Attack : GET /TP/public/index.php |
2019-07-25 07:38:31 |
| 198.108.67.104 | attackbots | " " |
2019-07-25 07:27:22 |
| 117.66.243.77 | attack | Feb 20 12:53:43 vtv3 sshd\[28811\]: Invalid user tomcat from 117.66.243.77 port 37634 Feb 20 12:53:43 vtv3 sshd\[28811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77 Feb 20 12:53:45 vtv3 sshd\[28811\]: Failed password for invalid user tomcat from 117.66.243.77 port 37634 ssh2 Feb 20 13:01:21 vtv3 sshd\[31245\]: Invalid user ftptest from 117.66.243.77 port 32917 Feb 20 13:01:21 vtv3 sshd\[31245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77 Feb 23 22:12:39 vtv3 sshd\[22953\]: Invalid user vagrant from 117.66.243.77 port 47868 Feb 23 22:12:39 vtv3 sshd\[22953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.66.243.77 Feb 23 22:12:41 vtv3 sshd\[22953\]: Failed password for invalid user vagrant from 117.66.243.77 port 47868 ssh2 Feb 23 22:17:55 vtv3 sshd\[24773\]: Invalid user test from 117.66.243.77 port 35849 Feb 23 22:17:55 vtv3 sshd\[24773\] |
2019-07-25 07:29:03 |
| 132.232.104.106 | attackspam | Jul 24 19:14:49 localhost sshd\[16894\]: Invalid user ayub from 132.232.104.106 Jul 24 19:14:49 localhost sshd\[16894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106 Jul 24 19:14:51 localhost sshd\[16894\]: Failed password for invalid user ayub from 132.232.104.106 port 50662 ssh2 Jul 24 19:21:24 localhost sshd\[17423\]: Invalid user gh from 132.232.104.106 Jul 24 19:21:24 localhost sshd\[17423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106 ... |
2019-07-25 07:14:02 |
| 185.175.93.18 | attack | firewall-block, port(s): 4923/tcp |
2019-07-25 07:31:11 |
| 23.238.115.210 | attackbots | Automatic report - Banned IP Access |
2019-07-25 07:15:26 |