City: Ternopil
Region: Ternopil'
Country: Ukraine
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.58.128.0 - 5.58.255.255'
% Abuse contact for '5.58.128.0 - 5.58.255.255' is 'noc@columbus.in.ua'
inetnum: 5.58.128.0 - 5.58.255.255
netname: UA-TE-COLUMBUS-PE
country: UA
geoloc: 49.566 25.6
admin-c: CN4593-RIPE
tech-c: CN4593-RIPE
abuse-c: CN4593-RIPE
status: ASSIGNED PA
mnt-by: MAXIMFS-MNT
created: 2024-02-22T12:05:16Z
last-modified: 2024-02-22T12:05:16Z
source: RIPE # Filtered
role: COLUMBUS NOC
address: Ukraine, Ternopil, Kyivska st. 2
nic-hdl: CN4593-RIPE
admin-c: MV14104-RIPE
tech-c: SMF-RIPE
tech-c: KG17779-RIPE
tech-c: MV14104-RIPE
abuse-mailbox: noc@columbus.in.ua
phone: +380 352 407407
mnt-by: MAXIMFS-MNT
created: 2019-05-17T12:46:32Z
last-modified: 2024-02-22T12:17:52Z
source: RIPE # Filtered
% Information related to '5.58.128.0/18AS16223'
route: 5.58.128.0/18
descr: ISP Columbus, More Specific Route
origin: AS16223
mnt-by: MAXIMFS-MNT
created: 2024-08-12T21:32:06Z
last-modified: 2024-08-12T21:32:06Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.58.188.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.58.188.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031501 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 11:32:33 CST 2026
;; MSG SIZE rcvd: 105
b'220.188.58.5.in-addr.arpa domain name pointer host-5-58-188-220.bitternet.ua.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.188.58.5.in-addr.arpa name = host-5-58-188-220.bitternet.ua.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 141.98.9.161 | attack | Jul 13 05:24:59 scw-tender-jepsen sshd[2460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 Jul 13 05:25:02 scw-tender-jepsen sshd[2460]: Failed password for invalid user admin from 141.98.9.161 port 34021 ssh2 |
2020-07-13 13:46:55 |
| 202.152.1.67 | attackspambots | (sshd) Failed SSH login from 202.152.1.67 (ID/Indonesia/gapura.idola.net.id): 5 in the last 3600 secs |
2020-07-13 13:46:08 |
| 111.229.103.67 | attackbotsspam | Jul 13 07:09:18 lnxmail61 sshd[31050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67 |
2020-07-13 13:39:17 |
| 159.65.84.164 | attackbotsspam | 2020-07-13T05:32:40.643412shield sshd\[29665\]: Invalid user news from 159.65.84.164 port 56596 2020-07-13T05:32:40.652735shield sshd\[29665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164 2020-07-13T05:32:42.205177shield sshd\[29665\]: Failed password for invalid user news from 159.65.84.164 port 56596 ssh2 2020-07-13T05:35:36.953796shield sshd\[29719\]: Invalid user mustafa from 159.65.84.164 port 51328 2020-07-13T05:35:36.962794shield sshd\[29719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164 |
2020-07-13 13:52:18 |
| 192.35.168.199 | attack | GET - / | Other - - |
2020-07-13 14:00:43 |
| 190.64.135.122 | attackspambots | Jul 12 23:54:56 mail sshd\[21985\]: Invalid user rustserver from 190.64.135.122 Jul 12 23:54:56 mail sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.135.122 ... |
2020-07-13 13:28:13 |
| 79.41.47.50 | attackspam | SSH invalid-user multiple login try |
2020-07-13 13:26:05 |
| 193.56.28.176 | attackbotsspam | SASL broute force |
2020-07-13 14:15:19 |
| 95.181.172.188 | attackspambots |
|
2020-07-13 14:24:27 |
| 111.229.136.177 | attackbotsspam | ssh brute force |
2020-07-13 14:21:46 |
| 185.39.11.105 | attackspam |
|
2020-07-13 14:13:51 |
| 51.77.137.211 | attack | Invalid user debian from 51.77.137.211 port 60492 |
2020-07-13 13:47:55 |
| 87.197.142.112 | attackspam | Jul 13 07:47:47 lnxmail61 sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.142.112 Jul 13 07:47:47 lnxmail61 sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.142.112 Jul 13 07:47:49 lnxmail61 sshd[4075]: Failed password for invalid user br from 87.197.142.112 port 57563 ssh2 |
2020-07-13 14:06:20 |
| 222.186.30.167 | attackbots | Jul 13 07:23:30 * sshd[30597]: Failed password for root from 222.186.30.167 port 16525 ssh2 |
2020-07-13 13:29:30 |
| 207.244.247.76 | attack | Port scan denied |
2020-07-13 14:28:41 |