City: Vantaa
Region: Uusimaa [Finnish] / Nyland [Swedish]
Country: Finland
Internet Service Provider: DNA
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '62.197.160.0 - 62.197.191.255'
% Abuse contact for '62.197.160.0 - 62.197.191.255' is 'abuse@dnaip.fi'
inetnum: 62.197.160.0 - 62.197.191.255
netname: FI-DNA-20020320
country: FI
org: ORG-FNL1-RIPE
admin-c: DNAR-RIPE
tech-c: DNAR-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: FI2G-MNT
mnt-lower: FI2G-MNT
mnt-routes: FI2G-MNT
created: 2002-03-20T09:59:42Z
last-modified: 2016-07-14T13:24:14Z
source: RIPE # Filtered
organisation: ORG-FNL1-RIPE
org-name: DNA Oyj
country: FI
org-type: LIR
address: P.O. BOX 10
address: FI-01044 DNA
address: Helsinki
address: FINLAND
phone: +358440440
fax-no: +358290996292
admin-c: DNA999-RIPE
abuse-c: DNAR-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: FI2G-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: FI2G-MNT
created: 2004-04-17T11:20:32Z
last-modified: 2020-12-16T13:18:15Z
source: RIPE # Filtered
role: DNA Registry
address: DNA Oyj
address: PL 10
address: 01044 DNA
address: Finland
admin-c: DNA999-RIPE
tech-c: DNA999-RIPE
nic-hdl: DNAR-RIPE
abuse-mailbox: abuse@dnaip.fi
mnt-by: FI2G-MNT
created: 2008-01-21T13:04:15Z
last-modified: 2016-12-09T09:13:24Z
source: RIPE # Filtered
% Information related to '62.197.160.0/19AS16086'
route: 62.197.160.0/19
descr: DNA Oy
origin: AS16086
mnt-by: FI2G-MNT
created: 2002-03-21T18:10:40Z
last-modified: 2011-01-12T08:28:54Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.197.169.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;62.197.169.166. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032900 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 18:21:24 CST 2026
;; MSG SIZE rcvd: 107
166.169.197.62.in-addr.arpa domain name pointer 62-197-169-166.rev.dnainternet.fi.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
166.169.197.62.in-addr.arpa name = 62-197-169-166.rev.dnainternet.fi.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 140.143.200.251 | attack | Dec 27 20:59:40 web9 sshd\[11564\]: Invalid user server from 140.143.200.251 Dec 27 20:59:40 web9 sshd\[11564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251 Dec 27 20:59:42 web9 sshd\[11564\]: Failed password for invalid user server from 140.143.200.251 port 38132 ssh2 Dec 27 21:03:56 web9 sshd\[12212\]: Invalid user hauen from 140.143.200.251 Dec 27 21:03:56 web9 sshd\[12212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251 |
2019-12-28 22:11:46 |
| 138.68.242.220 | attack | Dec 28 15:11:18 MK-Soft-Root1 sshd[3397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220 Dec 28 15:11:20 MK-Soft-Root1 sshd[3397]: Failed password for invalid user nadim from 138.68.242.220 port 59990 ssh2 ... |
2019-12-28 22:15:02 |
| 146.0.16.55 | attack | Hits on port : 445 |
2019-12-28 22:30:26 |
| 145.255.28.122 | attackbotsspam | 145.255.28.122 - - [28/Dec/2019:09:31:00 -0500] "GET /?page=../../../../../../../../../etc/passwd%00&action=view& HTTP/1.1" 200 17545 "https://ccbrass.com/?page=../../../../../../../../../etc/passwd%00&action=view&" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-12-28 22:38:19 |
| 45.136.108.124 | attackbotsspam | Dec 28 15:30:57 debian-2gb-nbg1-2 kernel: \[1196174.844414\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.124 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=59561 PROTO=TCP SPT=59102 DPT=7902 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-28 22:41:08 |
| 121.229.25.154 | attackspambots | Dec 28 09:58:41 MK-Soft-VM5 sshd[14725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.25.154 Dec 28 09:58:42 MK-Soft-VM5 sshd[14725]: Failed password for invalid user server from 121.229.25.154 port 36354 ssh2 ... |
2019-12-28 22:20:53 |
| 217.20.183.149 | attackspambots | Dec 28 15:30:29 |
2019-12-28 22:36:09 |
| 117.58.243.84 | attackbots | Dec 28 10:12:57 zeus sshd[20062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.58.243.84 Dec 28 10:13:00 zeus sshd[20062]: Failed password for invalid user debarros from 117.58.243.84 port 46124 ssh2 Dec 28 10:15:18 zeus sshd[20167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.58.243.84 Dec 28 10:15:20 zeus sshd[20167]: Failed password for invalid user allenaa from 117.58.243.84 port 37890 ssh2 |
2019-12-28 22:24:58 |
| 123.166.133.150 | attackspambots | Scanning |
2019-12-28 22:17:43 |
| 78.131.56.62 | attack | Invalid user server from 78.131.56.62 port 54572 |
2019-12-28 22:16:25 |
| 113.189.226.29 | attackspambots | 1577513973 - 12/28/2019 07:19:33 Host: 113.189.226.29/113.189.226.29 Port: 445 TCP Blocked |
2019-12-28 22:08:50 |
| 103.103.128.61 | attackbots | $f2bV_matches |
2019-12-28 22:14:26 |
| 54.37.155.165 | attackspambots | Dec 28 11:27:50 sshgateway sshd\[2545\]: Invalid user rcs from 54.37.155.165 Dec 28 11:27:50 sshgateway sshd\[2545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.ip-54-37-155.eu Dec 28 11:27:52 sshgateway sshd\[2545\]: Failed password for invalid user rcs from 54.37.155.165 port 33160 ssh2 |
2019-12-28 22:24:33 |
| 211.26.187.128 | attackbotsspam | Dec 28 15:31:04 host sshd[60424]: Invalid user velda from 211.26.187.128 port 60940 ... |
2019-12-28 22:34:52 |
| 188.36.7.7 | attackspambots | Hits on port : 8000 |
2019-12-28 22:28:45 |