City: Saint Petersburg
Region: St. Petersburg
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '79.134.196.144 - 79.134.196.151'
% Abuse contact for '79.134.196.144 - 79.134.196.151' is 'abuse@obit.ru'
inetnum: 79.134.196.144 - 79.134.196.151
netname: MPOINT-LAN
descr: MPOINT network
descr: Obit Telecommunications
descr: St.Petersburg
country: RU
admin-c: DG2069-RIPE
tech-c: NOC2222-RIPE
status: ASSIGNED PA
mnt-by: OBIT-MNT
created: 2014-04-15T17:12:22Z
last-modified: 2014-04-15T17:12:22Z
source: RIPE
role: Network Coordination Centre
address: Obit Telecommunications Ltd.
address: Ligovsky pr., 13-15
address: 191014, Russia, St.Petersburg
phone: +78126220003
fax-no: +78126220001
remarks: trouble: -------------------------------------------------
remarks: trouble: noc@obit.ru - for peering/backbone issues
remarks: trouble: abuse@obit.ru - for security, spam issues
remarks: trouble: -------------------------------------------------
admin-c: DG2069-RIPE
tech-c: DG2069-RIPE
nic-hdl: NOC2222-RIPE
mnt-by: OBIT-MNT
created: 2005-01-27T07:17:19Z
last-modified: 2023-06-06T08:31:36Z
source: RIPE # Filtered
abuse-mailbox: abuse@obit.ru
person: Dmitri Gorislavski
address: Ligovsky pr., 13-15
address: 191014, Russia, St.Petersburg
phone: +78126220000
fax-no: +78126220001
nic-hdl: DG2069-RIPE
mnt-by: OBIT-MNT
created: 2005-01-26T12:08:36Z
last-modified: 2014-04-29T10:39:25Z
source: RIPE # Filtered
% Information related to '79.134.196.0/24AS8492'
route: 79.134.196.0/24
descr: Obit-Telecommunications Ltd.
descr: St.Petersburg
origin: AS8492
org: ORG-OL12-RIPE
mnt-by: OBIT-MNT
created: 2014-11-07T06:55:02Z
last-modified: 2014-11-07T06:55:02Z
source: RIPE # Filtered
organisation: ORG-OL12-RIPE
org-name: "OBIT" Ltd.
country: RU
org-type: LIR
address: Ligovsky pr., 13-15
address: 191014
address: ST PETERSBURG
address: RUSSIAN FEDERATION
phone: +78126220003
fax-no: +78126220001
admin-c: DG2069-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: OBIT-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: OBIT-MNT
abuse-c: NOC2222-RIPE
created: 2005-01-26T06:11:21Z
last-modified: 2025-11-27T17:50:38Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.134.196.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;79.134.196.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 16:41:59 CST 2026
;; MSG SIZE rcvd: 107
146.196.134.79.in-addr.arpa domain name pointer 79-134-196-146.obit.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
146.196.134.79.in-addr.arpa name = 79-134-196-146.obit.ru.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 120.53.9.100 | attackbots | May 2 10:24:07 haigwepa sshd[25820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.9.100 May 2 10:24:09 haigwepa sshd[25820]: Failed password for invalid user test from 120.53.9.100 port 35546 ssh2 ... |
2020-05-02 19:29:49 |
| 223.83.138.104 | attackbots | May 2 12:24:36 vps58358 sshd\[28054\]: Invalid user admin from 223.83.138.104May 2 12:24:38 vps58358 sshd\[28054\]: Failed password for invalid user admin from 223.83.138.104 port 44552 ssh2May 2 12:29:08 vps58358 sshd\[28146\]: Invalid user annie from 223.83.138.104May 2 12:29:10 vps58358 sshd\[28146\]: Failed password for invalid user annie from 223.83.138.104 port 41524 ssh2May 2 12:34:23 vps58358 sshd\[28251\]: Invalid user postgres from 223.83.138.104May 2 12:34:25 vps58358 sshd\[28251\]: Failed password for invalid user postgres from 223.83.138.104 port 38504 ssh2 ... |
2020-05-02 19:45:07 |
| 111.229.207.104 | attackbots | 2020-05-01 UTC: (2x) - nproc,root |
2020-05-02 19:46:37 |
| 14.167.234.82 | attackspambots | 2020-05-0205:46:551jUj78-0008IT-Ld\<=info@whatsup2013.chH=\(localhost\)[113.172.169.128]:53200P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3216id=8c6ec9c0cbe035c6e51bedbeb561587457bd07b235@whatsup2013.chT="Iamjustcrazyaboutyou"forkylemullins9796@gmail.comterrymendietta5@gmail.com2020-05-0205:44:201jUj4c-0008AY-Ex\<=info@whatsup2013.chH=\(localhost\)[113.173.53.163]:38213P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3144id=82e254070c270d05999c2a866195bfa3fe544a@whatsup2013.chT="I'mexcitedaboutyou"forhemjak1414@gmail.comghettodiego05@gmail.com2020-05-0205:43:571jUj4G-00088N-Sd\<=info@whatsup2013.chH=\(localhost\)[14.167.234.82]:48510P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3141id=8001b7e4efc4eee67a7fc96582765c407a8e63@whatsup2013.chT="Flymetothemoon"forvenuvallabha44@gmail.comdannyhicks1968dh@gmail.com2020-05-0205:43:431jUj43-00087R-6h\<=info@whatsup2013.chH=\(local |
2020-05-02 19:55:20 |
| 167.249.168.102 | attack | May 2 10:49:53 gw1 sshd[31250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.249.168.102 May 2 10:49:55 gw1 sshd[31250]: Failed password for invalid user m from 167.249.168.102 port 1311 ssh2 ... |
2020-05-02 19:31:28 |
| 197.248.0.222 | attackspambots | 21 attempts against mh-ssh on echoip |
2020-05-02 19:56:58 |
| 111.67.204.182 | attack | May 2 13:20:41 ns381471 sshd[5795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.204.182 May 2 13:20:44 ns381471 sshd[5795]: Failed password for invalid user cd from 111.67.204.182 port 53924 ssh2 |
2020-05-02 19:42:28 |
| 77.27.39.51 | attackspam | <6 unauthorized SSH connections |
2020-05-02 19:43:49 |
| 118.25.55.180 | attackbotsspam | Fail2Ban Ban Triggered |
2020-05-02 19:51:26 |
| 79.137.34.248 | attackbotsspam | 2020-05-02T07:54:20.2914711240 sshd\[1768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248 user=root 2020-05-02T07:54:22.4854651240 sshd\[1768\]: Failed password for root from 79.137.34.248 port 57491 ssh2 2020-05-02T08:02:44.7412201240 sshd\[2152\]: Invalid user admin from 79.137.34.248 port 60517 2020-05-02T08:02:44.7449971240 sshd\[2152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248 ... |
2020-05-02 19:24:18 |
| 212.33.240.140 | attack | email spam |
2020-05-02 20:00:01 |
| 213.180.142.166 | attackspambots | PORN SPAM ! |
2020-05-02 19:33:23 |
| 192.99.9.25 | attackspam | 20 attempts against mh-misbehave-ban on twig |
2020-05-02 20:02:14 |
| 111.67.197.82 | attack | 2020-05-02T05:33:02.741220linuxbox-skyline sshd[115441]: Invalid user jorge from 111.67.197.82 port 36288 ... |
2020-05-02 19:42:54 |
| 51.38.69.227 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2020-05-02 19:51:01 |