City: unknown
Region: unknown
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '80.94.92.0 - 80.94.92.255'
% Abuse contact for '80.94.92.0 - 80.94.92.255' is 'dmzhostabuse@gmail.com'
inetnum: 80.94.92.0 - 80.94.92.255
org: ORG-TSL73-RIPE
netname: DMZHOST
descr: https://dmzhost.co
country: NL
admin-c: AD18161-RIPE
tech-c: AD18161-RIPE
mnt-routes: TECHOFF-MNT
mnt-lower: TECHOFF-MNT
mnt-domains: TECHOFF-MNT
status: ASSIGNED PA
mnt-by: ro-btel2-1-mnt
mnt-by: TECHOFF-MNT
created: 2020-07-15T22:20:31Z
last-modified: 2024-11-21T09:38:42Z
source: RIPE
organisation: ORG-TSL73-RIPE
org-name: TECHOFF SRV LIMITED
country: GB
org-type: OTHER
address: 35 Firs Avenue, London N11 3NE
abuse-c: AD18161-RIPE
mnt-ref: TECHOFF-MNT
mnt-ref: MNT-NETERRA
mnt-by: TECHOFF-MNT
created: 2024-11-20T13:01:40Z
last-modified: 2024-11-26T15:22:33Z
source: RIPE # Filtered
role: ABUSE DEP
address: 35 Firs Avenue, London N11 3NE
abuse-mailbox: dmzhostabuse@gmail.com
nic-hdl: AD18161-RIPE
mnt-by: TECHOFF-MNT
created: 2024-11-20T13:00:28Z
last-modified: 2024-11-21T09:45:52Z
source: RIPE # Filtered
% Information related to '80.94.92.0/24AS35478'
route: 80.94.92.0/24
origin: AS35478
mnt-by: ro-btel2-1-mnt
created: 2020-07-31T19:36:59Z
last-modified: 2020-07-31T19:36:59Z
source: RIPE
% Information related to '80.94.92.0/24AS47890'
route: 80.94.92.0/24
origin: AS47890
mnt-by: UNMANAGED
mnt-by: ro-btel2-1-mnt
created: 2022-08-06T20:29:26Z
last-modified: 2022-08-06T20:29:26Z
source: RIPE
% Information related to '80.94.92.0/24AS48090'
route: 80.94.92.0/24
origin: AS48090
mnt-by: UNMANAGED
mnt-by: ro-btel2-1-mnt
created: 2021-03-30T10:00:28Z
last-modified: 2021-03-30T10:00:28Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.1 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.94.92.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.94.92.10. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 22:30:13 CST 2026
;; MSG SIZE rcvd: 104
Host 10.92.94.80.in-addr.arpa not found: 2(SERVFAIL)
server can't find 80.94.92.10.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.18.161.186 | attackspam | Oct 4 08:22:28 srv-ubuntu-dev3 sshd[81420]: Invalid user deployop from 218.18.161.186 Oct 4 08:22:28 srv-ubuntu-dev3 sshd[81420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.161.186 Oct 4 08:22:28 srv-ubuntu-dev3 sshd[81420]: Invalid user deployop from 218.18.161.186 Oct 4 08:22:30 srv-ubuntu-dev3 sshd[81420]: Failed password for invalid user deployop from 218.18.161.186 port 48557 ssh2 Oct 4 08:24:43 srv-ubuntu-dev3 sshd[81731]: Invalid user demo from 218.18.161.186 Oct 4 08:24:43 srv-ubuntu-dev3 sshd[81731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.161.186 Oct 4 08:24:43 srv-ubuntu-dev3 sshd[81731]: Invalid user demo from 218.18.161.186 Oct 4 08:24:45 srv-ubuntu-dev3 sshd[81731]: Failed password for invalid user demo from 218.18.161.186 port 38162 ssh2 Oct 4 08:26:50 srv-ubuntu-dev3 sshd[81947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru ... |
2020-10-04 20:36:28 |
| 27.128.173.81 | attack | Oct 4 12:58:41 lnxded64 sshd[8523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.173.81 |
2020-10-04 20:28:45 |
| 194.105.205.42 | attackbots | $f2bV_matches |
2020-10-04 20:11:36 |
| 191.188.70.30 | attackspambots | Oct 1 01:48:04 cumulus sshd[23947]: Invalid user mysql from 191.188.70.30 port 45734 Oct 1 01:48:04 cumulus sshd[23947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.188.70.30 Oct 1 01:48:06 cumulus sshd[23947]: Failed password for invalid user mysql from 191.188.70.30 port 45734 ssh2 Oct 1 01:48:07 cumulus sshd[23947]: Received disconnect from 191.188.70.30 port 45734:11: Bye Bye [preauth] Oct 1 01:48:07 cumulus sshd[23947]: Disconnected from 191.188.70.30 port 45734 [preauth] Oct 1 01:58:22 cumulus sshd[24523]: Invalid user mysql from 191.188.70.30 port 44916 Oct 1 01:58:22 cumulus sshd[24523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.188.70.30 Oct 1 01:58:24 cumulus sshd[24523]: Failed password for invalid user mysql from 191.188.70.30 port 44916 ssh2 Oct 1 01:58:25 cumulus sshd[24523]: Received disconnect from 191.188.70.30 port 44916:11: Bye Bye [preauth] Oct ........ ------------------------------- |
2020-10-04 20:34:58 |
| 109.226.125.124 | attackspambots | SMB Server BruteForce Attack |
2020-10-04 20:04:07 |
| 103.6.143.110 | attack | 20 attempts against mh-misbehave-ban on wood |
2020-10-04 20:24:08 |
| 38.102.28.1 | attackspam | Invalid user admin from 38.102.28.1 port 58486 |
2020-10-04 20:22:36 |
| 45.14.224.31 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-10-04 20:22:06 |
| 37.152.181.151 | attack | 2020-10-04T09:42:03.366242cyberdyne sshd[275868]: Failed password for invalid user dev2 from 37.152.181.151 port 46626 ssh2 2020-10-04T09:45:44.300492cyberdyne sshd[276790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.151 user=mysql 2020-10-04T09:45:46.445288cyberdyne sshd[276790]: Failed password for mysql from 37.152.181.151 port 44270 ssh2 2020-10-04T09:49:25.626619cyberdyne sshd[276897]: Invalid user xia from 37.152.181.151 port 41918 ... |
2020-10-04 20:15:55 |
| 122.194.229.37 | attackbotsspam | Oct 4 09:21:53 shivevps sshd[24365]: Failed password for root from 122.194.229.37 port 53542 ssh2 Oct 4 09:22:03 shivevps sshd[24365]: Failed password for root from 122.194.229.37 port 53542 ssh2 Oct 4 09:22:06 shivevps sshd[24365]: Failed password for root from 122.194.229.37 port 53542 ssh2 ... |
2020-10-04 20:26:17 |
| 222.186.42.213 | attack | 2020-10-04T14:22:46.423614vps773228.ovh.net sshd[14368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root 2020-10-04T14:22:48.147345vps773228.ovh.net sshd[14368]: Failed password for root from 222.186.42.213 port 43369 ssh2 2020-10-04T14:22:46.423614vps773228.ovh.net sshd[14368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root 2020-10-04T14:22:48.147345vps773228.ovh.net sshd[14368]: Failed password for root from 222.186.42.213 port 43369 ssh2 2020-10-04T14:22:50.960334vps773228.ovh.net sshd[14368]: Failed password for root from 222.186.42.213 port 43369 ssh2 ... |
2020-10-04 20:23:40 |
| 51.68.194.42 | attack | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-10-04 20:40:18 |
| 78.128.113.121 | attackspam | 2020-10-04 14:26:50 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data \(set_id=73568237@yt.gl\) 2020-10-04 14:26:57 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-04 14:27:06 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-04 14:27:10 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-04 14:27:22 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data ... |
2020-10-04 20:31:55 |
| 109.80.128.210 | attackspambots | $f2bV_matches |
2020-10-04 20:00:43 |
| 157.245.33.74 | attackspambots | $f2bV_matches |
2020-10-04 20:39:12 |