City: unknown
Region: unknown
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '81.181.166.0 - 81.181.166.255'
% Abuse contact for '81.181.166.0 - 81.181.166.255' is 'abuse-acvile@rnc.ro'
inetnum: 81.181.166.0 - 81.181.166.255
netname: ACVILE-TECH
descr: Acvile Tech SRL
descr: Str. Augustin Coman, Nr. 8-10, Timisoara
country: RO
admin-c: ML24764-RIPE
tech-c: ML24764-RIPE
abuse-c: ACRO61208-RIPE
status: ASSIGNED PA
mnt-by: AS3233-MNT
created: 2024-06-20T14:12:14Z
last-modified: 2025-07-29T11:36:05Z
source: RIPE # Filtered
person: Marius Leustean
address: Acvile Tech SRL
address: Str. Augustin Coman, Nr. 8-10
address: 300647, Timisoara, Romania
phone: +40 725 388 347
nic-hdl: ML24764-RIPE
mnt-by: AS3233-MNT
created: 2024-06-20T14:10:44Z
last-modified: 2024-06-20T14:10:44Z
source: RIPE # Filtered
% Information related to '81.181.166.0/24AS48881'
route: 81.181.166.0/24
descr: Acvile Tech SRL
origin: AS48881
mnt-by: AS3233-MNT
created: 2024-06-20T14:53:44Z
last-modified: 2024-06-20T14:53:44Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.181.166.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.181.166.215. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 17:00:50 CST 2026
;; MSG SIZE rcvd: 107
Host 215.166.181.81.in-addr.arpa not found: 2(SERVFAIL)
server can't find 81.181.166.215.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 76.190.8.85 | attack | Aug 7 22:01:50 localhost sshd[3981877]: Connection closed by 76.190.8.85 port 49995 [preauth] ... |
2020-08-08 02:35:54 |
| 51.38.188.63 | attackspam | SSH invalid-user multiple login try |
2020-08-08 03:02:09 |
| 139.59.61.103 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-08-08 02:51:11 |
| 168.61.72.51 | attackspam | Aug 7 15:45:15 ns382633 sshd\[8126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root Aug 7 15:45:17 ns382633 sshd\[8126\]: Failed password for root from 168.61.72.51 port 45650 ssh2 Aug 7 16:11:12 ns382633 sshd\[13364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root Aug 7 16:11:14 ns382633 sshd\[13364\]: Failed password for root from 168.61.72.51 port 53620 ssh2 Aug 7 16:38:05 ns382633 sshd\[17955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root |
2020-08-08 02:48:28 |
| 184.154.189.91 | attack | trying to access non-authorized port |
2020-08-08 03:11:39 |
| 198.27.80.123 | attackspambots | 198.27.80.123 - - [07/Aug/2020:19:39:43 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 198.27.80.123 - - [07/Aug/2020:19:39:47 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 198.27.80.123 - - [07/Aug/2020:19:39:54 +0100] "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" ... |
2020-08-08 02:54:39 |
| 35.200.203.6 | attack | (sshd) Failed SSH login from 35.200.203.6 (IN/India/6.203.200.35.bc.googleusercontent.com): 5 in the last 3600 secs |
2020-08-08 02:42:14 |
| 41.69.229.141 | attackspambots | (sshd) Failed SSH login from 41.69.229.141 (EG/Egypt/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD |
2020-08-08 02:51:55 |
| 119.129.99.164 | attackbots | port 23 |
2020-08-08 03:01:18 |
| 125.209.67.163 | attackbotsspam | Unauthorized connection attempt from IP address 125.209.67.163 on Port 445(SMB) |
2020-08-08 02:57:24 |
| 78.142.29.199 | attackspam | Email login attempts - missing mail login name (IMAP) |
2020-08-08 02:33:21 |
| 164.90.150.157 | attack | Port Scan detected! ... |
2020-08-08 02:45:37 |
| 167.99.8.129 | attackspam | Unauthorized connection attempt detected from IP address 167.99.8.129 to port 7034 |
2020-08-08 03:11:58 |
| 79.216.184.153 | attackbots | Automatic report - Port Scan Attack |
2020-08-08 02:59:53 |
| 159.89.38.228 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-07T16:54:35Z and 2020-08-07T17:03:06Z |
2020-08-08 02:42:48 |