City: unknown
Region: unknown
Country: Iran
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '81.30.98.0 - 81.30.98.255'
% Abuse contact for '81.30.98.0 - 81.30.98.255' is 'olatunji8221@gmail.com'
inetnum: 81.30.98.0 - 81.30.98.255
netname: IR-LORDVPS11-20240618
country: US
abuse-c: ACRO58704-RIPE
admin-c: ACRO58704-RIPE
org: ORG-AOSP11-RIPE
admin-c: CA10919-RIPE
tech-c: CA10919-RIPE
status: ALLOCATED PA
mnt-by: wcd
mnt-by: RIPE-NCC-HM-MNT
created: 2024-06-18T11:08:04Z
last-modified: 2026-05-03T13:15:11Z
source: RIPE
organisation: ORG-AOSP11-RIPE
org-name: Atis Omran Sevin PSJ
country: IR
org-type: LIR
address: Unit7 Negin Mall No.1,Shahid Nadieh Khavari West166
address: 1653995417
address: tehran
address: IRAN, ISLAMIC REPUBLIC OF
phone: +982193119000
reg-nr: 14006880966 // 511818
admin-c: CA10919-RIPE
tech-c: CA10919-RIPE
abuse-c: AR69756-RIPE
mnt-ref: wcd
mnt-by: RIPE-NCC-HM-MNT
mnt-by: wcd
created: 2023-01-25T10:15:10Z
last-modified: 2026-04-29T05:05:23Z
source: RIPE # Filtered
role: Abuse contact role object
abuse-mailbox: olatunji8221@gmail.com
address: Khreshhatik St., 14D, Kyiv, UA
nic-hdl: ACRO58704-RIPE
mnt-by: researchnoc-mnt
created: 2024-12-21T13:09:32Z
last-modified: 2026-01-20T19:34:50Z
source: RIPE # Filtered
role: ceo
address: IRAN, ISLAMIC REPUBLIC OF
address: tehran
address: 1653995417
address: Unit7 Negin Mall No.1,Shahid Nadieh Khavari West166
phone: +982193119000
nic-hdl: CA10919-RIPE
mnt-by: wcd
created: 2023-01-25T10:15:09Z
last-modified: 2023-01-25T10:15:09Z
source: RIPE # Filtered
% Information related to '81.30.98.0/24AS209425'
route: 81.30.98.0/24
origin: AS209425
created: 2026-04-21T14:21:53Z
last-modified: 2026-04-21T14:21:53Z
source: RIPE
mnt-by: wcd
% Information related to '81.30.98.0/24AS215930'
route: 81.30.98.0/24
origin: AS215930
created: 2026-04-21T14:22:19Z
last-modified: 2026-04-21T14:22:19Z
source: RIPE
mnt-by: wcd
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.30.98.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.30.98.72. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050600 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 18:04:16 CST 2026
;; MSG SIZE rcvd: 104
Host 72.98.30.81.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 72.98.30.81.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.220.224 | attackbotsspam | GET /wp-json/wp/v2/users/ |
2019-12-26 23:52:17 |
| 51.83.234.51 | attackbotsspam | $f2bV_matches |
2019-12-26 23:29:05 |
| 198.27.80.123 | attackspam | //admin/images/cal_date_over.gif /wp-login.php //templates/system/css/system.css |
2019-12-26 23:47:47 |
| 45.40.204.206 | attackbots | $f2bV_matches |
2019-12-26 23:44:47 |
| 51.68.47.170 | attack | $f2bV_matches |
2019-12-26 23:32:14 |
| 205.185.117.232 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-26 23:30:53 |
| 183.99.77.180 | attack | GET /news/wp-login.php |
2019-12-26 23:51:36 |
| 178.128.154.236 | attackspambots | GET /backup/wp-login.php |
2019-12-26 23:52:29 |
| 198.12.156.214 | attackbotsspam | GET /web/wp-login.php |
2019-12-26 23:48:17 |
| 183.81.120.235 | attack | 1577372060 - 12/26/2019 15:54:20 Host: 183.81.120.235/183.81.120.235 Port: 445 TCP Blocked |
2019-12-26 23:21:21 |
| 198.71.239.17 | attackbotsspam | POST /xmlrpc.php. Part of botnet attack -- 34 POST requests from 19 different IP addresses. |
2019-12-26 23:47:27 |
| 49.88.112.63 | attackspambots | Dec 26 15:20:36 zeus sshd[1331]: Failed password for root from 49.88.112.63 port 4822 ssh2 Dec 26 15:20:41 zeus sshd[1331]: Failed password for root from 49.88.112.63 port 4822 ssh2 Dec 26 15:20:45 zeus sshd[1331]: Failed password for root from 49.88.112.63 port 4822 ssh2 Dec 26 15:20:50 zeus sshd[1331]: Failed password for root from 49.88.112.63 port 4822 ssh2 Dec 26 15:20:54 zeus sshd[1331]: Failed password for root from 49.88.112.63 port 4822 ssh2 |
2019-12-26 23:37:48 |
| 180.167.16.82 | attack | Dec 23 04:07:08 nxxxxxxx sshd[31867]: refused connect from 180.167.16.82 (18= 0.167.16.82) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=180.167.16.82 |
2019-12-26 23:25:08 |
| 41.32.223.122 | attackbots | Dec 26 14:53:56 ms-srv sshd[40021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.32.223.122 Dec 26 14:53:58 ms-srv sshd[40021]: Failed password for invalid user supervisor from 41.32.223.122 port 63890 ssh2 |
2019-12-26 23:43:21 |
| 188.213.49.210 | attackbots | PHI,WP GET /wp-login.php |
2019-12-26 23:49:57 |