City: Hook
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '82.108.92.0 - 82.108.95.255'
% Abuse contact for '82.108.92.0 - 82.108.95.255' is 'abuse@gtt.net'
inetnum: 82.108.92.0 - 82.108.95.255
netname: LT-CODE200-GTT
country: GB
admin-c: ET6133-RIPE
tech-c: JC12505-RIPE
status: SUB-ALLOCATED PA
mnt-by: AS3257-IPAM-MNT
mnt-by: mnt-lt-code200-1
created: 2026-03-17T10:09:06Z
last-modified: 2026-03-17T10:09:06Z
source: RIPE
person: Egle Trumpulyte
address: Gostauto 40A, Vilnius, Lithuania
phone: +370 691 31338
nic-hdl: ET6133-RIPE
mnt-by: AS3257-IPAM-MNT
created: 2025-05-15T07:37:36Z
last-modified: 2025-05-15T07:37:36Z
source: RIPE # Filtered
person: Julius Cicenas
address: Gostauto 40A, Vilnius, Lithuania
phone: +370 5 207-8174
nic-hdl: JC12505-RIPE
mnt-by: AS3257-IPAM-MNT
created: 2025-05-15T07:38:53Z
last-modified: 2025-05-15T07:38:53Z
source: RIPE # Filtered
% Information related to '82.108.92.0/22AS2856'
route: 82.108.92.0/22
origin: AS2856
created: 2026-03-26T14:29:53Z
last-modified: 2026-03-26T14:29:53Z
source: RIPE
mnt-by: AS3257-IPAM-MNT
% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.108.93.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.108.93.82. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 16:49:23 CST 2026
;; MSG SIZE rcvd: 105
b'Host 82.93.108.82.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 82.108.93.82.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.33.207.126 | attack | Unauthorized connection attempt from IP address 157.33.207.126 on Port 445(SMB) |
2020-06-26 07:58:52 |
| 188.19.191.9 | attack | 23/tcp [2020-06-25]1pkt |
2020-06-26 08:14:49 |
| 79.124.62.66 | attack | Jun 26 01:28:42 debian-2gb-nbg1-2 kernel: \[15386381.763435\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=26940 PROTO=TCP SPT=44604 DPT=3383 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-26 08:16:38 |
| 52.42.2.56 | attack | Brute force VPN server |
2020-06-26 08:00:31 |
| 78.134.99.105 | attackspam | Jun 25 23:06:10 abendstille sshd\[30837\]: Invalid user qxn from 78.134.99.105 Jun 25 23:06:10 abendstille sshd\[30837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.134.99.105 Jun 25 23:06:12 abendstille sshd\[30837\]: Failed password for invalid user qxn from 78.134.99.105 port 52864 ssh2 Jun 25 23:06:35 abendstille sshd\[31306\]: Invalid user manuel from 78.134.99.105 Jun 25 23:06:35 abendstille sshd\[31306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.134.99.105 ... |
2020-06-26 08:46:47 |
| 203.195.175.47 | attackspam | Unauthorized access to SSH at 25/Jun/2020:21:39:52 +0000. |
2020-06-26 07:57:37 |
| 122.152.208.242 | attack | Ssh brute force |
2020-06-26 08:11:07 |
| 153.180.22.175 | attackbotsspam | 20/6/25@16:45:06: FAIL: Alarm-Intrusion address from=153.180.22.175 ... |
2020-06-26 08:19:55 |
| 54.38.158.17 | attack | SSH Honeypot -> SSH Bruteforce / Login |
2020-06-26 08:26:24 |
| 40.123.48.71 | attack | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-06-26 08:34:36 |
| 54.37.163.11 | attackspambots | 2020-06-25T23:07:17.375299shield sshd\[6148\]: Invalid user wangfeng from 54.37.163.11 port 53060 2020-06-25T23:07:17.378891shield sshd\[6148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip11.ip-54-37-163.eu 2020-06-25T23:07:19.563089shield sshd\[6148\]: Failed password for invalid user wangfeng from 54.37.163.11 port 53060 ssh2 2020-06-25T23:09:08.782715shield sshd\[6445\]: Invalid user h from 54.37.163.11 port 57386 2020-06-25T23:09:08.786515shield sshd\[6445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip11.ip-54-37-163.eu |
2020-06-26 08:26:50 |
| 45.4.189.33 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-06-26 08:02:22 |
| 37.209.192.2 | attackspambots | Auto report: unwanted ports scan |
2020-06-26 08:27:04 |
| 52.155.104.217 | attack | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-06-26 08:40:06 |
| 47.88.10.104 | attackspam | Port scan on 1 port(s): 53 |
2020-06-26 08:08:30 |