City: Katowice
Region: Slaskie
Country: Poland
Internet Service Provider: Orange
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '83.22.0.0 - 83.22.255.255'
% Abuse contact for '83.22.0.0 - 83.22.255.255' is 'cert.opl@orange.com'
inetnum: 83.22.0.0 - 83.22.255.255
netname: Orange-Swiatlowod
descr: Orange Swiatlowod
country: PL
remarks: ! - ! - ! - ! - ! - !
remarks: Contact to ABUSE
remarks: cert.opl@orange.com
remarks: ! - ! - ! - ! - ! - !
admin-c: TPHT
tech-c: TPHT
status: ASSIGNED PA
mnt-by: TPNET
created: 2019-11-15T08:14:43Z
last-modified: 2019-11-15T08:14:43Z
source: RIPE
role: TP S.A. Hostmaster
address: Orange Polska S.A.
address: ul. Nowogrodzka 47A
address: 00-695 Warszawa
address: Poland
phone: +48 800 120810
phone: +48 801 600006
phone: +48 22 5039000
fax-no: +48 22 6225182
org: ORG-PT1-RIPE
admin-c: MW12071-RIPE
tech-c: KP21-RIPE
nic-hdl: TPHT
mnt-by: TPNET
abuse-mailbox: cert.opl@orange.com
address: hostmaster@tpnet.pl 20130506
created: 2003-01-28T07:54:15Z
last-modified: 2026-01-16T10:00:24Z
source: RIPE # Filtered
% Information related to '83.16.0.0/13AS5617'
route: 83.16.0.0/13
descr: TPNET
descr: for abuse: abuse@tpnet.pl
origin: AS5617
mnt-by: AS5617-MNT
created: 2006-12-19T13:53:21Z
last-modified: 2006-12-19T13:53:21Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.22.204.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;83.22.204.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 06:08:26 CST 2026
;; MSG SIZE rcvd: 105
14.204.22.83.in-addr.arpa domain name pointer 83.22.204.14.ipv4.supernova.orange.pl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.204.22.83.in-addr.arpa name = 83.22.204.14.ipv4.supernova.orange.pl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 191.243.40.44 | attackspambots | 1583923310 - 03/11/2020 17:41:50 Host: 44.40.243.191.in-addr.arpa/191.243.40.44 Port: 23 TCP Blocked ... |
2020-03-12 01:22:31 |
| 37.228.116.216 | attack | Mar 10 19:46:41 server6 sshd[21627]: Failed password for r.r from 37.228.116.216 port 45674 ssh2 Mar 10 19:46:41 server6 sshd[21627]: Received disconnect from 37.228.116.216: 11: Bye Bye [preauth] Mar 10 19:57:32 server6 sshd[31591]: Failed password for r.r from 37.228.116.216 port 59696 ssh2 Mar 10 19:57:32 server6 sshd[31591]: Received disconnect from 37.228.116.216: 11: Bye Bye [preauth] Mar 10 20:02:02 server6 sshd[4308]: Failed password for r.r from 37.228.116.216 port 52376 ssh2 Mar 10 20:02:02 server6 sshd[4308]: Received disconnect from 37.228.116.216: 11: Bye Bye [preauth] Mar 10 20:06:28 server6 sshd[8862]: Failed password for r.r from 37.228.116.216 port 45058 ssh2 Mar 10 20:06:28 server6 sshd[8862]: Received disconnect from 37.228.116.216: 11: Bye Bye [preauth] Mar 10 20:12:45 server6 sshd[14316]: Failed password for r.r from 37.228.116.216 port 37740 ssh2 Mar 10 20:12:45 server6 sshd[14316]: Received disconnect from 37.228.116.216: 11: Bye Bye [preauth] Mar........ ------------------------------- |
2020-03-12 01:14:13 |
| 165.22.215.114 | attackspam | 2020-03-11T16:39:06.573110shield sshd\[29624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.215.114 user=root 2020-03-11T16:39:08.821452shield sshd\[29624\]: Failed password for root from 165.22.215.114 port 37684 ssh2 2020-03-11T16:42:32.462026shield sshd\[30046\]: Invalid user qwert from 165.22.215.114 port 37298 2020-03-11T16:42:32.470843shield sshd\[30046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.215.114 2020-03-11T16:42:34.332726shield sshd\[30046\]: Failed password for invalid user qwert from 165.22.215.114 port 37298 ssh2 |
2020-03-12 00:53:32 |
| 179.191.52.190 | attackspambots | Lines containing failures of 179.191.52.190 Mar 11 11:35:16 kvm05 sshd[11626]: error: maximum authentication attempts exceeded for r.r from 179.191.52.190 port 60505 ssh2 [preauth] Mar 11 11:35:16 kvm05 sshd[11626]: Disconnecting authenticating user r.r 179.191.52.190 port 60505: Too many authentication failures [preauth] Mar 11 11:35:26 kvm05 sshd[11686]: error: maximum authentication attempts exceeded for r.r from 179.191.52.190 port 60511 ssh2 [preauth] Mar 11 11:35:26 kvm05 sshd[11686]: Disconnecting authenticating user r.r 179.191.52.190 port 60511: Too many authentication failures [preauth] Mar 11 11:35:36 kvm05 sshd[11730]: Received disconnect from 179.191.52.190 port 60520:11: disconnected by user [preauth] Mar 11 11:35:36 kvm05 sshd[11730]: Disconnected from authenticating user r.r 179.191.52.190 port 60520 [preauth] Mar 11 11:35:45 kvm05 sshd[11785]: Invalid user admin from 179.191.52.190 port 60526 Mar 11 11:35:46 kvm05 sshd[11785]: error: maximum authenticati........ ------------------------------ |
2020-03-12 01:16:32 |
| 39.36.53.89 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-12 00:56:05 |
| 171.237.188.76 | attackspam | Mar 11 11:42:14 vmd48417 sshd[12831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.237.188.76 |
2020-03-12 00:56:34 |
| 139.99.84.85 | attack | Mar 11 11:35:30 meumeu sshd[3233]: Failed password for root from 139.99.84.85 port 53908 ssh2 Mar 11 11:37:55 meumeu sshd[3846]: Failed password for root from 139.99.84.85 port 34394 ssh2 ... |
2020-03-12 01:28:25 |
| 118.24.117.47 | attackbots | Invalid user www from 118.24.117.47 port 58862 |
2020-03-12 00:53:08 |
| 203.150.123.59 | attack | SSH login attempts. |
2020-03-12 01:27:24 |
| 188.2.180.117 | attack | CMS (WordPress or Joomla) login attempt. |
2020-03-12 00:49:23 |
| 199.35.74.89 | attackbotsspam | Scan detected 2020.03.11 11:42:09 blocked until 2020.04.05 09:13:32 |
2020-03-12 01:07:28 |
| 156.218.89.118 | attack | 2020-03-11 11:36:22 plain_virtual_exim authenticator failed for ([127.0.0.1]) [156.218.89.118]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=156.218.89.118 |
2020-03-12 01:26:42 |
| 110.191.210.70 | attack | Mar 11 13:27:47 ns382633 sshd\[23137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.191.210.70 user=root Mar 11 13:27:49 ns382633 sshd\[23137\]: Failed password for root from 110.191.210.70 port 38684 ssh2 Mar 11 13:39:24 ns382633 sshd\[25156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.191.210.70 user=root Mar 11 13:39:26 ns382633 sshd\[25156\]: Failed password for root from 110.191.210.70 port 34968 ssh2 Mar 11 13:41:39 ns382633 sshd\[25824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.191.210.70 user=root |
2020-03-12 00:59:20 |
| 118.25.101.161 | attack | SSH login attempts. |
2020-03-12 01:32:43 |
| 51.75.16.119 | attackspambots | 2020-03-11T10:42:20Z - RDP login failed multiple times. (51.75.16.119) |
2020-03-12 00:50:01 |