City: unknown
Region: unknown
Country: United Arab Emirates
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '83.97.96.0 - 83.97.103.255'
% Abuse contact for '83.97.96.0 - 83.97.103.255' is 'contact@zagravatrading.com'
inetnum: 83.97.96.0 - 83.97.103.255
netname: AE-ARAVIA-FINTECH-20040325
country: AE
descr: -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
org: ORG-NKTA3-RIPE
admin-c: AA42646-RIPE
tech-c: AA42646-RIPE
status: ALLOCATED PA
mnt-by: lir-ae-aravia-fintech-1-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2024-01-29T14:56:09Z
last-modified: 2024-01-29T18:41:12Z
source: RIPE
organisation: ORG-NKTA3-RIPE
org-name: Nikita Karpov trading as ARAVIA-FINTECH-ANALYSIS-SERVICES
country: AE
org-type: LIR
address: Royal Class Business Centre, Floor 19, Business Bay
address: 00000
address: Dubai
address: UNITED ARAB EMIRATES
phone: +971506259582
admin-c: AA42646-RIPE
tech-c: AA42646-RIPE
abuse-c: AR73971-RIPE
mnt-ref: lir-ae-aravia-fintech-1-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-ae-aravia-fintech-1-MNT
created: 2024-01-26T13:10:25Z
last-modified: 2025-01-28T18:51:42Z
source: RIPE # Filtered
role: admin-c
address: UNITED ARAB EMIRATES
address: Dubai
address: 00000
address: Royal Class Business Centre, Floor 19, Business Bay
phone: +971506259582
nic-hdl: AA42646-RIPE
mnt-by: lir-ae-aravia-fintech-1-MNT
created: 2024-01-26T13:10:23Z
last-modified: 2024-01-26T13:10:24Z
source: RIPE # Filtered
% Information related to '83.97.99.0/24AS14618'
route: 83.97.99.0/24
origin: AS14618
mnt-by: lir-ae-aravia-fintech-1-MNT
created: 2024-01-30T14:06:33Z
last-modified: 2024-01-30T14:06:33Z
source: RIPE
% Information related to '83.97.99.0/24AS16509'
route: 83.97.99.0/24
origin: AS16509
mnt-by: lir-ae-aravia-fintech-1-MNT
created: 2024-01-30T14:06:07Z
last-modified: 2024-01-30T14:06:07Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.97.99.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;83.97.99.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 15:27:18 CST 2026
;; MSG SIZE rcvd: 104
Host 39.99.97.83.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 39.99.97.83.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 64.53.14.211 | attackspam | $f2bV_matches |
2020-07-24 21:47:42 |
| 117.186.96.54 | attackbotsspam | Invalid user german from 117.186.96.54 port 16274 |
2020-07-24 21:46:58 |
| 112.85.42.172 | attack | Jul 24 06:48:17 dignus sshd[18117]: Failed password for root from 112.85.42.172 port 45472 ssh2 Jul 24 06:48:20 dignus sshd[18117]: Failed password for root from 112.85.42.172 port 45472 ssh2 Jul 24 06:48:27 dignus sshd[18117]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 45472 ssh2 [preauth] Jul 24 06:48:33 dignus sshd[18156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root Jul 24 06:48:35 dignus sshd[18156]: Failed password for root from 112.85.42.172 port 12055 ssh2 ... |
2020-07-24 22:11:43 |
| 106.13.190.51 | attackspambots | 2020-07-24T13:20:13.886182shield sshd\[10483\]: Invalid user nagios from 106.13.190.51 port 49682 2020-07-24T13:20:13.896423shield sshd\[10483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.190.51 2020-07-24T13:20:16.001874shield sshd\[10483\]: Failed password for invalid user nagios from 106.13.190.51 port 49682 ssh2 2020-07-24T13:23:44.743767shield sshd\[11573\]: Invalid user test from 106.13.190.51 port 33918 2020-07-24T13:23:44.752455shield sshd\[11573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.190.51 |
2020-07-24 21:34:07 |
| 128.199.162.2 | attackspam | Jul 24 15:42:39 dev0-dcde-rnet sshd[12125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 Jul 24 15:42:41 dev0-dcde-rnet sshd[12125]: Failed password for invalid user rizal from 128.199.162.2 port 47403 ssh2 Jul 24 15:48:37 dev0-dcde-rnet sshd[12204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 |
2020-07-24 22:10:00 |
| 159.89.115.74 | attackspambots | Jul 24 14:27:31 vmd36147 sshd[17114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.74 Jul 24 14:27:34 vmd36147 sshd[17114]: Failed password for invalid user hsd from 159.89.115.74 port 34204 ssh2 Jul 24 14:31:37 vmd36147 sshd[25537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.74 ... |
2020-07-24 21:26:40 |
| 163.172.62.124 | attackbotsspam | 2020-07-24T13:40:06.891238abusebot-2.cloudsearch.cf sshd[4086]: Invalid user jo from 163.172.62.124 port 40482 2020-07-24T13:40:06.897176abusebot-2.cloudsearch.cf sshd[4086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.62.124 2020-07-24T13:40:06.891238abusebot-2.cloudsearch.cf sshd[4086]: Invalid user jo from 163.172.62.124 port 40482 2020-07-24T13:40:09.117034abusebot-2.cloudsearch.cf sshd[4086]: Failed password for invalid user jo from 163.172.62.124 port 40482 ssh2 2020-07-24T13:48:47.531345abusebot-2.cloudsearch.cf sshd[4186]: Invalid user sysomc from 163.172.62.124 port 57270 2020-07-24T13:48:47.538481abusebot-2.cloudsearch.cf sshd[4186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.62.124 2020-07-24T13:48:47.531345abusebot-2.cloudsearch.cf sshd[4186]: Invalid user sysomc from 163.172.62.124 port 57270 2020-07-24T13:48:49.281930abusebot-2.cloudsearch.cf sshd[4186]: Failed passwor ... |
2020-07-24 21:56:50 |
| 46.22.224.179 | attackbotsspam | Port Scan ... |
2020-07-24 21:37:28 |
| 192.144.218.101 | attack | Invalid user abuseio from 192.144.218.101 port 46330 |
2020-07-24 21:27:03 |
| 91.64.159.122 | attackspambots | Honeypot attack, port: 445, PTR: ip5b409f7a.dynamic.kabel-deutschland.de. |
2020-07-24 21:57:46 |
| 74.82.47.2 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-07-24 21:53:31 |
| 194.26.25.81 | attackbots | [H1.VM1] Blocked by UFW |
2020-07-24 22:07:26 |
| 54.38.36.210 | attackspam | SSH brutforce |
2020-07-24 21:35:06 |
| 140.246.229.200 | attack | Jul 24 16:31:05 master sshd[26825]: Failed password for invalid user lgy from 140.246.229.200 port 34736 ssh2 Jul 24 16:34:24 master sshd[26835]: Failed password for invalid user jko from 140.246.229.200 port 56506 ssh2 Jul 24 16:36:21 master sshd[26843]: Failed password for invalid user yuki from 140.246.229.200 port 41846 ssh2 Jul 24 16:38:24 master sshd[26847]: Failed password for invalid user way from 140.246.229.200 port 55416 ssh2 Jul 24 16:42:27 master sshd[26934]: Failed password for invalid user report from 140.246.229.200 port 54320 ssh2 Jul 24 16:44:25 master sshd[26948]: Failed password for invalid user vikas from 140.246.229.200 port 39658 ssh2 Jul 24 16:46:22 master sshd[26995]: Failed password for invalid user wig from 140.246.229.200 port 53230 ssh2 Jul 24 16:48:17 master sshd[27041]: Failed password for invalid user rakesh from 140.246.229.200 port 38570 ssh2 |
2020-07-24 22:09:03 |
| 87.250.74.253 | attack | Automatic report - Banned IP Access |
2020-07-24 22:10:24 |