City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '87.240.128.0 - 87.240.159.255'
% Abuse contact for '87.240.128.0 - 87.240.159.255' is 'abuse@vk.com'
inetnum: 87.240.128.0 - 87.240.159.255
netname: VKONTAKTE-FRONT
descr: VKontakte Services
country: RU
admin-c: VKA15-RIPE
tech-c: NCC31-RIPE
status: ASSIGNED PA
mnt-by: VKCOMPANY-MNT
created: 2009-12-24T13:54:52Z
last-modified: 2024-10-10T12:39:19Z
source: RIPE
role: Vkontakte Network Control Center (NCC)
address: Prem.1-N, Bld. 12-14, Lit. A, Khersonskaya str.
address: 191024
address: Saint-Petersburg
address: RUSSIAN FEDERATION
remarks: **********************************************************************
remarks: Abuse, Security issues noc@vk.com
remarks: Network, routing issues, peering requests ncc@corp.vk.com
remarks: VK.com users support https://vk.com/support
remarks: Requests sent to wrong address will be ignored
remarks: **********************************************************************
admin-c: SAAP-RIPE
tech-c: DBF3-RIPE
tech-c: IS13
nic-hdl: NCC31-RIPE
mnt-by: VKCOMPANY-MNT
created: 2016-09-03T22:17:42Z
last-modified: 2025-08-07T07:49:22Z
source: RIPE # Filtered
role: Vkontakte ADM
address: Prem.1-N, Bld. 12-14, Lit. A, Khersonskaya str.
address: 191024
address: Saint-Petersburg
address: RUSSIAN FEDERATION
remarks: **********************************************************************
remarks: Abuse, Security issues noc@vk.com
remarks: Network, routing issues, peering requests ncc@corp.vk.com
remarks: VK.com users support https://vk.com/support
remarks: Requests sent to wrong address will be ignored
remarks: **********************************************************************
admin-c: SAAP-RIPE
tech-c: DBF3-RIPE
tech-c: IS13
nic-hdl: VKA15-RIPE
mnt-by: VKCOMPANY-MNT
created: 2024-10-10T12:35:04Z
last-modified: 2025-08-07T07:53:42Z
source: RIPE # Filtered
% Information related to '87.240.128.0/18AS47541'
route: 87.240.128.0/18
descr: Saint Petersburg region
origin: AS47541
mnt-by: VKCOMPANY-MNT
created: 2009-12-24T13:57:25Z
last-modified: 2022-06-20T13:06:06Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 87.240.137.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;87.240.137.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 00:50:52 CST 2026
;; MSG SIZE rcvd: 107
164.137.240.87.in-addr.arpa domain name pointer srv164-137-240-87.vk.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.137.240.87.in-addr.arpa name = srv164-137-240-87.vk.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.115.197 | attackspam | Feb 28 23:58:07 localhost sshd\[18697\]: Invalid user hadoop from 106.13.115.197 Feb 28 23:58:07 localhost sshd\[18697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.115.197 Feb 28 23:58:09 localhost sshd\[18697\]: Failed password for invalid user hadoop from 106.13.115.197 port 35524 ssh2 Feb 29 00:02:28 localhost sshd\[18908\]: Invalid user jenkins from 106.13.115.197 Feb 29 00:02:28 localhost sshd\[18908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.115.197 ... |
2020-02-29 09:39:48 |
| 35.246.238.175 | attack | Invalid user default from 35.246.238.175 port 54438 |
2020-02-29 10:10:16 |
| 222.186.175.182 | attack | Feb 28 15:59:43 sachi sshd\[11024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Feb 28 15:59:45 sachi sshd\[11024\]: Failed password for root from 222.186.175.182 port 4510 ssh2 Feb 28 16:00:00 sachi sshd\[11049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Feb 28 16:00:02 sachi sshd\[11049\]: Failed password for root from 222.186.175.182 port 2694 ssh2 Feb 28 16:00:05 sachi sshd\[11049\]: Failed password for root from 222.186.175.182 port 2694 ssh2 |
2020-02-29 10:02:36 |
| 103.90.155.156 | attackspambots | Feb 29 00:53:43 hosting sshd[30791]: Invalid user oracle from 103.90.155.156 port 41228 ... |
2020-02-29 10:00:27 |
| 171.225.248.132 | attackspam | 20/2/28@16:54:13: FAIL: Alarm-Network address from=171.225.248.132 ... |
2020-02-29 09:42:39 |
| 121.121.118.195 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-29 09:53:40 |
| 79.7.241.94 | attackspambots | Feb 28 19:24:25 NPSTNNYC01T sshd[2778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.241.94 Feb 28 19:24:28 NPSTNNYC01T sshd[2778]: Failed password for invalid user hue from 79.7.241.94 port 19374 ssh2 Feb 28 19:26:21 NPSTNNYC01T sshd[2870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.241.94 ... |
2020-02-29 09:36:52 |
| 91.57.16.122 | attackspam | Feb 28 22:53:38 ArkNodeAT sshd\[23967\]: Invalid user mailman from 91.57.16.122 Feb 28 22:53:38 ArkNodeAT sshd\[23967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.57.16.122 Feb 28 22:53:39 ArkNodeAT sshd\[23967\]: Failed password for invalid user mailman from 91.57.16.122 port 36538 ssh2 |
2020-02-29 10:04:01 |
| 58.121.76.36 | attackbots | Unauthorised access (Feb 29) SRC=58.121.76.36 LEN=40 PREC=0x20 TTL=49 ID=55858 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 28) SRC=58.121.76.36 LEN=40 PREC=0x20 TTL=49 ID=58180 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 27) SRC=58.121.76.36 LEN=40 TTL=49 ID=17323 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 27) SRC=58.121.76.36 LEN=40 TTL=49 ID=9640 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 25) SRC=58.121.76.36 LEN=40 PREC=0x20 TTL=49 ID=1516 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 25) SRC=58.121.76.36 LEN=40 PREC=0x20 TTL=49 ID=50053 TCP DPT=23 WINDOW=58369 SYN Unauthorised access (Feb 24) SRC=58.121.76.36 LEN=40 PREC=0x20 TTL=49 ID=58651 TCP DPT=23 WINDOW=58369 SYN |
2020-02-29 10:07:21 |
| 121.122.105.101 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-29 09:48:24 |
| 175.124.43.162 | attack | 2020-02-29T01:35:36.042672shield sshd\[8627\]: Invalid user javier from 175.124.43.162 port 50146 2020-02-29T01:35:36.049414shield sshd\[8627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162 2020-02-29T01:35:38.174916shield sshd\[8627\]: Failed password for invalid user javier from 175.124.43.162 port 50146 ssh2 2020-02-29T01:44:45.155660shield sshd\[11709\]: Invalid user appserver from 175.124.43.162 port 51748 2020-02-29T01:44:45.163517shield sshd\[11709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162 |
2020-02-29 09:45:00 |
| 121.229.2.190 | attackbots | Feb 28 15:46:20 eddieflores sshd\[14827\]: Invalid user tengyan from 121.229.2.190 Feb 28 15:46:20 eddieflores sshd\[14827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190 Feb 28 15:46:23 eddieflores sshd\[14827\]: Failed password for invalid user tengyan from 121.229.2.190 port 48636 ssh2 Feb 28 15:56:17 eddieflores sshd\[15584\]: Invalid user windows from 121.229.2.190 Feb 28 15:56:17 eddieflores sshd\[15584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190 |
2020-02-29 10:12:21 |
| 109.188.84.14 | attack | Automatic report - Port Scan Attack |
2020-02-29 09:46:24 |
| 1.189.91.9 | attackspambots | Unauthorised access (Feb 28) SRC=1.189.91.9 LEN=40 TTL=50 ID=33808 TCP DPT=23 WINDOW=21496 SYN |
2020-02-29 10:06:27 |
| 5.89.64.166 | attack | Feb 29 01:16:10 hcbbdb sshd\[14324\]: Invalid user dbuser from 5.89.64.166 Feb 29 01:16:10 hcbbdb sshd\[14324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-64-166.cust.vodafonedsl.it Feb 29 01:16:12 hcbbdb sshd\[14324\]: Failed password for invalid user dbuser from 5.89.64.166 port 40722 ssh2 Feb 29 01:24:04 hcbbdb sshd\[15097\]: Invalid user vagrant from 5.89.64.166 Feb 29 01:24:04 hcbbdb sshd\[15097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-64-166.cust.vodafonedsl.it |
2020-02-29 09:32:55 |