City: Nedrahovice
Region: Central Bohemian Region (Stredocesky kraj)
Country: Czechia
Internet Service Provider: O2
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '88.101.166.0 - 88.101.166.255'
% Abuse contact for '88.101.166.0 - 88.101.166.255' is 'abuse@o2.cz'
inetnum: 88.101.166.0 - 88.101.166.255
netname: NEXTEL-XDSL
descr: XDSL NETWORK-ADSL
country: CZ
admin-c: HVJI1-RIPE
tech-c: HVJI1-RIPE
status: ASSIGNED PA
mnt-by: AS5610-MTN
created: 2006-03-22T08:39:14Z
last-modified: 2006-03-22T08:39:14Z
source: RIPE # Filtered
person: Jiri Hvezda
address: O2 Czech Republic, a.s.
address: Za Brumlovkou 2
address: Prague 4 - 140 22
address: The Czech Republic
phone: +420 2 84084222
nic-hdl: HVJI1-RIPE
created: 2002-07-22T13:31:48Z
last-modified: 2020-06-25T13:10:19Z
source: RIPE # Filtered
mnt-by: AS5610-MTN
% Information related to '88.100.0.0/15AS5610'
route: 88.100.0.0/15
descr: CZ.CZNET
origin: AS5610
mnt-by: AS5610-MTN
created: 2010-12-08T13:29:19Z
last-modified: 2010-12-08T13:29:19Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 88.101.166.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;88.101.166.244. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 02:11:57 CST 2026
;; MSG SIZE rcvd: 107
244.166.101.88.in-addr.arpa domain name pointer 88-101-166-244.rcg.o2.cz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
244.166.101.88.in-addr.arpa name = 88-101-166-244.rcg.o2.cz.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.168.11.221 | attackbots | " " |
2019-10-12 18:12:38 |
| 94.191.99.107 | attackbots | Automatic report - Banned IP Access |
2019-10-12 18:10:43 |
| 129.204.40.47 | attackbotsspam | Oct 12 10:10:45 bouncer sshd\[5612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.47 user=root Oct 12 10:10:47 bouncer sshd\[5612\]: Failed password for root from 129.204.40.47 port 41158 ssh2 Oct 12 10:16:20 bouncer sshd\[5634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.47 user=root ... |
2019-10-12 18:34:29 |
| 138.204.186.27 | attackspam | Unauthorised access (Oct 12) SRC=138.204.186.27 LEN=40 TTL=244 ID=14369 TCP DPT=1433 WINDOW=1024 SYN |
2019-10-12 18:16:19 |
| 218.92.0.200 | attack | 2019-10-12T09:41:58.530417abusebot-4.cloudsearch.cf sshd\[12526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200 user=root |
2019-10-12 18:07:27 |
| 171.38.195.108 | attack | Port Scan: TCP/23 |
2019-10-12 18:09:27 |
| 54.37.136.213 | attackbotsspam | Oct 12 10:22:39 game-panel sshd[2335]: Failed password for root from 54.37.136.213 port 53350 ssh2 Oct 12 10:26:49 game-panel sshd[2476]: Failed password for root from 54.37.136.213 port 37100 ssh2 |
2019-10-12 18:36:18 |
| 121.122.76.102 | attackspam | Automatic report - Port Scan Attack |
2019-10-12 18:13:26 |
| 220.164.2.118 | attackbotsspam | Oct 11 **REMOVED** dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\ |
2019-10-12 18:26:49 |
| 51.75.133.167 | attack | Oct 12 12:57:30 sauna sshd[130971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.133.167 Oct 12 12:57:33 sauna sshd[130971]: Failed password for invalid user 123 from 51.75.133.167 port 44402 ssh2 ... |
2019-10-12 18:15:53 |
| 91.228.31.101 | attackspam | [portscan] Port scan |
2019-10-12 18:26:08 |
| 117.50.67.214 | attack | Brute force attempt |
2019-10-12 18:31:57 |
| 61.216.30.240 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/61.216.30.240/ EU - 1H : (18) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : EU NAME ASN : ASN3462 IP : 61.216.30.240 CIDR : 61.216.0.0/18 PREFIX COUNT : 390 UNIQUE IP COUNT : 12267520 WYKRYTE ATAKI Z ASN3462 : 1H - 8 3H - 32 6H - 64 12H - 117 24H - 295 DateTime : 2019-10-12 07:59:08 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-12 18:11:00 |
| 92.222.71.125 | attack | 2019-10-12T08:46:12.347165abusebot-2.cloudsearch.cf sshd\[20901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-92-222-71.eu user=root |
2019-10-12 18:20:26 |
| 150.140.189.33 | attackbotsspam | Oct 12 12:06:39 ns381471 sshd[14925]: Failed password for root from 150.140.189.33 port 38442 ssh2 Oct 12 12:10:41 ns381471 sshd[15258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.140.189.33 Oct 12 12:10:43 ns381471 sshd[15258]: Failed password for invalid user 123 from 150.140.189.33 port 49922 ssh2 |
2019-10-12 18:14:36 |