City: Tel Aviv
Region: Tel Aviv
Country: Israel
Internet Service Provider: Cellcom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '89.139.96.0 - 89.139.223.255'
% Abuse contact for '89.139.96.0 - 89.139.223.255' is 'nvabuse@cellcom.co.il'
inetnum: 89.139.96.0 - 89.139.223.255
netname: BB-PT
descr: broadband for PT
country: IL
admin-c: NN105-RIPE
tech-c: NN105-RIPE
status: ASSIGNED PA
mnt-by: NV-MNT-RIPE
created: 2008-03-17T14:49:20Z
last-modified: 2008-03-17T14:49:20Z
source: RIPE
role: CELLCOM NOC team
address: Omega Building
address: MATAM industrial park
address: Haifa 31905
address: Israel
phone: +972 4 8560 600
fax-no: +972 4 8551 132
abuse-mailbox: nvabuse@cellcom.co.il
remarks: Send Spam and Abuse complains ONLY to the above address!
admin-c: NVAC-RIPE
tech-c: NVTC-RIPE
nic-hdl: NN105-RIPE
mnt-by: NV-MNT-RIPE
created: 1970-01-01T00:00:00Z
last-modified: 2018-02-22T09:10:47Z
source: RIPE # Filtered
% Information related to '89.139.160.0/24AS1680'
route: 89.139.160.0/24
origin: AS1680
mnt-by: NV-MNT-RIPE
created: 2025-07-24T20:16:36Z
last-modified: 2025-07-24T20:16:36Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.139.160.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.139.160.67. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 23:05:46 CST 2026
;; MSG SIZE rcvd: 106
67.160.139.89.in-addr.arpa domain name pointer 89-139-160-67.bb.netvision.net.il.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
67.160.139.89.in-addr.arpa name = 89-139-160-67.bb.netvision.net.il.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.196.7.133 | attackspam | (sshd) Failed SSH login from 5.196.7.133 (FR/France/133.ip-5-196-7.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 15:29:39 s1 sshd[32403]: Invalid user wpuser from 5.196.7.133 port 41576 Mar 23 15:29:41 s1 sshd[32403]: Failed password for invalid user wpuser from 5.196.7.133 port 41576 ssh2 Mar 23 15:36:57 s1 sshd[32680]: Invalid user nodeserver from 5.196.7.133 port 54626 Mar 23 15:36:59 s1 sshd[32680]: Failed password for invalid user nodeserver from 5.196.7.133 port 54626 ssh2 Mar 23 15:41:05 s1 sshd[373]: Invalid user flood from 5.196.7.133 port 42974 |
2020-03-23 22:33:44 |
| 89.40.73.246 | attack | [Thu Mar 19 04:36:35 2020] - Syn Flood From IP: 89.40.73.246 Port: 6000 |
2020-03-23 21:48:35 |
| 113.173.108.163 | attackbots | Autoban 113.173.108.163 AUTH/CONNECT |
2020-03-23 22:18:50 |
| 220.141.115.228 | attackspam | Unauthorized connection attempt from IP address 220.141.115.228 on Port 445(SMB) |
2020-03-23 22:28:25 |
| 14.241.136.207 | attackspam | Unauthorized connection attempt from IP address 14.241.136.207 on Port 445(SMB) |
2020-03-23 22:16:46 |
| 165.227.67.64 | attackbots | Invalid user karika from 165.227.67.64 port 43324 |
2020-03-23 21:59:52 |
| 118.34.12.35 | attackspam | Brute force attempt |
2020-03-23 22:29:29 |
| 5.255.253.25 | attackbots | [Mon Mar 23 18:44:10.449303 2020] [:error] [pid 10526:tid 139645939312384] [client 5.255.253.25:44367] [client 5.255.253.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XnihCgUkPLKnP9@8s07hFwAAAtA"] ... |
2020-03-23 21:45:43 |
| 107.173.160.139 | attackbotsspam | EXPLOIT Remote Command Execution via Shell Script -2 |
2020-03-23 22:06:40 |
| 125.123.128.62 | attackspambots | Unauthorized connection attempt from IP address 125.123.128.62 on Port 445(SMB) |
2020-03-23 22:02:50 |
| 36.90.238.214 | attack | Unauthorized connection attempt detected from IP address 36.90.238.214 to port 445 |
2020-03-23 22:00:58 |
| 103.10.30.207 | attackspam | k+ssh-bruteforce |
2020-03-23 21:50:39 |
| 182.253.245.32 | attackbots | Unauthorized connection attempt from IP address 182.253.245.32 on Port 445(SMB) |
2020-03-23 21:59:22 |
| 184.82.13.165 | attackspambots | Unauthorized connection attempt from IP address 184.82.13.165 on Port 445(SMB) |
2020-03-23 22:17:43 |
| 118.21.43.84 | attackbots | Honeypot attack, port: 81, PTR: i118-21-43-84.s30.a048.ap.plala.or.jp. |
2020-03-23 21:54:03 |