City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '89.169.54.0 - 89.169.55.255'
% Abuse contact for '89.169.54.0 - 89.169.55.255' is 'abuse@aeza.ru'
inetnum: 89.169.54.0 - 89.169.55.255
netname: Aeza-Network
mnt-domains: aeza-mnt
mnt-lower: aeza-mnt
mnt-routes: aeza-mnt
country: DE
admin-c: NT5020-RIPE
abuse-c: AR79375-RIPE
tech-c: NT5020-RIPE
org: ORG-AGL50-RIPE
status: ASSIGNED PA
mnt-by: aeza-mnt
mnt-by: lir-ru-aezagroup-1-MNT
mnt-by: webrocket-mnt
created: 2024-11-06T17:06:25Z
last-modified: 2026-03-05T18:22:07Z
source: RIPE
geofeed: https://aeza.net/static/ipv4_f.csv
organisation: ORG-AGL50-RIPE
org-name: AEZA GROUP LLC
country: RU
org-type: LIR
address: Room 1N, Office 603, Hse 15, Building 1, Zolnaya Street, Pravoberezhny
address: 193318
address: Saint Petersburg
address: RUSSIAN FEDERATION
phone: +79650135518
phone: +78002006013
admin-c: NT5020-RIPE
tech-c: NT5020-RIPE
abuse-c: AR79375-RIPE
mnt-ref: lir-ru-aezagroup-1-MNT
mnt-ref: aeza-mnt
mnt-ref: IVC-MNT
mnt-ref: Renets-mnt
mnt-ref: VF1-MNT
mnt-ref: DN-MNT
mnt-ref: WEBROCKET-MNT
mnt-ref: QWARTA-MNT
mnt-ref: ROSNIIROS-MNT
mnt-ref: mnt-ru-am-1
mnt-ref: IROST-MNT
mnt-ref: JD-RIPE-MNT
mnt-ref: AS15509-MNT
mnt-ref: sistemallc-mnt
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-ru-aezagroup-1-MNT
created: 2025-12-29T09:59:14Z
last-modified: 2026-03-06T16:19:59Z
source: RIPE # Filtered
role: NOC team
address: RUSSIAN FEDERATION
address: Saint Petersburg
address: 193318
address: Room 1N, Office 603, Hse 15, Building 1,
Zolnaya Street, Pravoberezhny
phone: +78002006013
nic-hdl: NT5020-RIPE
mnt-by: lir-ru-aezagroup-1-MNT
created: 2025-12-29T09:59:13Z
last-modified: 2025-12-29T09:59:13Z
source: RIPE # Filtered
% Information related to '89.169.54.0/23AS210644'
route: 89.169.54.0/23
origin: AS210644
mnt-by: aeza-mnt
mnt-by: AEZA-NETWORK-MNT
created: 2024-03-21T15:13:46Z
last-modified: 2024-03-21T15:13:46Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.169.55.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.169.55.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 09:00:20 CST 2026
;; MSG SIZE rcvd: 106
117.55.169.89.in-addr.arpa domain name pointer testvpn.ptr.network.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.55.169.89.in-addr.arpa name = testvpn.ptr.network.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 205.185.118.61 | attackbots | fire |
2019-08-09 10:50:15 |
| 200.27.131.51 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:28:14,895 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.27.131.51) |
2019-08-09 10:18:22 |
| 203.114.102.69 | attackspambots | 2019-08-09T02:50:14.772334abusebot-6.cloudsearch.cf sshd\[28740\]: Invalid user elton from 203.114.102.69 port 59310 |
2019-08-09 10:54:13 |
| 66.45.225.233 | attackbots | Aug 8 23:47:40 [HOSTNAME] sshd[15870]: Invalid user 123n from 66.45.225.233 port 39090 Aug 8 23:48:07 [HOSTNAME] sshd[15873]: Invalid user qwert123 from 66.45.225.233 port 54844 Aug 8 23:48:34 [HOSTNAME] sshd[15888]: Invalid user 1q2w3e4r from 66.45.225.233 port 42518 ... |
2019-08-09 10:37:14 |
| 206.189.217.240 | attackbots | fire |
2019-08-09 10:41:21 |
| 218.155.189.208 | attackspam | Aug 9 08:08:53 lcl-usvr-01 sshd[15270]: Invalid user gnoses from 218.155.189.208 Aug 9 08:08:53 lcl-usvr-01 sshd[15270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.189.208 Aug 9 08:08:53 lcl-usvr-01 sshd[15270]: Invalid user gnoses from 218.155.189.208 Aug 9 08:08:55 lcl-usvr-01 sshd[15270]: Failed password for invalid user gnoses from 218.155.189.208 port 51214 ssh2 Aug 9 08:15:51 lcl-usvr-01 sshd[19097]: Invalid user pop from 218.155.189.208 |
2019-08-09 10:53:00 |
| 213.32.39.236 | attack | Aug 9 00:04:30 SilenceServices sshd[4306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.39.236 Aug 9 00:04:32 SilenceServices sshd[4306]: Failed password for invalid user website from 213.32.39.236 port 45918 ssh2 Aug 9 00:08:32 SilenceServices sshd[9036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.39.236 |
2019-08-09 10:38:39 |
| 142.93.195.189 | attackbotsspam | Aug 9 01:08:59 master sshd[13430]: Failed password for root from 142.93.195.189 port 38612 ssh2 Aug 9 01:33:30 master sshd[13748]: Failed password for invalid user ts3srv from 142.93.195.189 port 42014 ssh2 Aug 9 01:37:32 master sshd[13750]: Failed password for invalid user contabilidad from 142.93.195.189 port 35786 ssh2 Aug 9 01:41:19 master sshd[13752]: Failed password for invalid user ravi from 142.93.195.189 port 57788 ssh2 Aug 9 01:45:12 master sshd[13763]: Failed password for invalid user craig from 142.93.195.189 port 51554 ssh2 Aug 9 01:49:12 master sshd[13765]: Failed password for invalid user r00t from 142.93.195.189 port 45324 ssh2 Aug 9 01:53:14 master sshd[13770]: Failed password for invalid user cron from 142.93.195.189 port 39092 ssh2 Aug 9 01:57:12 master sshd[13772]: Failed password for invalid user contact from 142.93.195.189 port 32860 ssh2 Aug 9 02:01:07 master sshd[14076]: Failed password for invalid user administrator from 142.93.195.189 port 54860 ssh2 Aug 9 02:05:14 master s |
2019-08-09 10:56:03 |
| 206.189.152.215 | attackspambots | fire |
2019-08-09 10:44:13 |
| 94.28.54.6 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:49:01,202 INFO [shellcode_manager] (94.28.54.6) no match, writing hexdump (5af1e181fef810fc4f0ebd581e889a86 :1851490) - SMB (Unknown) |
2019-08-09 10:23:42 |
| 206.189.23.43 | attackbotsspam | fire |
2019-08-09 10:40:40 |
| 5.135.135.116 | attackspambots | Aug 8 23:50:37 MK-Soft-VM7 sshd\[30830\]: Invalid user ad from 5.135.135.116 port 39614 Aug 8 23:50:37 MK-Soft-VM7 sshd\[30830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116 Aug 8 23:50:39 MK-Soft-VM7 sshd\[30830\]: Failed password for invalid user ad from 5.135.135.116 port 39614 ssh2 ... |
2019-08-09 10:29:16 |
| 222.186.52.155 | attackbotsspam | 2019-08-09T02:38:13.368747abusebot-3.cloudsearch.cf sshd\[20791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.155 user=root |
2019-08-09 10:47:20 |
| 159.65.129.64 | attackspam | Aug 9 04:10:25 SilenceServices sshd[23524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.129.64 Aug 9 04:10:27 SilenceServices sshd[23524]: Failed password for invalid user webtool from 159.65.129.64 port 48804 ssh2 Aug 9 04:15:25 SilenceServices sshd[28780]: Failed password for root from 159.65.129.64 port 42610 ssh2 |
2019-08-09 10:27:39 |
| 157.230.28.16 | attack | Aug 9 03:23:32 ms-srv sshd[25142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.28.16 Aug 9 03:23:35 ms-srv sshd[25142]: Failed password for invalid user coen from 157.230.28.16 port 60732 ssh2 |
2019-08-09 10:23:57 |