City: Manchester
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '89.21.25.0 - 89.21.25.127'
% Abuse contact for '89.21.25.0 - 89.21.25.127' is 'smc@equinix.com'
inetnum: 89.21.25.0 - 89.21.25.127
netname: SYNVLAN257
descr: SYN Vlan 257 Customer
country: GB
admin-c: RG3442-RIPE
tech-c: RG3442-RIPE
status: ASSIGNED PA
mnt-by: MNT-UKGRIDRG
mnt-by: EQUINIX-MNT
created: 2020-03-16T09:57:57Z
last-modified: 2020-03-16T09:57:57Z
source: RIPE
person: Rob Garbutt
address: Greenheys Data Centre
address: Manchester Science Park
address: Pencroft Way
address: Manchester
address: M15 6JJ
phone: +44(0)845 260 4743
nic-hdl: RG3442-RIPE
mnt-by: MNT-UKGRIDRG
created: 2006-04-13T22:14:31Z
last-modified: 2009-12-30T16:57:10Z
source: RIPE # Filtered
% Information related to '89.21.0.0/19AS15830'
route: 89.21.0.0/19
descr: ROUTE ORIGINATED BY TELECITY GROUP LTD MANCHESTER
origin: AS15830
mnt-by: TELECITY-MNT
created: 2012-06-18T13:48:36Z
last-modified: 2012-06-18T13:48:36Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.21.25.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.21.25.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050201 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 01:43:09 CST 2026
;; MSG SIZE rcvd: 104
Host 54.25.21.89.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.25.21.89.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.213.11.73 | attackbots | WEB ZyXEL Multi-product pre-authentication command injection in, signature_id=1136702, signature_cat=Web Attack, severity=4, 3000-0150 |
2020-05-12 20:13:52 |
| 106.104.170.12 | attackbots | Attempted connection to port 81. |
2020-05-12 20:03:05 |
| 46.246.228.99 | attackbots | Attempted connection to port 8080. |
2020-05-12 19:50:24 |
| 113.53.97.43 | attackspambots | Unauthorized connection attempt from IP address 113.53.97.43 on Port 445(SMB) |
2020-05-12 19:38:33 |
| 13.56.123.108 | attackspambots | 13.56.123.108 - - [12/May/2020:08:44:31 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 13.56.123.108 - - [12/May/2020:08:44:34 +0200] "POST /wp-login.php HTTP/1.1" 200 6130 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 13.56.123.108 - - [12/May/2020:08:44:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-05-12 19:40:57 |
| 109.111.137.128 | attackspambots | Attempted connection to port 80. |
2020-05-12 20:02:37 |
| 152.136.210.237 | attackspambots | Invalid user mike from 152.136.210.237 port 33472 |
2020-05-12 20:07:04 |
| 85.192.165.80 | attackspambots | Attempted connection to port 445. |
2020-05-12 19:59:17 |
| 162.158.187.38 | attack | $f2bV_matches |
2020-05-12 20:12:11 |
| 14.162.191.186 | attack | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-05-12 20:18:23 |
| 139.199.115.210 | attackbots | May 12 14:06:10 vps687878 sshd\[7932\]: Invalid user t7inst from 139.199.115.210 port 41619 May 12 14:06:10 vps687878 sshd\[7932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210 May 12 14:06:13 vps687878 sshd\[7932\]: Failed password for invalid user t7inst from 139.199.115.210 port 41619 ssh2 May 12 14:10:15 vps687878 sshd\[8528\]: Invalid user marketing from 139.199.115.210 port 29186 May 12 14:10:15 vps687878 sshd\[8528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210 ... |
2020-05-12 20:20:29 |
| 1.82.45.57 | attackbotsspam | Attempted connection to port 5555. |
2020-05-12 20:04:49 |
| 51.211.172.38 | attackspambots | Unauthorized connection attempt from IP address 51.211.172.38 on Port 445(SMB) |
2020-05-12 19:47:00 |
| 123.231.122.230 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-05-12 19:57:32 |
| 190.85.71.129 | attackbots | Invalid user bruce from 190.85.71.129 port 48668 |
2020-05-12 20:05:46 |