City: Ust’-Abakan
Region: Khakassia
Country: Russia
Internet Service Provider: +7Telecom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '90.189.122.0 - 90.189.127.255'
% Abuse contact for '90.189.122.0 - 90.189.127.255' is 'abuse@rt.ru'
inetnum: 90.189.122.0 - 90.189.127.255
netname: WEBSTREAM
descr: OJSC "Sibirtelecom"
remarks: Khakassia branch
remarks: broadband service
country: RU
remarks:
remarks: NCC # 2007091972
remarks: INFRA-AW
remarks:
admin-c: VAS28-RIPE
tech-c: VAS28-RIPE
tech-c: VVP8-RIPE
mnt-by: ROSTELECOM-MNT
status: ASSIGNED PA
remarks:
remarks: Direct reference for the general info on spam
remarks: In unsoluble cases for the general info on spam,
remarks: abusing & hacking complaints email abuse@sinor.ru
remarks:
created: 2008-07-21T04:33:09Z
last-modified: 2025-07-02T08:17:42Z
source: RIPE # Filtered
person: Vladimir A Sobolev
address: Sovetsksja st, 45
address: Abakan, Russia
address: 662600
phone: + 7 39022 51273
phone: + 7 39022 01415
nic-hdl: VAS28-RIPE
created: 1970-01-01T00:00:00Z
last-modified: 2020-06-04T10:25:15Z
source: RIPE # Filtered
mnt-by: ROSTELECOM-MNT
person: Vladimir V. Poludintsev
address: "ABAKAN INTERNATIONAL TELEPHONE & TELEGRAPH STATION"
address: Sovetskaya st. # 45
address: 662600 Abakan
address: Russia
phone: +7 39022 01445
phone: +7 39022 51273
nic-hdl: VVP8-RIPE
created: 1970-01-01T00:00:00Z
last-modified: 2016-04-05T16:00:44Z
mnt-by: RIPE-NCC-LOCKED-MNT
source: RIPE # Filtered
% Information related to '90.189.112.0/20AS12389'
route: 90.189.112.0/20
origin: AS12389
mnt-by: ROSTELECOM-MNT
created: 2025-06-21T08:58:44Z
last-modified: 2025-06-21T08:58:44Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.189.127.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;90.189.127.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 21:17:43 CST 2026
;; MSG SIZE rcvd: 106
Host 61.127.189.90.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 61.127.189.90.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 144.76.29.149 | attack | 20 attempts against mh-misbehave-ban on plane.magehost.pro |
2019-12-28 22:43:33 |
| 195.138.162.161 | attackbotsspam | firewall-block, port(s): 81/tcp |
2019-12-28 22:51:53 |
| 13.80.102.166 | attackspam | Unauthorised access (Dec 28) SRC=13.80.102.166 LEN=40 TTL=244 ID=36344 TCP DPT=1433 WINDOW=1024 SYN Unauthorised access (Dec 27) SRC=13.80.102.166 LEN=40 TTL=242 ID=57275 TCP DPT=445 WINDOW=1024 SYN |
2019-12-28 23:01:41 |
| 95.143.135.226 | attackspambots | 95.143.135.226 - - [28/Dec/2019:09:30:15 -0500] "GET /?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&action=view& HTTP/1.1" 200 17545 "https://ccbrass.com/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&action=view&" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-12-28 23:19:03 |
| 178.176.161.115 | attackspam | Unauthorized connection attempt from IP address 178.176.161.115 on Port 445(SMB) |
2019-12-28 22:49:39 |
| 117.247.191.92 | attackbots | Unauthorized connection attempt from IP address 117.247.191.92 on Port 445(SMB) |
2019-12-28 22:57:33 |
| 217.112.128.81 | attackspam | RBL |
2019-12-28 23:05:57 |
| 41.233.188.235 | attack | Unauthorized connection attempt from IP address 41.233.188.235 on Port 445(SMB) |
2019-12-28 22:39:39 |
| 222.124.158.12 | attackspam | Unauthorized connection attempt from IP address 222.124.158.12 on Port 445(SMB) |
2019-12-28 23:17:33 |
| 50.207.147.18 | attack | Unauthorized connection attempt from IP address 50.207.147.18 on Port 445(SMB) |
2019-12-28 22:36:53 |
| 222.186.175.183 | attackspam | Dec2815:02:06server6sshd[6611]:refusedconnectfrom222.186.175.183\(222.186.175.183\)Dec2815:02:07server6sshd[6612]:refusedconnectfrom222.186.175.183\(222.186.175.183\)Dec2815:02:07server6sshd[6614]:refusedconnectfrom222.186.175.183\(222.186.175.183\)Dec2815:02:13server6sshd[6620]:refusedconnectfrom222.186.175.183\(222.186.175.183\)Dec2815:32:57server6sshd[8569]:refusedconnectfrom222.186.175.183\(222.186.175.183\) |
2019-12-28 22:41:46 |
| 13.70.84.151 | attack | Unauthorized connection attempt from IP address 13.70.84.151 on Port 3389(RDP) |
2019-12-28 22:58:24 |
| 144.91.82.224 | attackspam | Attempted to connect 2 times to port 80 TCP |
2019-12-28 23:08:33 |
| 119.148.46.45 | attack | Unauthorized connection attempt from IP address 119.148.46.45 on Port 445(SMB) |
2019-12-28 23:09:27 |
| 46.38.144.17 | attackspam | Dec 28 15:54:07 webserver postfix/smtpd\[26734\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 15:55:39 webserver postfix/smtpd\[26951\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 15:57:07 webserver postfix/smtpd\[27060\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 15:58:35 webserver postfix/smtpd\[27060\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 16:00:04 webserver postfix/smtpd\[27060\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-28 23:03:45 |