City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '91.209.190.0 - 91.209.190.255'
% Abuse contact for '91.209.190.0 - 91.209.190.255' is 'abuse@konform.com'
inetnum: 91.209.190.0 - 91.209.190.255
netname: DK-KONFORM-20090629
country: DK
org: ORG-KA193-RIPE
admin-c: JS233-RIPE
tech-c: JS233-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-KONFORM
mnt-routes: MNT-KONFORM
created: 2017-09-27T08:58:24Z
last-modified: 2017-09-27T08:58:24Z
source: RIPE
organisation: ORG-KA193-RIPE
org-name: Kontainer A/S
country: DK
org-type: LIR
address: Studiestraede 19, 4 sal
address: 1455
address: Kobenhavn K
address: DENMARK
phone: +4533112001
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: MNT-KONFORM
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-KONFORM
admin-c: JS233-RIPE
abuse-c: KRC2-RIPE
created: 2009-06-19T09:38:01Z
last-modified: 2022-12-21T11:53:28Z
source: RIPE # Filtered
person: Jesper Sandberg
address: Copenhost A/S
address: Studiestraede 19, 4. sal
address: DK-1455 Copenhagen K
phone: +45 33112001
nic-hdl: JS233-RIPE
created: 2009-06-25T12:34:52Z
last-modified: 2017-09-22T20:06:46Z
source: RIPE
mnt-by: MNT-KONFORM
% Information related to '91.209.190.0/24AS198452'
route: 91.209.190.0/24
descr: Konform A/S
origin: AS198452
mnt-by: MNT-KONFORM
created: 2013-08-06T11:18:18Z
last-modified: 2013-08-06T11:18:18Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.209.190.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.209.190.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 15:52:30 CST 2026
;; MSG SIZE rcvd: 107
146.190.209.91.in-addr.arpa domain name pointer konlinux7.konformit.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
146.190.209.91.in-addr.arpa name = konlinux7.konformit.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 128.199.249.19 | attackspambots | Sep 18 23:48:51 er4gw sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.249.19 user=root |
2020-09-19 17:52:22 |
| 196.52.43.84 | attack | firewall-block, port(s): 11211/tcp |
2020-09-19 18:00:17 |
| 103.17.110.92 | attackspam | SMTP Screen: 103.17.110.92 (India): connected 11 times within 2 minutes |
2020-09-19 17:27:15 |
| 141.98.10.211 | attack | detected by Fail2Ban |
2020-09-19 17:31:09 |
| 94.23.24.213 | attackbotsspam | Auto Fail2Ban report, multiple SSH login attempts. |
2020-09-19 17:22:59 |
| 141.98.10.214 | attack | 2020-09-19T09:23:43.052947shield sshd\[21572\]: Invalid user admin from 141.98.10.214 port 39403 2020-09-19T09:23:43.063020shield sshd\[21572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214 2020-09-19T09:23:45.063062shield sshd\[21572\]: Failed password for invalid user admin from 141.98.10.214 port 39403 ssh2 2020-09-19T09:24:22.192383shield sshd\[21670\]: Invalid user admin from 141.98.10.214 port 33641 2020-09-19T09:24:22.202824shield sshd\[21670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214 |
2020-09-19 17:28:03 |
| 23.225.240.242 | attack |
|
2020-09-19 17:40:01 |
| 181.49.154.26 | attackbotsspam | Sep 19 11:21:18 sso sshd[12136]: Failed password for www-data from 181.49.154.26 port 40154 ssh2 Sep 19 11:25:00 sso sshd[12591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.154.26 ... |
2020-09-19 17:41:25 |
| 103.130.213.150 | attack | Sep 19 05:40:21 ny01 sshd[23960]: Failed password for root from 103.130.213.150 port 43674 ssh2 Sep 19 05:43:00 ny01 sshd[24293]: Failed password for root from 103.130.213.150 port 36574 ssh2 |
2020-09-19 17:50:11 |
| 185.191.171.19 | attackbotsspam | log:/aero/meteo/EDHM/fr |
2020-09-19 17:53:39 |
| 186.71.176.15 | attack | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=11223 . dstport=24183 . (2849) |
2020-09-19 17:30:15 |
| 45.138.74.32 | attack | From: "UltraMax Testosterone Enhancer" <0UNSmQ@ziggo.nl> Subject: Lausige Erektionen? Nie wieder! Date: Thu, 17 Sep 2020 05:48:56 +0200 |
2020-09-19 17:29:50 |
| 130.225.244.90 | attack | Sep 19 10:32:41 roki sshd[3145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.225.244.90 user=root Sep 19 10:32:43 roki sshd[3145]: Failed password for root from 130.225.244.90 port 35913 ssh2 Sep 19 10:32:46 roki sshd[3145]: Failed password for root from 130.225.244.90 port 35913 ssh2 Sep 19 10:32:48 roki sshd[3145]: Failed password for root from 130.225.244.90 port 35913 ssh2 Sep 19 10:32:50 roki sshd[3145]: Failed password for root from 130.225.244.90 port 35913 ssh2 ... |
2020-09-19 17:57:29 |
| 13.210.51.105 | attack | xmlrpc attack |
2020-09-19 17:23:32 |
| 185.39.11.109 | attack | [Mon Sep 14 21:35:04 2020] - Syn Flood From IP: 185.39.11.109 Port: 52084 |
2020-09-19 17:35:56 |