Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: MTS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.76.0.0 - 91.79.255.255'

% Abuse contact for '91.76.0.0 - 91.79.255.255' is 'abuse@mtu.ru'

inetnum:        91.76.0.0 - 91.79.255.255
netname:        RU-MTU-20060821
country:        RU
org:            ORG-ZM1-RIPE
admin-c:        MTU1-RIPE
tech-c:         MTU1-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MTU-NOC
mnt-lower:      MTU-NOC
mnt-domains:    MTU-NOC
mnt-routes:     MTU-NOC
created:        2006-08-21T13:31:01Z
last-modified:  2016-05-24T10:41:13Z
source:         RIPE # Filtered

organisation:   ORG-ZM1-RIPE
org-name:       MTS PJSC
country:        RU
reg-nr:         1027700149124
org-type:       LIR
address:        Smolenskaya-Sennaya sq., 27 bld 2
address:        119121
address:        Moscow
address:        RUSSIAN FEDERATION
phone:          +74957213499
fax-no:         +74992318129
admin-c:        LAP-RIPE
admin-c:        TABY-RIPE
admin-c:        LMUR-RIPE
admin-c:        YUF-RIPE
admin-c:        RPS-RIPE
abuse-c:        MAB8359-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MTU-NOC
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MTU-NOC
created:        2004-04-17T11:55:44Z
last-modified:  2026-05-13T07:31:05Z
source:         RIPE # Filtered

role:           MTS backbone NOC
address:        PJSC MTS / former CJSC Comstar-Direct
address:        Petrovsky blvd 12, bldg 3
address:        P.O. BOX 4711 127051
address:        Moscow, Russia
remarks:        **************************************
remarks:        Contact addresses:
remarks:        routing & peering noc@mtu.ru
remarks:        spam & security abuse@mtu.ru
remarks:        mail postmaster@mtu.ru
remarks:        ddos reports ddos-reports@mtu.ru
remarks:        **************************************
phone:          +7 495 721-34-99
fax-no:         +7 495 956-07-07
admin-c:        EDA-RIPE
admin-c:        RPS-RIPE
tech-c:         EDA-RIPE
nic-hdl:        MTU1-RIPE
mnt-by:         MTU-NOC
created:        2002-10-18T13:29:19Z
last-modified:  2022-04-08T13:50:05Z
source:         RIPE # Filtered

% Information related to '91.78.0.0/15AS8359'

route:          91.78.0.0/15
descr:          PJSC "MTS" MBN
origin:         AS8359
mnt-by:         MTU-NOC
created:        2026-05-14T12:05:31Z
last-modified:  2026-05-14T12:05:31Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.79.146.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.79.146.72.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 12:35:13 CST 2026
;; MSG SIZE  rcvd: 105
Host info
b'72.146.79.91.in-addr.arpa domain name pointer ppp91-79-146-72.pppoe.mtu-net.ru.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.146.79.91.in-addr.arpa	name = ppp91-79-146-72.pppoe.mtu-net.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
69.160.160.58 attackbots
Attempt to use web contact page to send SPAM
2020-05-31 16:16:24
112.198.126.124 attack
Udp port scan atack
2020-05-31 16:23:10
167.61.91.210 attack
1590897844 - 05/31/2020 06:04:04 Host: 167.61.91.210/167.61.91.210 Port: 23 TCP Blocked
2020-05-31 16:21:38
186.122.148.9 attack
Invalid user mky from 186.122.148.9 port 35234
2020-05-31 16:25:43
183.249.121.170 attackspam
 TCP (SYN) 183.249.121.170:26069 -> port 23, len 40
2020-05-31 16:48:33
87.103.120.250 attackspam
prod11
...
2020-05-31 16:28:34
208.68.39.124 attackbotsspam
May 30 21:05:58 mockhub sshd[14637]: Failed password for root from 208.68.39.124 port 44412 ssh2
...
2020-05-31 16:44:55
79.121.123.160 attack
SSH Scan
2020-05-31 16:49:51
179.40.43.1 attackbotsspam
2020-05-31T05:29:20.001326shield sshd\[28486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1  user=root
2020-05-31T05:29:22.039025shield sshd\[28486\]: Failed password for root from 179.40.43.1 port 39434 ssh2
2020-05-31T05:34:07.446117shield sshd\[28816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1  user=root
2020-05-31T05:34:09.353425shield sshd\[28816\]: Failed password for root from 179.40.43.1 port 45330 ssh2
2020-05-31T05:39:00.666595shield sshd\[29464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1  user=root
2020-05-31 16:18:22
45.55.233.213 attack
21 attempts against mh-ssh on cloud
2020-05-31 16:36:22
185.153.199.211 attack
May 31 10:06:15 debian-2gb-nbg1-2 kernel: \[13171152.227174\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.211 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=38658 PROTO=TCP SPT=48346 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-31 16:34:20
104.27.169.41 attackspambots
https://kamodityle.xyz/?troy_xoiLpOkM4d3tToEM0bfqxYkMR_Aq73iL7anM4Qoh7GTMRfr-
2020-05-31 16:54:05
106.12.56.41 attackbotsspam
May 31 10:10:01 santamaria sshd\[11491\]: Invalid user titanic from 106.12.56.41
May 31 10:10:01 santamaria sshd\[11491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.41
May 31 10:10:03 santamaria sshd\[11491\]: Failed password for invalid user titanic from 106.12.56.41 port 35850 ssh2
...
2020-05-31 16:50:30
106.13.106.27 attackbotsspam
Bruteforce detected by fail2ban
2020-05-31 16:22:38
129.28.192.71 attackbots
May 31 07:09:17 vps687878 sshd\[23723\]: Invalid user emuchesia from 129.28.192.71 port 47656
May 31 07:09:17 vps687878 sshd\[23723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.192.71
May 31 07:09:19 vps687878 sshd\[23723\]: Failed password for invalid user emuchesia from 129.28.192.71 port 47656 ssh2
May 31 07:14:14 vps687878 sshd\[24228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.192.71  user=root
May 31 07:14:16 vps687878 sshd\[24228\]: Failed password for root from 129.28.192.71 port 41350 ssh2
...
2020-05-31 16:19:53

Recently Reported IPs

14.212.55.247 2606:4700:10::6814:5759 2606:4700:10::6814:6930 2606:4700:10::ac43:2378
121.204.209.130 43.248.102.159 176.65.139.229 2606:4700:10::6814:8543
2606:4700:10::ac43:2169 2606:4700:10::6816:2213 34.156.121.237 130.211.60.111
121.234.219.99 203.194.119.121 192.168.178.179 193.185.140.118
192.154.143.254 43.163.4.179 10.164.101.139 180.93.128.189