City: unknown
Region: unknown
Country: Russia
Internet Service Provider: MTS
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '91.76.0.0 - 91.79.255.255'
% Abuse contact for '91.76.0.0 - 91.79.255.255' is 'abuse@mtu.ru'
inetnum: 91.76.0.0 - 91.79.255.255
netname: RU-MTU-20060821
country: RU
org: ORG-ZM1-RIPE
admin-c: MTU1-RIPE
tech-c: MTU1-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MTU-NOC
mnt-lower: MTU-NOC
mnt-domains: MTU-NOC
mnt-routes: MTU-NOC
created: 2006-08-21T13:31:01Z
last-modified: 2016-05-24T10:41:13Z
source: RIPE # Filtered
organisation: ORG-ZM1-RIPE
org-name: MTS PJSC
country: RU
reg-nr: 1027700149124
org-type: LIR
address: Smolenskaya-Sennaya sq., 27 bld 2
address: 119121
address: Moscow
address: RUSSIAN FEDERATION
phone: +74957213499
fax-no: +74992318129
admin-c: LAP-RIPE
admin-c: TABY-RIPE
admin-c: LMUR-RIPE
admin-c: YUF-RIPE
admin-c: RPS-RIPE
abuse-c: MAB8359-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: MTU-NOC
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MTU-NOC
created: 2004-04-17T11:55:44Z
last-modified: 2026-05-13T07:31:05Z
source: RIPE # Filtered
role: MTS backbone NOC
address: PJSC MTS / former CJSC Comstar-Direct
address: Petrovsky blvd 12, bldg 3
address: P.O. BOX 4711 127051
address: Moscow, Russia
remarks: **************************************
remarks: Contact addresses:
remarks: routing & peering noc@mtu.ru
remarks: spam & security abuse@mtu.ru
remarks: mail postmaster@mtu.ru
remarks: ddos reports ddos-reports@mtu.ru
remarks: **************************************
phone: +7 495 721-34-99
fax-no: +7 495 956-07-07
admin-c: EDA-RIPE
admin-c: RPS-RIPE
tech-c: EDA-RIPE
nic-hdl: MTU1-RIPE
mnt-by: MTU-NOC
created: 2002-10-18T13:29:19Z
last-modified: 2022-04-08T13:50:05Z
source: RIPE # Filtered
% Information related to '91.78.0.0/15AS8359'
route: 91.78.0.0/15
descr: PJSC "MTS" MBN
origin: AS8359
mnt-by: MTU-NOC
created: 2026-05-14T12:05:31Z
last-modified: 2026-05-14T12:05:31Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122.1 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.79.146.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.79.146.72. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 12:35:13 CST 2026
;; MSG SIZE rcvd: 105
b'72.146.79.91.in-addr.arpa domain name pointer ppp91-79-146-72.pppoe.mtu-net.ru.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
72.146.79.91.in-addr.arpa name = ppp91-79-146-72.pppoe.mtu-net.ru.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 69.160.160.58 | attackbots | Attempt to use web contact page to send SPAM |
2020-05-31 16:16:24 |
| 112.198.126.124 | attack | Udp port scan atack |
2020-05-31 16:23:10 |
| 167.61.91.210 | attack | 1590897844 - 05/31/2020 06:04:04 Host: 167.61.91.210/167.61.91.210 Port: 23 TCP Blocked |
2020-05-31 16:21:38 |
| 186.122.148.9 | attack | Invalid user mky from 186.122.148.9 port 35234 |
2020-05-31 16:25:43 |
| 183.249.121.170 | attackspam |
|
2020-05-31 16:48:33 |
| 87.103.120.250 | attackspam | prod11 ... |
2020-05-31 16:28:34 |
| 208.68.39.124 | attackbotsspam | May 30 21:05:58 mockhub sshd[14637]: Failed password for root from 208.68.39.124 port 44412 ssh2 ... |
2020-05-31 16:44:55 |
| 79.121.123.160 | attack | SSH Scan |
2020-05-31 16:49:51 |
| 179.40.43.1 | attackbotsspam | 2020-05-31T05:29:20.001326shield sshd\[28486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1 user=root 2020-05-31T05:29:22.039025shield sshd\[28486\]: Failed password for root from 179.40.43.1 port 39434 ssh2 2020-05-31T05:34:07.446117shield sshd\[28816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1 user=root 2020-05-31T05:34:09.353425shield sshd\[28816\]: Failed password for root from 179.40.43.1 port 45330 ssh2 2020-05-31T05:39:00.666595shield sshd\[29464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.43.1 user=root |
2020-05-31 16:18:22 |
| 45.55.233.213 | attack | 21 attempts against mh-ssh on cloud |
2020-05-31 16:36:22 |
| 185.153.199.211 | attack | May 31 10:06:15 debian-2gb-nbg1-2 kernel: \[13171152.227174\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.211 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=38658 PROTO=TCP SPT=48346 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-31 16:34:20 |
| 104.27.169.41 | attackspambots | https://kamodityle.xyz/?troy_xoiLpOkM4d3tToEM0bfqxYkMR_Aq73iL7anM4Qoh7GTMRfr- |
2020-05-31 16:54:05 |
| 106.12.56.41 | attackbotsspam | May 31 10:10:01 santamaria sshd\[11491\]: Invalid user titanic from 106.12.56.41 May 31 10:10:01 santamaria sshd\[11491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.41 May 31 10:10:03 santamaria sshd\[11491\]: Failed password for invalid user titanic from 106.12.56.41 port 35850 ssh2 ... |
2020-05-31 16:50:30 |
| 106.13.106.27 | attackbotsspam | Bruteforce detected by fail2ban |
2020-05-31 16:22:38 |
| 129.28.192.71 | attackbots | May 31 07:09:17 vps687878 sshd\[23723\]: Invalid user emuchesia from 129.28.192.71 port 47656 May 31 07:09:17 vps687878 sshd\[23723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.192.71 May 31 07:09:19 vps687878 sshd\[23723\]: Failed password for invalid user emuchesia from 129.28.192.71 port 47656 ssh2 May 31 07:14:14 vps687878 sshd\[24228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.192.71 user=root May 31 07:14:16 vps687878 sshd\[24228\]: Failed password for root from 129.28.192.71 port 41350 ssh2 ... |
2020-05-31 16:19:53 |