City: unknown
Region: unknown
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '92.118.39.0 - 92.118.39.255'
% Abuse contact for '92.118.39.0 - 92.118.39.255' is 'dmzhostabuse@gmail.com'
inetnum: 92.118.39.0 - 92.118.39.255
org: ORG-DL591-RIPE
netname: DMZHOST
descr: https://dmzhost.co
country: NL
admin-c: ACRO57756-RIPE
tech-c: ACRO57756-RIPE
status: ASSIGNED PA
created: 2021-10-29T18:07:41Z
last-modified: 2024-11-21T09:33:40Z
source: RIPE
mnt-by: CYBR-DMZ
mnt-by: TECHOFF-MNT
organisation: ORG-DL591-RIPE
mnt-ref: MNT-NETERRA
org-name: DMZHOST
org-type: OTHER
address: 35 Firs Avenue, London, England, N11 3NE
country: GB
abuse-c: ACRO57756-RIPE
mnt-ref: CYBR-DMZ
mnt-by: CYBR-DMZ
created: 2024-10-04T20:10:55Z
last-modified: 2024-10-04T21:36:05Z
source: RIPE # Filtered
role: Abuse contact role object
address: Damrak 8. Amsterdam
abuse-mailbox: dmzhostabuse@gmail.com
nic-hdl: ACRO57756-RIPE
mnt-by: CYBR-DMZ
created: 2024-10-04T20:10:42Z
last-modified: 2024-10-04T20:10:55Z
source: RIPE # Filtered
% Information related to '92.118.39.0/24AS47890'
route: 92.118.39.0/24
origin: AS47890
mnt-by: UNMANAGED
mnt-by: ro-btel2-1-mnt
created: 2022-08-06T20:30:04Z
last-modified: 2022-08-06T20:30:04Z
source: RIPE
% Information related to '92.118.39.0/24AS48090'
route: 92.118.39.0/24
origin: AS48090
mnt-by: UNMANAGED
mnt-by: ro-btel2-1-mnt
created: 2021-10-28T17:46:04Z
last-modified: 2021-10-28T17:46:04Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.118.39.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.118.39.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 18:01:00 CST 2026
;; MSG SIZE rcvd: 106
b'Host 194.39.118.92.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 194.39.118.92.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.72.104.249 | attackbotsspam | 20 attempts against mh_ha-misbehave-ban on oak |
2020-10-06 07:45:25 |
| 139.99.121.6 | attackspambots | 139.99.121.6 - - [06/Oct/2020:00:21:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.121.6 - - [06/Oct/2020:00:21:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2257 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.121.6 - - [06/Oct/2020:00:21:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2253 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 07:56:46 |
| 140.143.24.46 | attack | Oct 5 22:51:36 raspberrypi sshd[21550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.24.46 user=root Oct 5 22:51:38 raspberrypi sshd[21550]: Failed password for invalid user root from 140.143.24.46 port 53286 ssh2 ... |
2020-10-06 07:45:37 |
| 157.55.39.53 | attack | Automatic report - Banned IP Access |
2020-10-06 07:43:31 |
| 188.166.185.157 | attackbotsspam | $f2bV_matches |
2020-10-06 07:58:59 |
| 84.52.85.204 | attack | Oct 6 01:01:38 rancher-0 sshd[488687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.85.204 user=root Oct 6 01:01:40 rancher-0 sshd[488687]: Failed password for root from 84.52.85.204 port 49780 ssh2 ... |
2020-10-06 07:29:05 |
| 51.81.82.253 | attackbotsspam | xmlrpc attack |
2020-10-06 07:54:37 |
| 106.77.48.250 | attackbotsspam | 20/10/4@16:38:25: FAIL: Alarm-Intrusion address from=106.77.48.250 20/10/4@16:38:26: FAIL: Alarm-Intrusion address from=106.77.48.250 ... |
2020-10-06 07:38:08 |
| 220.133.226.180 | attackbotsspam | SP-Scan 24363:5555 detected 2020.10.05 09:12:05 blocked until 2020.11.24 01:14:52 |
2020-10-06 07:37:21 |
| 193.112.54.190 | attackspam | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-05T23:48:55Z |
2020-10-06 07:54:52 |
| 202.152.44.202 | attack | 1601843897 - 10/04/2020 22:38:17 Host: 202.152.44.202/202.152.44.202 Port: 445 TCP Blocked ... |
2020-10-06 07:43:17 |
| 74.120.14.49 | attackspam | Failed password for invalid user from 74.120.14.49 port 51308 ssh2 |
2020-10-06 07:30:04 |
| 101.99.23.157 | attack | Unauthorized connection attempt from IP address 101.99.23.157 on Port 445(SMB) |
2020-10-06 07:24:25 |
| 183.47.40.37 | attackbots | SSH login attempts. |
2020-10-06 07:41:31 |
| 46.101.184.178 | attackspam | Oct 5 12:07:00 Tower sshd[33162]: Connection from 46.101.184.178 port 47302 on 192.168.10.220 port 22 rdomain "" Oct 5 12:07:01 Tower sshd[33162]: Failed password for root from 46.101.184.178 port 47302 ssh2 Oct 5 12:07:01 Tower sshd[33162]: Received disconnect from 46.101.184.178 port 47302:11: Bye Bye [preauth] Oct 5 12:07:01 Tower sshd[33162]: Disconnected from authenticating user root 46.101.184.178 port 47302 [preauth] |
2020-10-06 07:33:00 |