City: unknown
Region: unknown
Country: Bulgaria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '93.123.109.0 - 93.123.109.255'
% Abuse contact for '93.123.109.0 - 93.123.109.255' is 'dmzhostabuse@gmail.com'
inetnum: 93.123.109.0 - 93.123.109.255
netname: TECHOFF_SRV_LIMITED
descr: TECHOFF_SRV_LIMITED
org: ORG-TSL73-RIPE
country: AD
admin-c: AD18161-RIPE
tech-c: AD18161-RIPE
mnt-domains: TECHOFF-MNT
mnt-routes: TECHOFF-MNT
status: ASSIGNED PA
mnt-by: MNT-NETERRA
created: 2025-02-24T11:41:37Z
last-modified: 2025-02-24T11:41:37Z
source: RIPE
organisation: ORG-TSL73-RIPE
org-name: TECHOFF SRV LIMITED
country: GB
org-type: OTHER
address: 35 Firs Avenue, London N11 3NE
abuse-c: AD18161-RIPE
mnt-ref: TECHOFF-MNT
mnt-ref: MNT-NETERRA
mnt-by: TECHOFF-MNT
created: 2024-11-20T13:01:40Z
last-modified: 2024-11-26T15:22:33Z
source: RIPE # Filtered
role: ABUSE DEP
address: 35 Firs Avenue, London N11 3NE
abuse-mailbox: dmzhostabuse@gmail.com
nic-hdl: AD18161-RIPE
mnt-by: TECHOFF-MNT
created: 2024-11-20T13:00:28Z
last-modified: 2024-11-21T09:45:52Z
source: RIPE # Filtered
% Information related to '93.123.109.0/24AS48090'
route: 93.123.109.0/24
origin: AS48090
mnt-by: TECHOFF-MNT
created: 2025-03-14T18:56:29Z
last-modified: 2025-03-14T18:56:29Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.120 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.123.109.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.123.109.67. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020202 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 03 22:00:13 CST 2026
;; MSG SIZE rcvd: 106
Host 67.109.123.93.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 67.109.123.93.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.162.79.87 | attack | Unauthorized connection attempt detected from IP address 139.162.79.87 to port 8000 [T] |
2020-05-06 08:10:09 |
| 162.243.142.97 | attackspam | Unauthorized connection attempt detected from IP address 162.243.142.97 to port 1337 [T] |
2020-05-06 08:08:58 |
| 170.130.187.34 | attack | " " |
2020-05-06 08:08:01 |
| 45.32.32.168 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.32.32.168 to port 443 [T] |
2020-05-06 08:30:35 |
| 186.93.30.147 | attackbots | Unauthorized connection attempt detected from IP address 186.93.30.147 to port 445 [T] |
2020-05-06 08:03:04 |
| 180.120.12.85 | attackbots | Unauthorized connection attempt detected from IP address 180.120.12.85 to port 8443 [T] |
2020-05-06 08:06:01 |
| 200.1.216.248 | attackbotsspam | Unauthorized connection attempt detected from IP address 200.1.216.248 to port 3389 [T] |
2020-05-06 08:40:15 |
| 139.208.104.234 | attack | Unauthorized connection attempt detected from IP address 139.208.104.234 to port 9000 [T] |
2020-05-06 08:09:46 |
| 197.232.242.105 | attack | Unauthorized connection attempt detected from IP address 197.232.242.105 to port 8080 [T] |
2020-05-06 08:02:12 |
| 120.52.121.86 | attackspambots | srv02 Mass scanning activity detected Target: 32441 .. |
2020-05-06 08:12:02 |
| 171.5.51.24 | attack | Unauthorized connection attempt detected from IP address 171.5.51.24 to port 9001 [T] |
2020-05-06 08:07:31 |
| 111.230.204.211 | attack | Unauthorized connection attempt detected from IP address 111.230.204.211 to port 23 [T] |
2020-05-06 08:18:04 |
| 185.173.35.13 | attackbots | Unauthorized connection attempt detected from IP address 185.173.35.13 to port 111 [T] |
2020-05-06 08:03:47 |
| 106.12.17.33 | attackspam | Telnet Server BruteForce Attack |
2020-05-06 08:21:47 |
| 176.125.65.150 | attackbotsspam | Unauthorized connection attempt detected from IP address 176.125.65.150 to port 80 [T] |
2020-05-06 08:07:16 |