City: Győr
Region: Győr-Moson-Sopron megye
Country: Hungary
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '94.248.128.0 - 94.248.159.255'
% Abuse contact for '94.248.128.0 - 94.248.159.255' is 'webadmin@kabelnet.hu'
inetnum: 94.248.128.0 - 94.248.159.255
netname: VIDANET
descr: Vidanet Cabletelevision Provider Ltd.
org: ORG-VCPL1-RIPE
country: HU
admin-c: VDN15-RIPE
tech-c: VDN15-RIPE
status: ASSIGNED PA
mnt-by: MNT-PORION
created: 2008-09-12T10:08:26Z
last-modified: 2016-12-08T08:39:59Z
source: RIPE # Filtered
organisation: ORG-VCPL1-RIPE
org-name: Vidanet Cabletelevision Provider Ltd.
org-type: OTHER
address: Orgona u. 10.
address: H-9024 Gyor
address: Hungary
phone: +36 96 426 360
fax-no: +36 96 514 724
abuse-c: VAH19-RIPE
admin-c: VDN15-RIPE
tech-c: VDN15-RIPE
mnt-ref: MNT-PORION
mnt-by: MNT-PORION
created: 2016-12-07T13:23:51Z
last-modified: 2016-12-08T08:35:23Z
source: RIPE # Filtered
role: Vidanet Network Administrator
address: Vidanet Cabletelevison Provider Ltd.
address: Orgona u. 10.
address: H-9024 Gyor
address: Hungary
phone: +36 96 426 360
fax-no: +36 96 514 724
admin-c: TH460-RIPE
tech-c: TH460-RIPE
nic-hdl: VDN15-RIPE
mnt-by: MNT-PORION
created: 2008-03-17T14:21:40Z
last-modified: 2018-01-08T10:14:00Z
source: RIPE # Filtered
% Information related to '94.248.128.0/19AS43529'
route: 94.248.128.0/19
descr: ViDanet
origin: AS43529
mnt-by: MNT-PORION
created: 2008-09-12T10:11:42Z
last-modified: 2008-09-12T10:11:42Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.248.128.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.248.128.97. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 08:44:50 CST 2026
;; MSG SIZE rcvd: 106
97.128.248.94.in-addr.arpa domain name pointer host-94-248-128-97.kabelnet.hu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
97.128.248.94.in-addr.arpa name = host-94-248-128-97.kabelnet.hu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.180.147 | attackspam | Jun 15 21:38:34 home sshd[6789]: Failed password for root from 222.186.180.147 port 47500 ssh2 Jun 15 21:38:47 home sshd[6789]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 47500 ssh2 [preauth] Jun 15 21:38:53 home sshd[6806]: Failed password for root from 222.186.180.147 port 45404 ssh2 ... |
2020-06-16 03:47:08 |
| 45.125.222.120 | attackbotsspam | Jun 15 21:22:14 vps647732 sshd[415]: Failed password for root from 45.125.222.120 port 48016 ssh2 ... |
2020-06-16 03:31:16 |
| 45.249.79.149 | attack | Invalid user nst from 45.249.79.149 port 41580 |
2020-06-16 03:38:10 |
| 123.13.203.67 | attack | Jun 15 20:16:36 vmi345603 sshd[15176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.13.203.67 Jun 15 20:16:37 vmi345603 sshd[15176]: Failed password for invalid user Jordan from 123.13.203.67 port 47781 ssh2 ... |
2020-06-16 03:19:48 |
| 109.242.38.99 | attackbots | Automatic report - Port Scan Attack |
2020-06-16 03:42:56 |
| 92.222.156.151 | attackbotsspam | Jun 15 18:38:41 XXX sshd[23735]: Invalid user patrick from 92.222.156.151 port 57338 |
2020-06-16 03:14:26 |
| 49.234.28.109 | attackspam | Jun 15 09:36:25 ny01 sshd[2399]: Failed password for root from 49.234.28.109 port 41344 ssh2 Jun 15 09:40:45 ny01 sshd[2958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109 Jun 15 09:40:48 ny01 sshd[2958]: Failed password for invalid user SSH-2.0-OpenSSH_7.2p2 from 49.234.28.109 port 58082 ssh2 |
2020-06-16 03:14:45 |
| 93.56.160.103 | attack | Unauthorized connection attempt from IP address 93.56.160.103 on Port 445(SMB) |
2020-06-16 03:11:27 |
| 138.68.21.125 | attackbots | Jun 15 22:50:13 NG-HHDC-SVS-001 sshd[6818]: Invalid user calista from 138.68.21.125 ... |
2020-06-16 03:22:09 |
| 194.44.160.246 | attackspambots | DATE:2020-06-15 14:14:36, IP:194.44.160.246, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq) |
2020-06-16 03:27:43 |
| 106.222.18.220 | attackbotsspam | 20/6/15@08:14:50: FAIL: Alarm-Intrusion address from=106.222.18.220 ... |
2020-06-16 03:24:06 |
| 40.118.226.96 | attack | Jun 15 20:23:53 mail sshd\[18358\]: Invalid user subhana from 40.118.226.96 Jun 15 20:23:53 mail sshd\[18358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96 Jun 15 20:23:55 mail sshd\[18358\]: Failed password for invalid user subhana from 40.118.226.96 port 52446 ssh2 ... |
2020-06-16 03:48:01 |
| 124.239.168.74 | attackbotsspam | Fail2Ban - SSH Bruteforce Attempt |
2020-06-16 03:43:56 |
| 162.241.97.7 | attackbots | Jun 15 10:10:23 NPSTNNYC01T sshd[16575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.97.7 Jun 15 10:10:25 NPSTNNYC01T sshd[16575]: Failed password for invalid user mms from 162.241.97.7 port 35516 ssh2 Jun 15 10:13:50 NPSTNNYC01T sshd[16840]: Failed password for root from 162.241.97.7 port 58662 ssh2 ... |
2020-06-16 03:16:27 |
| 167.99.170.83 | attackbotsspam | "Unauthorized connection attempt on SSHD detected" |
2020-06-16 03:35:47 |