City: Florence
Region: Tuscany
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '94.34.0.0 - 94.35.255.255'
% Abuse contact for '94.34.0.0 - 94.35.255.255' is 'abuse@tiscali.com'
inetnum: 94.34.0.0 - 94.35.255.255
netname: IT-LINKEM-20080514
country: IT
org: ORG-LS34-RIPE
admin-c: MS54204-RIPE
tech-c: MS54204-RIPE
status: ALLOCATED PA
mnt-by: SHELLNET-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2025-05-22T15:12:28Z
last-modified: 2025-05-22T15:12:28Z
source: RIPE
organisation: ORG-LS34-RIPE
org-name: SHELLNET SOCIETA' IN ACCOMANDITA PER AZIONI DI SHELLNET GP S.R.L.
country: IT
org-type: LIR
address: VIALE GIORGIO RIBOTTA 35
address: 00144
address: Rome
address: ITALY
phone: +39 070 46011
reg-nr: 13456840159
admin-c: MS54204-RIPE
abuse-c: TAT24-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: SHELLNET-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SHELLNET-MNT
created: 2007-10-08T10:11:12Z
last-modified: 2026-04-29T05:23:18Z
source: RIPE # Filtered
person: Maurizio Scano
address: Tiscali Italia SpA
address: SS. 195 Km. 2,300
address: 09122 Cagliari
address: Sardinia - Italy
remarks: Network Engineer
phone: +39 070 46011
fax-no: +39 070 4609115
nic-hdl: MS54204-RIPE
created: 2022-04-04T10:18:01Z
last-modified: 2023-12-12T15:45:12Z
source: RIPE # Filtered
mnt-by: AS8612-MNT
% Information related to '94.34.0.0/16AS8612'
route: 94.34.0.0/16
origin: AS8612
mnt-by: AS8612-MNT
created: 2024-07-12T13:47:30Z
last-modified: 2024-07-12T13:47:30Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.34.167.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.34.167.110. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 18:51:24 CST 2026
;; MSG SIZE rcvd: 106
110.167.34.94.in-addr.arpa domain name pointer dynamic-adsl-94-34-167-110.clienti.tiscali.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
110.167.34.94.in-addr.arpa name = dynamic-adsl-94-34-167-110.clienti.tiscali.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.141.166.170 | attackspambots | Jun 26 15:35:46 hell sshd[6489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.141.166.170 Jun 26 15:35:47 hell sshd[6489]: Failed password for invalid user neve from 200.141.166.170 port 58246 ssh2 ... |
2020-06-26 23:32:11 |
| 89.248.171.181 | attack | (smtpauth) Failed SMTP AUTH login from 89.248.171.181 (NL/Netherlands/no-reverse-dns-configured.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-26 16:06:34 login authenticator failed for (ADMIN) [89.248.171.181]: 535 Incorrect authentication data (set_id=phtd@toliddaru.ir) |
2020-06-26 23:05:28 |
| 139.155.35.47 | attack | 5x Failed Password |
2020-06-26 23:31:07 |
| 139.59.3.114 | attack | Invalid user firewall from 139.59.3.114 port 33471 |
2020-06-26 22:58:46 |
| 54.38.36.210 | attackspambots | Jun 26 08:49:27 Tower sshd[7764]: Connection from 54.38.36.210 port 32858 on 192.168.10.220 port 22 rdomain "" Jun 26 08:49:29 Tower sshd[7764]: Invalid user julia from 54.38.36.210 port 32858 Jun 26 08:49:29 Tower sshd[7764]: error: Could not get shadow information for NOUSER Jun 26 08:49:29 Tower sshd[7764]: Failed password for invalid user julia from 54.38.36.210 port 32858 ssh2 Jun 26 08:49:29 Tower sshd[7764]: Received disconnect from 54.38.36.210 port 32858:11: Bye Bye [preauth] Jun 26 08:49:29 Tower sshd[7764]: Disconnected from invalid user julia 54.38.36.210 port 32858 [preauth] |
2020-06-26 23:06:12 |
| 218.92.0.224 | attackbotsspam | W 5701,/var/log/auth.log,-,- |
2020-06-26 23:14:36 |
| 219.77.79.82 | attackspambots | Port probing on unauthorized port 5555 |
2020-06-26 22:45:44 |
| 58.33.31.172 | attackbots | Jun 26 13:26:51 serwer sshd\[9453\]: Invalid user hadoop from 58.33.31.172 port 45952 Jun 26 13:26:51 serwer sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.172 Jun 26 13:26:53 serwer sshd\[9453\]: Failed password for invalid user hadoop from 58.33.31.172 port 45952 ssh2 ... |
2020-06-26 23:31:57 |
| 218.92.0.184 | attackspambots | Jun 26 12:15:12 firewall sshd[10073]: Failed password for root from 218.92.0.184 port 61002 ssh2 Jun 26 12:15:16 firewall sshd[10073]: Failed password for root from 218.92.0.184 port 61002 ssh2 Jun 26 12:15:20 firewall sshd[10073]: Failed password for root from 218.92.0.184 port 61002 ssh2 ... |
2020-06-26 23:22:13 |
| 183.56.201.121 | attackbotsspam | $f2bV_matches |
2020-06-26 23:11:07 |
| 125.160.196.89 | attackbotsspam |
|
2020-06-26 23:12:24 |
| 103.141.165.35 | attack | Jun 26 11:20:52 ip-172-31-61-156 sshd[10203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.165.35 Jun 26 11:20:52 ip-172-31-61-156 sshd[10203]: Invalid user oracle from 103.141.165.35 Jun 26 11:20:55 ip-172-31-61-156 sshd[10203]: Failed password for invalid user oracle from 103.141.165.35 port 41458 ssh2 Jun 26 11:27:12 ip-172-31-61-156 sshd[10466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.165.35 user=root Jun 26 11:27:14 ip-172-31-61-156 sshd[10466]: Failed password for root from 103.141.165.35 port 58642 ssh2 ... |
2020-06-26 23:14:00 |
| 37.252.187.140 | attackspam | k+ssh-bruteforce |
2020-06-26 22:46:58 |
| 112.6.44.28 | attack | Brute force attempt |
2020-06-26 22:54:24 |
| 222.186.175.215 | attackbots | Jun 26 21:56:51 itv-usvr-02 sshd[10761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Jun 26 21:56:52 itv-usvr-02 sshd[10761]: Failed password for root from 222.186.175.215 port 41576 ssh2 |
2020-06-26 23:01:30 |