城市(city): Saint Petersburg
省份(region): St. Petersburg
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '79.134.196.144 - 79.134.196.151'
% Abuse contact for '79.134.196.144 - 79.134.196.151' is 'abuse@obit.ru'
inetnum: 79.134.196.144 - 79.134.196.151
netname: MPOINT-LAN
descr: MPOINT network
descr: Obit Telecommunications
descr: St.Petersburg
country: RU
admin-c: DG2069-RIPE
tech-c: NOC2222-RIPE
status: ASSIGNED PA
mnt-by: OBIT-MNT
created: 2014-04-15T17:12:22Z
last-modified: 2014-04-15T17:12:22Z
source: RIPE
role: Network Coordination Centre
address: Obit Telecommunications Ltd.
address: Ligovsky pr., 13-15
address: 191014, Russia, St.Petersburg
phone: +78126220003
fax-no: +78126220001
remarks: trouble: -------------------------------------------------
remarks: trouble: noc@obit.ru - for peering/backbone issues
remarks: trouble: abuse@obit.ru - for security, spam issues
remarks: trouble: -------------------------------------------------
admin-c: DG2069-RIPE
tech-c: DG2069-RIPE
nic-hdl: NOC2222-RIPE
mnt-by: OBIT-MNT
created: 2005-01-27T07:17:19Z
last-modified: 2023-06-06T08:31:36Z
source: RIPE # Filtered
abuse-mailbox: abuse@obit.ru
person: Dmitri Gorislavski
address: Ligovsky pr., 13-15
address: 191014, Russia, St.Petersburg
phone: +78126220000
fax-no: +78126220001
nic-hdl: DG2069-RIPE
mnt-by: OBIT-MNT
created: 2005-01-26T12:08:36Z
last-modified: 2014-04-29T10:39:25Z
source: RIPE # Filtered
% Information related to '79.134.196.0/24AS8492'
route: 79.134.196.0/24
descr: Obit-Telecommunications Ltd.
descr: St.Petersburg
origin: AS8492
org: ORG-OL12-RIPE
mnt-by: OBIT-MNT
created: 2014-11-07T06:55:02Z
last-modified: 2014-11-07T06:55:02Z
source: RIPE # Filtered
organisation: ORG-OL12-RIPE
org-name: "OBIT" Ltd.
country: RU
org-type: LIR
address: Ligovsky pr., 13-15
address: 191014
address: ST PETERSBURG
address: RUSSIAN FEDERATION
phone: +78126220003
fax-no: +78126220001
admin-c: DG2069-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: OBIT-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: OBIT-MNT
abuse-c: NOC2222-RIPE
created: 2005-01-26T06:11:21Z
last-modified: 2025-11-27T17:50:38Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.134.196.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;79.134.196.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 16:41:59 CST 2026
;; MSG SIZE rcvd: 107
146.196.134.79.in-addr.arpa domain name pointer 79-134-196-146.obit.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
146.196.134.79.in-addr.arpa name = 79-134-196-146.obit.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.41.216.136 | attackbotsspam | Dec 3 12:41:08 relay postfix/smtpd\[29843\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \ |
2019-12-03 20:38:01 |
| 79.135.245.89 | attackbotsspam | Dec 3 13:39:00 cp sshd[12319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.135.245.89 |
2019-12-03 20:48:34 |
| 207.180.217.207 | attack | Dec 3 05:33:04 firewall sshd[32553]: Invalid user cortier from 207.180.217.207 Dec 3 05:33:05 firewall sshd[32553]: Failed password for invalid user cortier from 207.180.217.207 port 41292 ssh2 Dec 3 05:38:58 firewall sshd[32703]: Invalid user ef from 207.180.217.207 ... |
2019-12-03 20:23:01 |
| 79.137.77.131 | attackbots | Dec 3 14:38:03 server sshd\[11753\]: Invalid user test from 79.137.77.131 Dec 3 14:38:03 server sshd\[11753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.ip-79-137-77.eu Dec 3 14:38:04 server sshd\[11753\]: Failed password for invalid user test from 79.137.77.131 port 55984 ssh2 Dec 3 14:48:49 server sshd\[14385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.ip-79-137-77.eu user=root Dec 3 14:48:51 server sshd\[14385\]: Failed password for root from 79.137.77.131 port 49922 ssh2 ... |
2019-12-03 20:14:03 |
| 104.131.46.166 | attackbots | Dec 3 12:35:58 ArkNodeAT sshd\[12982\]: Invalid user dethorey from 104.131.46.166 Dec 3 12:35:58 ArkNodeAT sshd\[12982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 Dec 3 12:36:00 ArkNodeAT sshd\[12982\]: Failed password for invalid user dethorey from 104.131.46.166 port 48460 ssh2 |
2019-12-03 20:13:14 |
| 106.13.72.95 | attackbotsspam | Dec 3 08:11:21 OPSO sshd\[14755\]: Invalid user reliant from 106.13.72.95 port 58024 Dec 3 08:11:21 OPSO sshd\[14755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.95 Dec 3 08:11:23 OPSO sshd\[14755\]: Failed password for invalid user reliant from 106.13.72.95 port 58024 ssh2 Dec 3 08:19:47 OPSO sshd\[16867\]: Invalid user pass123467 from 106.13.72.95 port 60336 Dec 3 08:19:47 OPSO sshd\[16867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.95 |
2019-12-03 20:21:19 |
| 77.247.110.58 | attackbots | 12/03/2019-04:40:09.746971 77.247.110.58 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner) |
2019-12-03 20:13:31 |
| 51.68.190.223 | attack | Dec 3 13:12:22 sbg01 sshd[19361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223 Dec 3 13:12:25 sbg01 sshd[19361]: Failed password for invalid user mysql from 51.68.190.223 port 35266 ssh2 Dec 3 13:17:48 sbg01 sshd[19381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223 |
2019-12-03 20:25:45 |
| 123.206.81.109 | attackbotsspam | Dec 3 08:51:44 eventyay sshd[17800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.81.109 Dec 3 08:51:46 eventyay sshd[17800]: Failed password for invalid user vignerot from 123.206.81.109 port 51706 ssh2 Dec 3 08:59:19 eventyay sshd[18062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.81.109 ... |
2019-12-03 20:38:31 |
| 180.76.53.114 | attackspam | Dec 3 08:09:29 xeon sshd[32037]: Failed password for invalid user server from 180.76.53.114 port 41870 ssh2 |
2019-12-03 20:28:05 |
| 106.75.240.46 | attack | Dec 3 12:36:23 vpn01 sshd[32468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.46 Dec 3 12:36:25 vpn01 sshd[32468]: Failed password for invalid user mafia from 106.75.240.46 port 53058 ssh2 ... |
2019-12-03 20:35:39 |
| 103.92.24.246 | attackbotsspam | Dec 3 13:00:28 meumeu sshd[28358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.246 Dec 3 13:00:30 meumeu sshd[28358]: Failed password for invalid user optimized from 103.92.24.246 port 34344 ssh2 Dec 3 13:08:44 meumeu sshd[29699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.246 ... |
2019-12-03 20:20:11 |
| 80.211.94.183 | attack | fail2ban |
2019-12-03 20:33:56 |
| 45.32.230.208 | attackspam | B: Abusive content scan (200) |
2019-12-03 20:32:03 |
| 37.28.168.223 | attack | Autoban 37.28.168.223 ABORTED AUTH |
2019-12-03 20:27:50 |