Hi,
The IP 194.7.53.66 has just been banned by Fail2Ban after
5 attempts against SSH.
Here is more information about 194.7.53.66:
[Querying whois.ripe.net]
[whois.ripe.net]
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '194.7.53.64 - 194.7.53.127'
% Abuse contact for '194.7.53.64 - 194.7.53.127' is 'abuse@be.verizon.com'
inetnum: 194.7.53.64 - 194.7.53.127
netname: UU-194-7-53-64
descr: Verizon Business
descr: Machelen-diegem, be
country: BE
admin-c: PVH87-RIPE
tech-c: PVH87-RIPE
status: ASSIGNED PA
mnt-by: AS2822-MNT
created: 2011-01-19T09:40:21Z
last-modified: 2011-01-19T09:40:21Z
source: RIPE # Filtered
person: Peter Van Hove
address: Verizon Business
address: Culliganlaan 2H
address: Machelen-diegem 1831
address: be
phone: +32 496574005
fax-no: +32 16287190
nic-hdl: PVH87-RIPE
mnt-by: AS2822-MNT
created: 2011-01-19T09:40:21Z
last-modified: 2011-01-19T09:40:21Z
source: RIPE # Filtered
% Information related to '194.7.0.0/16AS2822'
route: 194.7.0.0/16
descr: INNET-BLOCK
origin: AS2822
remarks: CIDR all the way down
mnt-by: AS2822-MNT
mnt-by: WCOM-EMEA-RICE-MNT
created: 2001-10-25T09:55:11Z
last-modified: 2017-01-03T09:57:42Z
source: RIPE # Filtered
% Information related to '194.7.0.0/16AS702'
route: 194.7.0.0/16
descr: BE PA route
origin: AS702
holes: 194.7.112.0/22
holes: 194.7.124.240/28
holes: 194.7.243.224/28
member-of: AS702:RS-BE
member-of: AS702:RS-BE-PA
inject: upon static
aggr-mtd: outbound
mnt-routes: FORTIS-MNT {194.7.112.0/22^+, 194.7.124.240/28^+, 194.7.243.224/28^+}
mnt-by: WCOM-EMEA-RICE-MNT
created: 2005-04-07T05:05:44Z
last-modified: 2017-01-03T10:02:46Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.93.2 (ANGUS)
Regards,
Fail2Ban
No comments:
Post a Comment