Hi,
The IP 91.134.180.162 has just been banned by Fail2Ban after
5 attempts against SSH.
Here is more information about 91.134.180.162:
[Querying whois.ripe.net]
[whois.ripe.net]
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '91.134.180.128 - 91.134.180.255'
% Abuse contact for '91.134.180.128 - 91.134.180.255' is 'abuse@ovh.net'
inetnum: 91.134.180.128 - 91.134.180.255
netname: OVH-DEDICATED-91-134-180-128-FO
descr: Ips failover
country: IT
org: ORG-OS43-RIPE
admin-c: OTC5-RIPE
tech-c: OTC5-RIPE
status: ASSIGNED PA
mnt-by: OVH-MNT
created: 2016-05-07T21:10:20Z
last-modified: 2016-05-07T21:10:20Z
source: RIPE
organisation: ORG-OS43-RIPE
org-name: OVH Srl
org-type: OTHER
address: Via trieste 25
address: 20097 San Donato Milanese
address: Italia
mnt-ref: OVH-MNT
mnt-by: OVH-MNT
created: 2008-09-16T16:36:14Z
last-modified: 2017-10-30T16:11:56Z
source: RIPE # Filtered
role: OVH IT Technical Contact
address: OVH Srl
address: Via trieste 25
address: 20097 San Donato Milanese
address: Italia
admin-c: OK217-RIPE
tech-c: GM84-RIPE
nic-hdl: OTC5-RIPE
abuse-mailbox: abuse@ovh.net
mnt-by: OVH-MNT
created: 2008-09-16T16:47:07Z
last-modified: 2008-09-16T16:49:02Z
source: RIPE # Filtered
% Information related to '91.134.0.0/16AS16276'
route: 91.134.0.0/16
origin: AS16276
mnt-by: OVH-MNT
created: 2016-04-15T11:43:03Z
last-modified: 2016-04-15T11:43:03Z
source: RIPE
descr: OVH
% This query was served by the RIPE Database Query Service version 1.90 (ANGUS)
Regards,
Fail2Ban
No comments:
Post a Comment