Hi,
The IP 193.70.109.193 has just been banned by Fail2Ban after
5 attempts against SSH.
Here is more information about 193.70.109.193:
[Querying whois.ripe.net]
[whois.ripe.net]
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '193.70.109.128 - 193.70.109.255'
% Abuse contact for '193.70.109.128 - 193.70.109.255' is 'abuse@ovh.net'
inetnum: 193.70.109.128 - 193.70.109.255
netname: OVH-DEDICATED-193-70-109-128-FO
descr: Ips failover
country: NL
org: ORG-OB14-RIPE
admin-c: OTC7-RIPE
tech-c: OTC7-RIPE
status: ASSIGNED PA
mnt-by: OVH-MNT
created: 2016-11-28T13:51:19Z
last-modified: 2016-11-28T13:51:19Z
source: RIPE
organisation: ORG-OB14-RIPE
org-name: OVH BV
org-type: OTHER
address: Corkstraat 46
address: 3047 AC Rotterdam
address: The Netherlands
mnt-ref: OVH-MNT
mnt-by: OVH-MNT
created: 2009-03-18T15:51:01Z
last-modified: 2017-10-30T16:12:36Z
source: RIPE # Filtered
role: OVH NL Technical Contact
address: OVH BV
address: Corkstraat 46
address: 3047 AC Rotterdam
address: The Netherlands
admin-c: OK217-RIPE
tech-c: GM84-RIPE
nic-hdl: OTC7-RIPE
abuse-mailbox: abuse@ovh.net
mnt-by: OVH-MNT
created: 2009-03-18T15:51:01Z
last-modified: 2009-03-18T15:51:01Z
source: RIPE # Filtered
% Information related to '193.70.0.0/17AS16276'
route: 193.70.0.0/17
descr: OVH
origin: AS16276
mnt-by: OVH-MNT
created: 2016-10-07T08:51:27Z
last-modified: 2016-10-07T08:51:27Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.93.2 (WAGYU)
Regards,
Fail2Ban
No comments:
Post a Comment