City: Barbentane
Region: Provence-Alpes-Côte d'Azur
Country: France
Internet Service Provider: SFR
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '109.20.0.0 - 109.23.255.255'
% Abuse contact for '109.20.0.0 - 109.23.255.255' is 'abuse@gaoland.net'
inetnum: 109.20.0.0 - 109.23.255.255
netname: N9UF-DYN-DSL
descr: Dynamic pools
country: FR
admin-c: LD699-RIPE
tech-c: LDC76-RIPE
remarks: ***********************************
remarks: * Abuse e-mail: abuse@gaoland.net *
remarks: ***********************************
status: ASSIGNED PA
mnt-by: LDCOM-MNT
created: 2011-09-27T15:35:19Z
last-modified: 2011-09-27T15:35:19Z
source: RIPE # Filtered
role: SFR Legal Contact
address: Campus SFR
address: 12 rue Jean-Philippe Rameau
address: CS 80001
address: 93634 La-Plaine-Saint-Denis Cedex
address: France
phone: +33 1 70 18 52 00
admin-c: LDC76-RIPE
admin-c: HS10001-RIPE
tech-c: HS10001-RIPE
nic-hdl: LD699-RIPE
abuse-mailbox: abuse@gaoland.net
mnt-by: LDCOM-MNT
created: 2003-10-23T09:15:54Z
last-modified: 2023-09-18T07:21:21Z
source: RIPE # Filtered
role: SFR Tech Contact (formerly Neuf Cegetel / LDCOM Networks)
address: SFR
address: CAMPUS SFR
address: 16 rue du General Alain de Boissieu
address: CS 68217
address: 75741 PARIS CEDEX 15
address: France
phone: +33 1 85 06 00 00
admin-c: LD699-RIPE
admin-c: HS10001-RIPE
tech-c: DG1056-RIPE
nic-hdl: LDC76-RIPE
abuse-mailbox: abuse@gaoland.net
mnt-by: LDCOM-MNT
created: 2001-12-20T14:34:14Z
last-modified: 2024-11-19T08:08:19Z
source: RIPE # Filtered
% Information related to '109.0.0.0/11AS15557'
route: 109.0.0.0/11
descr: SFR Altice France
origin: AS15557
mnt-by: SFR-MNT
created: 2009-08-13T14:35:50Z
last-modified: 2025-11-14T07:57:07Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.22.68.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.22.68.67. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 08:21:00 CST 2026
;; MSG SIZE rcvd: 105
67.68.22.109.in-addr.arpa domain name pointer 67.68.22.109.rev.sfr.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
67.68.22.109.in-addr.arpa name = 67.68.22.109.rev.sfr.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.220.102.253 | attack | "fail2ban match" |
2020-09-20 07:52:24 |
| 34.95.29.237 | attackspam | Sep 19 21:00:31 scw-focused-cartwright sshd[30926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.95.29.237 Sep 19 21:00:33 scw-focused-cartwright sshd[30926]: Failed password for invalid user admin from 34.95.29.237 port 41966 ssh2 |
2020-09-20 07:33:33 |
| 49.233.177.173 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-20 07:40:18 |
| 113.254.111.246 | attackbotsspam | Sep 19 17:00:41 scw-focused-cartwright sshd[26479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.254.111.246 Sep 19 17:00:42 scw-focused-cartwright sshd[26479]: Failed password for invalid user admin from 113.254.111.246 port 34686 ssh2 |
2020-09-20 07:48:59 |
| 27.115.117.6 | attackspambots | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-20 07:31:09 |
| 134.19.146.45 | attackbots | Fail2Ban Ban Triggered (2) |
2020-09-20 07:47:20 |
| 80.76.242.122 | attackspam | Brute forcing RDP port 3389 |
2020-09-20 07:49:31 |
| 116.206.232.11 | attack | Unauthorized connection attempt from IP address 116.206.232.11 on Port 445(SMB) |
2020-09-20 07:42:41 |
| 179.33.139.66 | attackspam | Brute-force attempt banned |
2020-09-20 07:34:50 |
| 222.117.154.77 | attackbots | Sep 19 00:47:01 roki-contabo sshd\[1801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.117.154.77 user=root Sep 19 00:47:03 roki-contabo sshd\[1801\]: Failed password for root from 222.117.154.77 port 57608 ssh2 Sep 19 19:00:52 roki-contabo sshd\[28247\]: Invalid user admin from 222.117.154.77 Sep 19 19:00:53 roki-contabo sshd\[28247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.117.154.77 Sep 19 19:00:54 roki-contabo sshd\[28247\]: Failed password for invalid user admin from 222.117.154.77 port 59360 ssh2 ... |
2020-09-20 07:30:30 |
| 91.105.4.182 | attackspambots | Brute-force attempt banned |
2020-09-20 07:53:50 |
| 110.93.228.97 | attackspam | Brute-force attempt banned |
2020-09-20 07:39:48 |
| 51.83.57.157 | attackbotsspam | Brute-force attempt banned |
2020-09-20 07:41:42 |
| 119.200.186.168 | attack | Automatic Fail2ban report - Trying login SSH |
2020-09-20 07:39:33 |
| 75.152.22.244 | attackbotsspam | Sep 19 18:00:08 scw-focused-cartwright sshd[27547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.152.22.244 Sep 19 18:00:10 scw-focused-cartwright sshd[27547]: Failed password for invalid user admin from 75.152.22.244 port 43724 ssh2 |
2020-09-20 07:48:34 |