City: Warsaw
Region: Mazowieckie
Country: Poland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '185.241.208.0 - 185.241.208.255'
% Abuse contact for '185.241.208.0 - 185.241.208.255' is 'abuse@as210558.net'
inetnum: 185.241.208.0 - 185.241.208.255
netname: LEET-185-241-208-0
country: DE
geofeed: https://rdp.sh/geofeed
org: ORG-SG414-RIPE
admin-c: SGAH6-RIPE
tech-c: SGAH6-RIPE
status: ASSIGNED PA
mnt-by: PREFIXBROKER-MNT
created: 2022-06-14T15:17:57Z
last-modified: 2025-04-16T07:35:23Z
source: RIPE
organisation: ORG-SG414-RIPE
org-name: 1337 Services GmbH
org-type: OTHER
address: Ludwig-Erhard-Str. 18
address: DE-20459 Hamburg
address: Germany
abuse-c: SGAH6-RIPE
mnt-ref: PREFIXBROKER-MNT
mnt-by: PREFIXBROKER-MNT
created: 2022-06-14T15:17:57Z
last-modified: 2022-06-14T15:17:57Z
source: RIPE # Filtered
role: 1337 Services GmbH abuse handling
address: Ludwig-Erhard-Str. 18
address: DE-20459 Hamburg
address: Germany
nic-hdl: SGAH6-RIPE
mnt-by: PREFIXBROKER-MNT
created: 2022-06-14T15:17:57Z
last-modified: 2022-06-14T15:17:57Z
source: RIPE # Filtered
abuse-mailbox: abuse@as210558.net
% Information related to '185.241.208.0/24AS201814'
route: 185.241.208.0/24
origin: AS201814
mnt-by: PREFIXBROKER-MNT
created: 2022-06-14T15:17:57Z
last-modified: 2022-06-14T15:17:57Z
source: RIPE
% Information related to '185.241.208.0/24AS210558'
route: 185.241.208.0/24
origin: AS210558
mnt-by: PREFIXBROKER-MNT
created: 2022-10-27T09:50:23Z
last-modified: 2022-10-27T09:50:23Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.241.208.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.241.208.155. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030600 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 14:00:52 CST 2026
;; MSG SIZE rcvd: 108
155.208.241.185.in-addr.arpa domain name pointer 185.241.208.155.powered.by.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
155.208.241.185.in-addr.arpa name = 185.241.208.155.powered.by.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.46.121.30 | attackspam | Unauthorized connection attempt from IP address 157.46.121.30 on Port 445(SMB) |
2020-09-03 07:22:43 |
| 85.239.35.72 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-03 07:21:14 |
| 184.168.152.169 | attackbots | Automatic report - XMLRPC Attack |
2020-09-03 07:45:46 |
| 217.182.68.93 | attackbotsspam | (sshd) Failed SSH login from 217.182.68.93 (FR/France/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 2 13:37:22 cvps sshd[21532]: Invalid user testmail from 217.182.68.93 Sep 2 13:37:24 cvps sshd[21532]: Failed password for invalid user testmail from 217.182.68.93 port 42694 ssh2 Sep 2 13:44:59 cvps sshd[24008]: Invalid user wenbo from 217.182.68.93 Sep 2 13:45:02 cvps sshd[24008]: Failed password for invalid user wenbo from 217.182.68.93 port 60226 ssh2 Sep 2 13:48:49 cvps sshd[25359]: Failed password for root from 217.182.68.93 port 36942 ssh2 |
2020-09-03 07:18:10 |
| 175.6.6.147 | attackbotsspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-03 07:25:47 |
| 192.144.143.101 | attackbotsspam | SSH Brute-Force. Ports scanning. |
2020-09-03 07:51:57 |
| 36.78.121.203 | attackspambots | Unauthorized connection attempt from IP address 36.78.121.203 on Port 445(SMB) |
2020-09-03 07:32:28 |
| 5.145.229.129 | attackspam | Attempted connection to port 445. |
2020-09-03 07:44:42 |
| 5.138.253.51 | attackspam | Attempted connection to port 23. |
2020-09-03 07:45:12 |
| 97.93.100.7 | attackbots | port scan and connect, tcp 443 (https) |
2020-09-03 07:34:50 |
| 103.151.184.14 | attackspambots | Unauthorized connection attempt from IP address 103.151.184.14 on Port 445(SMB) |
2020-09-03 07:49:02 |
| 118.24.30.97 | attackspam | Invalid user leon from 118.24.30.97 port 38016 |
2020-09-03 07:39:33 |
| 81.4.127.228 | attackspambots | Sep 3 01:23:59 lnxded63 sshd[19242]: Failed password for root from 81.4.127.228 port 45230 ssh2 Sep 3 01:23:59 lnxded63 sshd[19242]: Failed password for root from 81.4.127.228 port 45230 ssh2 |
2020-09-03 07:35:03 |
| 46.239.55.187 | attackbotsspam | Attempted connection to port 445. |
2020-09-03 07:46:52 |
| 175.37.149.77 | attackbotsspam | Unauthorised access (Sep 2) SRC=175.37.149.77 LEN=44 TTL=46 ID=30582 TCP DPT=8080 WINDOW=61844 SYN Unauthorised access (Sep 2) SRC=175.37.149.77 LEN=44 TTL=46 ID=51343 TCP DPT=8080 WINDOW=48001 SYN Unauthorised access (Sep 2) SRC=175.37.149.77 LEN=44 TTL=46 ID=13324 TCP DPT=8080 WINDOW=23743 SYN Unauthorised access (Sep 2) SRC=175.37.149.77 LEN=44 TTL=46 ID=226 TCP DPT=8080 WINDOW=48376 SYN Unauthorised access (Sep 1) SRC=175.37.149.77 LEN=44 TTL=47 ID=9313 TCP DPT=8080 WINDOW=61727 SYN Unauthorised access (Aug 31) SRC=175.37.149.77 LEN=44 TTL=46 ID=51951 TCP DPT=8080 WINDOW=15200 SYN Unauthorised access (Aug 30) SRC=175.37.149.77 LEN=44 TTL=46 ID=48151 TCP DPT=8080 WINDOW=20351 SYN |
2020-09-03 07:42:07 |