City: London
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '185.248.85.0 - 185.248.85.255'
% Abuse contact for '185.248.85.0 - 185.248.85.255' is 'abuse@mullvad.net'
inetnum: 185.248.85.0 - 185.248.85.255
netname: MULLVAD
country: GB
geoloc: 51.498842 -0.014327
descr: Mullvad VPN
org: ORG-MVA21-RIPE
admin-c: MVA240-RIPE
tech-c: MVA240-RIPE
status: ASSIGNED PA
mnt-by: xtom
created: 2022-12-21T19:27:03Z
last-modified: 2022-12-21T19:27:03Z
source: RIPE
organisation: ORG-MVA21-RIPE
org-name: Mullvad VPN AB
org-type: OTHER
address: Box 53049
address: Gothenburg, 40014
address: Sweden
abuse-c: MVA240-RIPE
mnt-ref: xtom
mnt-by: xtom
created: 2021-01-05T18:36:58Z
last-modified: 2021-01-05T18:36:58Z
source: RIPE # Filtered
role: Mullvad VPN AB
address: Box 53049, SE-40014 Gothenburg
address: Sweden
abuse-mailbox: abuse@mullvad.net
nic-hdl: MVA240-RIPE
mnt-by: xtom
created: 2021-01-05T18:35:36Z
last-modified: 2021-01-05T18:35:36Z
source: RIPE # Filtered
% Information related to '185.248.85.0/24AS3214'
route: 185.248.85.0/24
origin: AS3214
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS3258'
route: 185.248.85.0/24
origin: AS3258
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS43357'
route: 185.248.85.0/24
descr: Mullvad
origin: AS43357
mnt-by: xtom
created: 2022-12-21T19:25:54Z
last-modified: 2022-12-21T19:29:42Z
source: RIPE
% Information related to '185.248.85.0/24AS4785'
route: 185.248.85.0/24
origin: AS4785
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS6233'
route: 185.248.85.0/24
origin: AS6233
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS8888'
route: 185.248.85.0/24
origin: AS8888
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS9312'
route: 185.248.85.0/24
origin: AS9312
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% Information related to '185.248.85.0/24AS949'
route: 185.248.85.0/24
origin: AS949
mnt-by: xtom
created: 2024-12-23T14:29:53Z
last-modified: 2024-12-23T14:29:53Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.248.85.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.248.85.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 14:52:36 CST 2026
;; MSG SIZE rcvd: 106
Host 22.85.248.185.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 22.85.248.185.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.135.77.101 | attack | Aug 28 15:06:05 [host] sshd[25330]: Invalid user w Aug 28 15:06:05 [host] sshd[25330]: pam_unix(sshd: Aug 28 15:06:07 [host] sshd[25330]: Failed passwor |
2020-08-28 21:22:26 |
| 51.210.5.78 | attack | Aug 28 20:13:51 webhost01 sshd[2742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.5.78 Aug 28 20:13:53 webhost01 sshd[2742]: Failed password for invalid user openvpn from 51.210.5.78 port 35346 ssh2 ... |
2020-08-28 21:28:13 |
| 221.122.78.202 | attackspambots | Aug 28 17:35:16 gw1 sshd[26663]: Failed password for root from 221.122.78.202 port 64350 ssh2 ... |
2020-08-28 21:51:30 |
| 185.123.164.54 | attack | Aug 28 14:17:22 h2646465 sshd[9280]: Invalid user min from 185.123.164.54 Aug 28 14:17:22 h2646465 sshd[9280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54 Aug 28 14:17:22 h2646465 sshd[9280]: Invalid user min from 185.123.164.54 Aug 28 14:17:23 h2646465 sshd[9280]: Failed password for invalid user min from 185.123.164.54 port 36849 ssh2 Aug 28 14:25:26 h2646465 sshd[10512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54 user=man Aug 28 14:25:28 h2646465 sshd[10512]: Failed password for man from 185.123.164.54 port 35368 ssh2 Aug 28 14:29:02 h2646465 sshd[10682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.54 user=root Aug 28 14:29:04 h2646465 sshd[10682]: Failed password for root from 185.123.164.54 port 38926 ssh2 Aug 28 14:32:45 h2646465 sshd[11312]: Invalid user romano from 185.123.164.54 ... |
2020-08-28 21:45:08 |
| 104.248.205.67 | attack | scans 2 times in preceeding hours on the ports (in chronological order) 12982 29682 resulting in total of 6 scans from 104.248.0.0/16 block. |
2020-08-28 21:43:48 |
| 187.12.181.106 | attackspam | Aug 28 14:14:46 server sshd[18820]: Failed password for invalid user andy from 187.12.181.106 port 59606 ssh2 Aug 28 14:26:46 server sshd[3258]: Failed password for root from 187.12.181.106 port 46388 ssh2 Aug 28 14:33:13 server sshd[12460]: Failed password for invalid user kafka from 187.12.181.106 port 53030 ssh2 |
2020-08-28 21:22:54 |
| 35.192.57.37 | attackbots | 2020-08-28T08:07:21.903540mail.thespaminator.com sshd[27748]: Failed password for root from 35.192.57.37 port 46558 ssh2 2020-08-28T08:10:43.806959mail.thespaminator.com sshd[28256]: Invalid user admin from 35.192.57.37 port 52844 ... |
2020-08-28 21:37:51 |
| 103.66.96.230 | attackbots | Aug 28 14:34:43 prod4 sshd\[12141\]: Invalid user porte from 103.66.96.230 Aug 28 14:34:44 prod4 sshd\[12141\]: Failed password for invalid user porte from 103.66.96.230 port 11046 ssh2 Aug 28 14:37:24 prod4 sshd\[13446\]: Invalid user python from 103.66.96.230 ... |
2020-08-28 21:57:24 |
| 218.78.46.81 | attack | Aug 27 21:10:36 Ubuntu-1404-trusty-64-minimal sshd\[3446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81 user=root Aug 27 21:10:38 Ubuntu-1404-trusty-64-minimal sshd\[3446\]: Failed password for root from 218.78.46.81 port 43741 ssh2 Aug 28 13:59:27 Ubuntu-1404-trusty-64-minimal sshd\[27296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81 user=root Aug 28 13:59:29 Ubuntu-1404-trusty-64-minimal sshd\[27296\]: Failed password for root from 218.78.46.81 port 50416 ssh2 Aug 28 14:08:28 Ubuntu-1404-trusty-64-minimal sshd\[4366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81 user=root |
2020-08-28 21:48:31 |
| 13.81.252.134 | attackspam | invalid user |
2020-08-28 21:56:59 |
| 181.48.46.195 | attackbotsspam | Aug 28 14:31:56 inter-technics sshd[10750]: Invalid user ubuntu from 181.48.46.195 port 57503 Aug 28 14:31:56 inter-technics sshd[10750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.46.195 Aug 28 14:31:56 inter-technics sshd[10750]: Invalid user ubuntu from 181.48.46.195 port 57503 Aug 28 14:31:58 inter-technics sshd[10750]: Failed password for invalid user ubuntu from 181.48.46.195 port 57503 ssh2 Aug 28 14:35:57 inter-technics sshd[10979]: Invalid user claudia from 181.48.46.195 port 60593 ... |
2020-08-28 21:42:21 |
| 181.143.122.18 | attack | port scan and connect, tcp 23 (telnet) |
2020-08-28 21:55:00 |
| 104.248.121.165 | attack | fail2ban/Aug 28 14:04:27 h1962932 sshd[8573]: Invalid user hy from 104.248.121.165 port 34572 Aug 28 14:04:27 h1962932 sshd[8573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.165 Aug 28 14:04:27 h1962932 sshd[8573]: Invalid user hy from 104.248.121.165 port 34572 Aug 28 14:04:29 h1962932 sshd[8573]: Failed password for invalid user hy from 104.248.121.165 port 34572 ssh2 Aug 28 14:08:28 h1962932 sshd[8635]: Invalid user tester from 104.248.121.165 port 41412 |
2020-08-28 21:48:55 |
| 194.35.233.105 | attackspambots | Logged into my snapchat |
2020-08-28 21:34:39 |
| 220.76.205.178 | attackbots | Repeated brute force against a port |
2020-08-28 21:26:40 |