City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '195.46.39.0 - 195.46.39.255'
% Abuse contact for '195.46.39.0 - 195.46.39.255' is 'abuse@safedns.com'
inetnum: 195.46.39.0 - 195.46.39.255
netname: SAFEDNS-ANYCAST-NET
country: DE
country: GB
country: NL
country: NZ
country: US
org: ORG-SI174-RIPE
sponsoring-org: ORG-ML847-RIPE
admin-c: SN6176-RIPE
tech-c: SN6176-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: RIPE-DB-MNT
mnt-by: SAFEDNS-MNT
mnt-routes: SAFEDNS-MNT
mnt-domains: SAFEDNS-MNT
created: 2012-03-08T10:19:05Z
last-modified: 2024-06-24T15:49:16Z
source: RIPE
organisation: ORG-SI174-RIPE
org-name: SafeDNS, Inc.
country: US
org-type: OTHER
address: 901 North Pitt Street, Suite 325
address: Alexandria, VA 22314
address: United States
abuse-c: SN6176-RIPE
mnt-ref: SAFEDNS-MNT
mnt-by: SAFEDNS-MNT
mnt-by: RIPE-DB-MNT
created: 2017-01-17T11:58:14Z
last-modified: 2024-06-21T09:56:32Z
source: RIPE # Filtered
role: SafeDNS NOC
address: 901 North Pitt Street, Suite 325
address: Alexandria, VA 22314
address: United States
abuse-mailbox: abuse@safedns.com
nic-hdl: SN6176-RIPE
mnt-by: SAFEDNS-MNT
mnt-by: RIPE-DB-MNT
created: 2017-01-17T11:53:09Z
last-modified: 2024-06-21T09:56:32Z
source: RIPE # Filtered
% Information related to '195.46.39.0/24AS57926'
route: 195.46.39.0/24
descr: SAFEDNS-ANYCAST
origin: AS57926
mnt-by: SAFEDNS-MNT
created: 2014-10-14T05:44:19Z
last-modified: 2017-04-03T10:51:38Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.46.39.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.46.39.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 10:54:14 CST 2026
;; MSG SIZE rcvd: 105
40.39.46.195.in-addr.arpa domain name pointer dns2.safedns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.39.46.195.in-addr.arpa name = dns2.safedns.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 160.16.111.215 | attack | Dec 6 22:29:51 MK-Soft-Root1 sshd[3358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.111.215 Dec 6 22:29:53 MK-Soft-Root1 sshd[3358]: Failed password for invalid user fross from 160.16.111.215 port 60306 ssh2 ... |
2019-12-07 06:36:54 |
| 202.72.243.198 | attack | Dec 6 07:55:23 php1 sshd\[8633\]: Invalid user test7 from 202.72.243.198 Dec 6 07:55:23 php1 sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198 Dec 6 07:55:24 php1 sshd\[8633\]: Failed password for invalid user test7 from 202.72.243.198 port 49930 ssh2 Dec 6 08:01:58 php1 sshd\[9447\]: Invalid user fagart from 202.72.243.198 Dec 6 08:01:58 php1 sshd\[9447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198 |
2019-12-07 06:54:06 |
| 193.31.24.113 | attackbotsspam | 12/06/2019-23:47:02.719761 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-07 06:55:46 |
| 222.186.175.140 | attackspam | Dec 7 04:03:35 gw1 sshd[18124]: Failed password for root from 222.186.175.140 port 45158 ssh2 Dec 7 04:03:48 gw1 sshd[18124]: error: maximum authentication attempts exceeded for root from 222.186.175.140 port 45158 ssh2 [preauth] ... |
2019-12-07 07:05:06 |
| 137.117.234.170 | attack | Dec 6 12:31:22 web9 sshd\[15508\]: Invalid user monkey01 from 137.117.234.170 Dec 6 12:31:22 web9 sshd\[15508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170 Dec 6 12:31:24 web9 sshd\[15508\]: Failed password for invalid user monkey01 from 137.117.234.170 port 49904 ssh2 Dec 6 12:37:43 web9 sshd\[16531\]: Invalid user crea from 137.117.234.170 Dec 6 12:37:43 web9 sshd\[16531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.117.234.170 |
2019-12-07 06:49:33 |
| 5.227.39.107 | attackbotsspam | Unauthorised access (Dec 6) SRC=5.227.39.107 LEN=52 TTL=110 ID=31942 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Dec 6) SRC=5.227.39.107 LEN=52 TTL=110 ID=18230 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-07 06:32:21 |
| 118.24.108.196 | attack | $f2bV_matches |
2019-12-07 07:03:45 |
| 52.178.134.11 | attack | 50 failed attempt(s) in the last 24h |
2019-12-07 06:41:16 |
| 43.240.8.87 | attack | Honeypot attack, port: 23, PTR: dns13.parkpage.foundationapi.com. |
2019-12-07 06:37:27 |
| 221.195.189.144 | attackspam | Dec 6 17:48:14 linuxvps sshd\[60017\]: Invalid user jader from 221.195.189.144 Dec 6 17:48:14 linuxvps sshd\[60017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.144 Dec 6 17:48:16 linuxvps sshd\[60017\]: Failed password for invalid user jader from 221.195.189.144 port 37958 ssh2 Dec 6 17:54:05 linuxvps sshd\[63302\]: Invalid user mackel from 221.195.189.144 Dec 6 17:54:05 linuxvps sshd\[63302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.144 |
2019-12-07 06:55:27 |
| 222.186.42.4 | attack | Dec 6 23:01:51 thevastnessof sshd[3376]: Failed password for root from 222.186.42.4 port 5260 ssh2 ... |
2019-12-07 07:02:33 |
| 200.51.46.243 | attackspam | T: f2b postfix aggressive 3x |
2019-12-07 06:33:31 |
| 31.211.211.76 | attackbots | 3389BruteforceFW21 |
2019-12-07 06:45:06 |
| 217.23.79.102 | attackbots | Unauthorised access (Dec 6) SRC=217.23.79.102 LEN=52 TTL=119 ID=11642 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Dec 5) SRC=217.23.79.102 LEN=52 TTL=119 ID=30814 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-07 06:38:22 |
| 157.245.73.144 | attackbots | Dec 6 09:34:59 wbs sshd\[7552\]: Invalid user ftp from 157.245.73.144 Dec 6 09:34:59 wbs sshd\[7552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144 Dec 6 09:35:01 wbs sshd\[7552\]: Failed password for invalid user ftp from 157.245.73.144 port 45896 ssh2 Dec 6 09:40:33 wbs sshd\[8269\]: Invalid user test7 from 157.245.73.144 Dec 6 09:40:33 wbs sshd\[8269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144 |
2019-12-07 06:35:28 |