City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: Tele2
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '195.8.98.0 - 195.8.98.255'
% Abuse contact for '195.8.98.0 - 195.8.98.255' is 'abuse@unikom.se'
inetnum: 195.8.98.0 - 195.8.98.255
netname: OSTRAGOINGE-PI-NET
country: SE
org: ORG-OGK3-RIPE
admin-c: RW1394-RIPE
admin-c: RONI2-RIPE
tech-c: RW1394-RIPE
tech-c: RONI2-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: RESILANS-MNT
mnt-routes: RESILANS-MNT
mnt-routes: AS1257-MNT
mnt-domains: RESILANS-MNT
created: 2005-01-12T10:36:13Z
last-modified: 2024-05-23T12:43:54Z
source: RIPE # Filtered
sponsoring-org: ORG-RESI1-RIPE
organisation: ORG-OGK3-RIPE
org-name: Ostra Goinge Kommun
country: SE
org-type: OTHER
address: Storgatan 4
address: SE-280 60 Broby
address: Sweden
abuse-c: OGK6-RIPE
mnt-ref: RESILANS-MNT
mnt-by: RESILANS-MNT
created: 2014-11-18T15:13:44Z
last-modified: 2022-12-01T16:40:54Z
source: RIPE # Filtered
person: Robin Nilsson
address: IT Kommuner i Skane AB
address: Torggatan 2
address: SE-242 31 Horby
address: Sweden
phone: +46 10 219 15 77
nic-hdl: RONI2-RIPE
mnt-by: RESILANS-MNT
created: 2023-12-08T13:50:49Z
last-modified: 2024-08-15T12:29:10Z
source: RIPE # Filtered
person: Richard Wanstadius
address: Hassleholms Kommun
address: Stadshuset
address: SE-28180 Hassleholm
address: Sweden
phone: +46-451-267222
fax-no: +46-451-81406
nic-hdl: RW1394-RIPE
mnt-by: EBBnet-MNT
created: 2005-03-03T12:35:15Z
last-modified: 2005-12-22T09:39:13Z
source: RIPE # Filtered
% Information related to '195.8.98.0/24AS1257'
route: 195.8.98.0/24
descr: TELE2/ SWIPNET
descr: TELE2-Broby
descr: #####################################################
descr: In case of improper use originating from our network,
descr: please mail customer or
descr: ####################################################
origin: AS1257
mnt-by: AS1257-MNT
mnt-routes: RESILANS-MNT
created: 2015-10-30T07:39:26Z
last-modified: 2024-04-12T11:10:33Z
source: RIPE # Filtered
% Information related to '195.8.98.0/24AS213701'
route: 195.8.98.0/24
descr: Ostra Goinge Kommun
origin: AS213701
mnt-by: RESILANS-MNT
created: 2024-12-17T13:00:08Z
last-modified: 2024-12-17T13:00:08Z
source: RIPE
% Information related to '195.8.98.0/24AS214202'
route: 195.8.98.0/24
descr: Ostra Goinge Kommun
origin: AS214202
mnt-by: RESILANS-MNT
created: 2025-05-28T08:32:19Z
last-modified: 2025-05-28T08:32:19Z
source: RIPE
% Information related to '195.8.98.0/24AS215138'
route: 195.8.98.0/24
descr: Ostra Goinge Kommun
origin: AS215138
mnt-by: RESILANS-MNT
created: 2025-05-28T08:32:19Z
last-modified: 2025-05-28T08:32:19Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.8.98.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.8.98.59. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 11:29:23 CST 2026
;; MSG SIZE rcvd: 104
Host 59.98.8.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 59.98.8.195.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.168.8.229 | attack | $f2bV_matches |
2020-04-14 02:05:42 |
| 66.70.160.187 | attack | 66.70.160.187 - - [13/Apr/2020:19:20:17 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 66.70.160.187 - - [13/Apr/2020:19:20:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6778 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 66.70.160.187 - - [13/Apr/2020:19:20:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-14 02:06:04 |
| 114.106.157.219 | attackspambots | Apr 14 03:15:42 our-server-hostname postfix/smtpd[7251]: connect from unknown[114.106.157.219] Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.106.157.219 |
2020-04-14 01:39:10 |
| 1.55.94.99 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 13-04-2020 18:20:07. |
2020-04-14 02:19:52 |
| 125.64.94.221 | attackbots | firewall-block, port(s): 43/tcp |
2020-04-14 02:13:44 |
| 164.132.42.32 | attackspam | $f2bV_matches |
2020-04-14 01:44:23 |
| 220.167.89.108 | attackspambots | " " |
2020-04-14 01:55:46 |
| 111.230.152.175 | attackbots | Apr 13 18:20:27 pi sshd[10793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.152.175 user=root Apr 13 18:20:29 pi sshd[10793]: Failed password for invalid user root from 111.230.152.175 port 39698 ssh2 |
2020-04-14 01:58:43 |
| 107.175.150.83 | attackspam | 2020-04-13T17:52:26.536099shield sshd\[29010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83 user=root 2020-04-13T17:52:28.263629shield sshd\[29010\]: Failed password for root from 107.175.150.83 port 57427 ssh2 2020-04-13T17:56:19.025167shield sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83 user=root 2020-04-13T17:56:21.405079shield sshd\[29943\]: Failed password for root from 107.175.150.83 port 33067 ssh2 2020-04-13T18:00:09.044101shield sshd\[30820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83 user=root |
2020-04-14 02:00:20 |
| 103.72.144.228 | attackbotsspam | Apr 13 19:14:37 OPSO sshd\[17885\]: Invalid user dnjenga from 103.72.144.228 port 48130 Apr 13 19:14:37 OPSO sshd\[17885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.144.228 Apr 13 19:14:40 OPSO sshd\[17885\]: Failed password for invalid user dnjenga from 103.72.144.228 port 48130 ssh2 Apr 13 19:20:48 OPSO sshd\[19379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.144.228 user=root Apr 13 19:20:50 OPSO sshd\[19379\]: Failed password for root from 103.72.144.228 port 56500 ssh2 |
2020-04-14 01:39:41 |
| 159.89.133.144 | attackbotsspam | firewall-block, port(s): 25769/tcp |
2020-04-14 02:08:49 |
| 13.235.153.231 | attack | WordPress wp-login brute force :: 13.235.153.231 0.140 - [13/Apr/2020:17:20:53 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1804 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1" |
2020-04-14 01:38:26 |
| 51.254.227.222 | attackbotsspam | [MK-Root1] SSH login failed |
2020-04-14 01:43:31 |
| 86.188.246.2 | attackbotsspam | Found by fail2ban |
2020-04-14 01:38:13 |
| 113.62.127.195 | attackbots | CN_APNIC-HM_<177>1586798448 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]: |
2020-04-14 01:42:52 |