City: Massa
Region: Tuscany
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2.59.142.0 - 2.59.143.255'
% Abuse contact for '2.59.142.0 - 2.59.143.255' is 'abuse@apuacom.net'
inetnum: 2.59.142.0 - 2.59.143.255
netname: APUACOM-USERS
descr: Apuacom End Users - Fourteenth Block
country: IT
admin-c: MB30861-RIPE
tech-c: SRI-RIPE
status: ASSIGNED PA
mnt-by: BRAINBOX-MNT
created: 2019-03-26T16:16:47Z
last-modified: 2019-10-30T14:12:57Z
source: RIPE
person: Matteo Borri
address: Brainbox S.r.l.
address: Via Massa Avenza, 2
address: 54100 Massa (MS)
address: Italy
phone: +39 0585 355055
nic-hdl: MB30861-RIPE
mnt-by: BRAINBOX-MNT
created: 2012-08-03T14:48:34Z
last-modified: 2015-10-20T13:14:35Z
source: RIPE # Filtered
person: Simone Ricci
address: Brainbox S.r.l.
address: Via Massa Avenza, 2
address: 54100 Massa (MS)
address: Italy
phone: +39 0585 355055
mnt-by: SRI-MNT
nic-hdl: SRI-RIPE
created: 2019-10-10T21:22:45Z
last-modified: 2019-10-16T12:26:51Z
source: RIPE
% Information related to '2.59.143.0/24AS59919'
route: 2.59.143.0/24
origin: AS59919
mnt-by: BRAINBOX-MNT
created: 2019-03-26T16:18:38Z
last-modified: 2019-03-26T16:18:38Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.59.143.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.59.143.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 07:40:01 CST 2026
;; MSG SIZE rcvd: 104
99.143.59.2.in-addr.arpa domain name pointer ip-2.59.143.99-dyn.apuacom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.143.59.2.in-addr.arpa name = ip-2.59.143.99-dyn.apuacom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 140.250.207.81 | attackbotsspam | Unauthorized connection attempt detected from IP address 140.250.207.81 to port 445 |
2020-06-29 03:33:43 |
| 156.223.3.107 | attackbotsspam | Unauthorized connection attempt detected from IP address 156.223.3.107 to port 445 |
2020-06-29 03:32:11 |
| 77.238.0.10 | attack | Unauthorized connection attempt detected from IP address 77.238.0.10 to port 23 |
2020-06-29 04:01:36 |
| 94.183.245.108 | attackbots | Unauthorized connection attempt detected from IP address 94.183.245.108 to port 1433 |
2020-06-29 03:58:02 |
| 170.239.27.174 | attackspambots | Unauthorized connection attempt detected from IP address 170.239.27.174 to port 80 |
2020-06-29 03:53:10 |
| 170.81.236.2 | attackspambots | Unauthorized connection attempt detected from IP address 170.81.236.2 to port 8080 |
2020-06-29 03:53:30 |
| 79.8.32.58 | attackspambots | Unauthorized connection attempt detected from IP address 79.8.32.58 to port 23 |
2020-06-29 03:39:25 |
| 114.96.70.21 | attackspam | Unauthorized connection attempt detected from IP address 114.96.70.21 to port 80 |
2020-06-29 03:55:46 |
| 151.229.240.181 | attackspambots | SSH bruteforce |
2020-06-29 03:54:12 |
| 177.155.36.146 | attackbotsspam | Unauthorized connection attempt detected from IP address 177.155.36.146 to port 23 |
2020-06-29 03:30:11 |
| 112.53.68.231 | attackbots | Unauthorized connection attempt detected from IP address 112.53.68.231 to port 1433 |
2020-06-29 03:36:04 |
| 152.115.73.190 | attackspam | Unauthorized connection attempt detected from IP address 152.115.73.190 to port 80 |
2020-06-29 03:32:37 |
| 219.138.101.220 | attack |
|
2020-06-29 04:07:09 |
| 93.148.22.156 | attack | Unauthorized connection attempt detected from IP address 93.148.22.156 to port 23 |
2020-06-29 03:38:10 |
| 115.209.86.178 | attack | Unauthorized connection attempt detected from IP address 115.209.86.178 to port 23 |
2020-06-29 03:35:20 |