City: Frick
Region: Aargau
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.254.176.0 - 212.254.176.255'
% Abuse contact for '212.254.176.0 - 212.254.176.255' is 'abuse@vtx.ch'
inetnum: 212.254.176.0 - 212.254.176.255
netname: TISCALI-ADSLFIXIP-N176
descr: Tiscali DataComm AG
country: CH
admin-c: VDC-RIPE
tech-c: VDC-RIPE
status: ASSIGNED PA
mnt-by: VTX-MNT
created: 2003-10-13T08:14:32Z
last-modified: 2006-02-22T14:30:27Z
source: RIPE
role: VTX Datacomm AG
address: St. Alban-Anlage 44
address: CH-4052 Basel
phone: +41 61 561 1111
fax-no: +41 61 561 1110
abuse-mailbox: abuse@vtx.ch
remarks: ==========================================================
remarks: Spam and abuse issues : abuse@vtx.ch
remarks: ----------------------------------------------------------
remarks: If you think we try to hack or spam you,
remarks: please read this : http://www.ripe.net/nicdb.html
remarks: ==========================================================
admin-c: RC64-RIPE
tech-c: MC1375-RIPE
tech-c: BW791-RIPE
tech-c: JR11471-RIPE
tech-c: JD10580-RIPE
nic-hdl: VDC-RIPE
mnt-by: VTX-MNT
created: 2006-01-31T14:33:18Z
last-modified: 2024-02-05T10:08:43Z
source: RIPE # Filtered
% Information related to '212.254.0.0/16AS12350'
route: 212.254.0.0/16
descr: CH.VTX LIR Range
origin: AS12350
mnt-by: VTX-MNT
created: 2006-04-24T09:27:42Z
last-modified: 2006-04-24T09:27:42Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.254.176.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.254.176.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 14:40:48 CST 2026
;; MSG SIZE rcvd: 107
68.176.254.212.in-addr.arpa domain name pointer adsl-176-68-fixip.datacomm.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.176.254.212.in-addr.arpa name = adsl-176-68-fixip.datacomm.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 168.227.17.16 | attackspam | Email rejected due to spam filtering |
2020-03-09 15:15:30 |
| 185.177.104.132 | attack | Email rejected due to spam filtering |
2020-03-09 14:47:08 |
| 211.106.110.49 | attack | fail2ban |
2020-03-09 15:11:57 |
| 106.51.230.186 | attackspambots | Mar 9 07:37:05 ns381471 sshd[733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.230.186 Mar 9 07:37:07 ns381471 sshd[733]: Failed password for invalid user liuyukun from 106.51.230.186 port 48364 ssh2 |
2020-03-09 14:58:09 |
| 180.167.233.252 | attack | Mar 9 09:20:44 areeb-Workstation sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.233.252 Mar 9 09:20:45 areeb-Workstation sshd[13991]: Failed password for invalid user qwewq from 180.167.233.252 port 44050 ssh2 ... |
2020-03-09 15:12:20 |
| 84.54.78.248 | attackspambots | Email rejected due to spam filtering |
2020-03-09 15:14:53 |
| 123.18.87.32 | attack | 1583725864 - 03/09/2020 04:51:04 Host: 123.18.87.32/123.18.87.32 Port: 445 TCP Blocked |
2020-03-09 14:47:58 |
| 213.6.116.222 | attackspam | Mar 9 04:49:26 mail.srvfarm.net postfix/smtpd[3846782]: NOQUEUE: reject: RCPT from unknown[213.6.116.222]: 554 5.7.1 Service unavailable; Client host [213.6.116.222] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?213.6.116.222; from= |
2020-03-09 15:00:06 |
| 80.82.77.86 | attackspam | 80.82.77.86 was recorded 14 times by 9 hosts attempting to connect to the following ports: 32771,32768,49153. Incident counter (4h, 24h, all-time): 14, 77, 9787 |
2020-03-09 14:51:19 |
| 185.121.130.23 | attackbots | firewall-block, port(s): 1433/tcp |
2020-03-09 15:27:46 |
| 80.211.84.100 | attackspam | firewall-block, port(s): 28967/tcp |
2020-03-09 14:50:32 |
| 185.176.27.186 | attackbots | Mar 9 08:22:05 debian-2gb-nbg1-2 kernel: \[5997677.707547\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.186 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17260 PROTO=TCP SPT=58557 DPT=53366 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-09 15:29:06 |
| 125.124.143.182 | attack | Mar 8 21:08:16 hanapaa sshd\[18009\]: Invalid user alexis from 125.124.143.182 Mar 8 21:08:16 hanapaa sshd\[18009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182 Mar 8 21:08:18 hanapaa sshd\[18009\]: Failed password for invalid user alexis from 125.124.143.182 port 59712 ssh2 Mar 8 21:14:22 hanapaa sshd\[18546\]: Invalid user plex from 125.124.143.182 Mar 8 21:14:22 hanapaa sshd\[18546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182 |
2020-03-09 15:21:47 |
| 69.229.6.34 | attackbotsspam | Mar 9 03:43:34 localhost sshd[8270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34 user=root Mar 9 03:43:36 localhost sshd[8270]: Failed password for root from 69.229.6.34 port 58118 ssh2 Mar 9 03:46:54 localhost sshd[8882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34 user=root Mar 9 03:46:57 localhost sshd[8882]: Failed password for root from 69.229.6.34 port 54252 ssh2 Mar 9 03:50:19 localhost sshd[12741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34 user=root Mar 9 03:50:21 localhost sshd[12741]: Failed password for root from 69.229.6.34 port 50346 ssh2 ... |
2020-03-09 15:26:10 |
| 45.146.202.165 | attackbots | Mar 9 05:43:02 mail.srvfarm.net postfix/smtpd[3865705]: NOQUEUE: reject: RCPT from unknown[45.146.202.165]: 450 4.1.8 |
2020-03-09 15:07:18 |