City: Ponte de Lima
Region: Viana do Castelo
Country: Portugal
Internet Service Provider: MEO
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.13.224.0 - 213.13.255.255'
% Abuse contact for '213.13.224.0 - 213.13.255.255' is 'abuse.lir@meo.pt'
inetnum: 213.13.224.0 - 213.13.255.255
netname: MEO-BROADBAND
descr: PT Comunicacoes S.A.
descr: Dynamic Address Range
country: PT
admin-c: TP3302-RIPE
tech-c: TP3302-RIPE
status: ASSIGNED PA
mnt-by: TELEPAC-MNT
created: 2002-08-12T09:50:09Z
last-modified: 2016-02-05T17:37:06Z
source: RIPE
role: MEO-RESIDENCIAL
org: ORG-TCIS1-RIPE
address: Local Internet Registry Management
address: MEO - SERVICOS DE COMUNICACOES E MULTIMEDIA S.A.
address: Av. Fontes Pereira de Melo, 40 - 3 Bl A
address: Forum Picoas - 1069-300 Lisboa
address: Portugal
phone: +351-215000000
admin-c: NPM17-RIPE
admin-c: DPM37-RIPE
admin-c: LAS102-RIPE
admin-c: DL11448-RIPE
admin-c: PR17747-RIPE
nic-hdl: TP3302-RIPE
abuse-mailbox: abuse.lir@meo.pt
mnt-by: TELEPAC-MNT
created: 2002-08-12T09:57:20Z
last-modified: 2025-09-01T09:28:13Z
source: RIPE # Filtered
% Information related to '213.13.0.0/16AS3243'
route: 213.13.0.0/16
descr: PT Comunicacoes S.A.
origin: AS3243
mnt-by: TELEPAC-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2014-01-31T16:20:14Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.13.245.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.13.245.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 20:46:42 CST 2026
;; MSG SIZE rcvd: 106
98.245.13.213.in-addr.arpa domain name pointer bl3-245-98.dsl.telepac.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
98.245.13.213.in-addr.arpa name = bl3-245-98.dsl.telepac.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 151.80.45.126 | attackspambots | Multiple SSH auth failures recorded by fail2ban |
2019-08-26 01:10:42 |
| 106.12.78.199 | attackspambots | Aug 25 19:20:37 plex sshd[24249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.199 user=root Aug 25 19:20:38 plex sshd[24249]: Failed password for root from 106.12.78.199 port 49372 ssh2 |
2019-08-26 01:36:56 |
| 51.83.46.178 | attackspambots | Aug 25 13:57:47 www2 sshd\[42395\]: Invalid user kravi from 51.83.46.178Aug 25 13:57:49 www2 sshd\[42395\]: Failed password for invalid user kravi from 51.83.46.178 port 47470 ssh2Aug 25 14:01:51 www2 sshd\[42918\]: Invalid user public from 51.83.46.178 ... |
2019-08-26 00:50:23 |
| 95.167.39.12 | attack | $f2bV_matches |
2019-08-26 01:19:05 |
| 139.59.172.149 | attackbotsspam | Automatic report - Banned IP Access |
2019-08-26 01:41:20 |
| 45.55.184.78 | attack | Aug 25 18:56:16 eventyay sshd[7529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78 Aug 25 18:56:18 eventyay sshd[7529]: Failed password for invalid user user from 45.55.184.78 port 55196 ssh2 Aug 25 19:01:34 eventyay sshd[7658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78 ... |
2019-08-26 01:16:26 |
| 112.221.179.133 | attack | 2019-08-25T09:38:11.848193abusebot-6.cloudsearch.cf sshd\[12256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.179.133 user=root |
2019-08-26 00:53:39 |
| 157.230.110.11 | attackspam | Aug 25 19:20:13 lnxmail61 sshd[7540]: Failed password for mysql from 157.230.110.11 port 53976 ssh2 Aug 25 19:25:10 lnxmail61 sshd[8124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.110.11 Aug 25 19:25:12 lnxmail61 sshd[8124]: Failed password for invalid user sysman1 from 157.230.110.11 port 41038 ssh2 |
2019-08-26 01:30:34 |
| 168.61.177.9 | attackspam | 2019-08-25T13:01:22.548150abusebot-3.cloudsearch.cf sshd\[12877\]: Invalid user alameda from 168.61.177.9 port 57759 |
2019-08-26 01:17:47 |
| 103.17.159.54 | attackbotsspam | Aug 25 21:49:40 localhost sshd[30704]: Invalid user mm from 103.17.159.54 port 46686 ... |
2019-08-26 01:00:55 |
| 54.210.130.25 | attackbots | by Amazon Technologies Inc. |
2019-08-26 00:52:11 |
| 80.211.30.166 | attackbots | Aug 25 15:03:35 srv206 sshd[13063]: Invalid user upload1 from 80.211.30.166 ... |
2019-08-26 01:27:20 |
| 42.235.56.233 | attackbotsspam | Aug 24 22:58:15 hanapaa sshd\[11171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.235.56.233 user=root Aug 24 22:58:17 hanapaa sshd\[11171\]: Failed password for root from 42.235.56.233 port 59602 ssh2 Aug 24 22:58:20 hanapaa sshd\[11171\]: Failed password for root from 42.235.56.233 port 59602 ssh2 Aug 24 22:58:22 hanapaa sshd\[11171\]: Failed password for root from 42.235.56.233 port 59602 ssh2 Aug 24 22:58:24 hanapaa sshd\[11171\]: Failed password for root from 42.235.56.233 port 59602 ssh2 |
2019-08-26 01:05:03 |
| 218.92.0.167 | attackspambots | SSH scan :: |
2019-08-26 00:48:24 |
| 159.148.4.227 | attackbots | Aug 25 19:19:36 vps647732 sshd[17379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.227 Aug 25 19:19:38 vps647732 sshd[17379]: Failed password for invalid user sxf from 159.148.4.227 port 39304 ssh2 ... |
2019-08-26 01:27:38 |