City: Bucharest
Region: Bucuresti
Country: Romania
Internet Service Provider: Digi.Mobil
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.12.128.0 - 5.12.131.255'
% Abuse contact for '5.12.128.0 - 5.12.131.255' is 'abuse@rcs-rds.ro'
inetnum: 5.12.128.0 - 5.12.131.255
netname: RO-RESIDENTIAL
descr: RCS & RDS Residential
descr: City: Bucuresti
remarks: INFRA-AW
country: RO
admin-c: RDS-RIPE
tech-c: RDS-RIPE
tech-c: RDS2012-RIPE
status: ASSIGNED PA
mnt-by: AS8708-MNT
mnt-lower: AS8708-MNT
created: 2023-08-03T08:21:01Z
last-modified: 2023-08-03T08:21:01Z
source: RIPE # Filtered
role: RCS & RDS NOC
address: 71-75 Dr. Staicovici
address: Bucharest / ROMANIA
phone: +40 21 30 10 888
fax-no: +40 21 30 10 892
abuse-mailbox: abuse@rcs-rds.ro
admin-c: GEPU1-RIPE
tech-c: GEPU1-RIPE
nic-hdl: RDS-RIPE
mnt-by: RDS-MNT
remarks: +------------------------------------------------------------+
remarks: | Please use ABUSE@RCS-RDS.RO for complaints and only after |
remarks: | you have tried contacting directly our customers according |
remarks: | to the details registered in RIPE database. |
remarks: +------------------------------------------------------------+
remarks: | DO NOT CALL, FAX, OR CONTACT US BY ANY OTHER MEANS EXCEPT |
remarks: | abuse@rcs-rds.ro |
remarks: +------------------------------------------------------------+
created: 1970-01-01T00:00:00Z
last-modified: 2019-08-21T07:16:42Z
source: RIPE # Filtered
role: RCS RDS
address: 71-75 Dr. Staicovici
address: Bucharest / ROMANIA
phone: +40 21 30 10 888
fax-no: +40 21 30 10 892
abuse-mailbox: abuse@rcs-rds.ro
admin-c: GEPU1-RIPE
tech-c: GEPU1-RIPE
nic-hdl: RDS2012-RIPE
mnt-by: RDS-MNT
remarks: +------------------------------------------------------------+
remarks: | Please use ABUSE@RCS-RDS.RO for complaints and only after |
remarks: | you have tried contacting directly our customers according |
remarks: | to the details registered in RIPE database. |
remarks: +------------------------------------------------------------+
remarks: | DO NOT CALL, FAX, OR CONTACT US BY ANY OTHER MEANS EXCEPT |
remarks: | abuse@rcs-rds.ro |
remarks: +------------------------------------------------------------+
created: 2012-01-24T08:33:39Z
last-modified: 2013-05-11T03:16:10Z
source: RIPE # Filtered
% Information related to '5.12.0.0/14AS8708'
route: 5.12.0.0/14
descr: RCS-RDS
origin: AS8708
mnt-by: RDS-MNT
created: 2012-05-03T12:08:36Z
last-modified: 2012-05-08T12:14:19Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.12.131.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.12.131.35. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 10:56:13 CST 2026
;; MSG SIZE rcvd: 104
35.131.12.5.in-addr.arpa domain name pointer 5-12-131-35.residential.rdsnet.ro.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
35.131.12.5.in-addr.arpa name = 5-12-131-35.residential.rdsnet.ro.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.97.204.210 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-04-27 08:06:16 |
| 45.67.15.5 | attackspam | Rude login attack (11 tries in 1d) |
2020-04-27 08:34:36 |
| 59.63.224.93 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-04-27 08:05:03 |
| 175.141.142.45 | attackspam | Spamming malicius links on forums (automated bot) |
2020-04-27 08:16:24 |
| 31.220.2.100 | attackspambots | xmlrpc attack |
2020-04-27 08:03:00 |
| 124.205.224.179 | attack | Apr 27 01:41:12 sip sshd[16865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179 Apr 27 01:41:14 sip sshd[16865]: Failed password for invalid user pom from 124.205.224.179 port 47470 ssh2 Apr 27 01:52:57 sip sshd[21221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179 |
2020-04-27 08:23:59 |
| 222.186.15.62 | attack | Apr 26 20:10:05 plusreed sshd[14310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root Apr 26 20:10:08 plusreed sshd[14310]: Failed password for root from 222.186.15.62 port 51797 ssh2 ... |
2020-04-27 08:16:42 |
| 159.192.143.249 | attackspambots | Apr 27 01:19:40 sip sshd[8927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249 Apr 27 01:19:43 sip sshd[8927]: Failed password for invalid user rorie from 159.192.143.249 port 47468 ssh2 Apr 27 01:27:23 sip sshd[11765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249 |
2020-04-27 08:06:44 |
| 138.68.99.46 | attackspam | 2020-04-27T01:00:45.855371vps751288.ovh.net sshd\[2671\]: Invalid user nas from 138.68.99.46 port 43304 2020-04-27T01:00:45.863173vps751288.ovh.net sshd\[2671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46 2020-04-27T01:00:48.313723vps751288.ovh.net sshd\[2671\]: Failed password for invalid user nas from 138.68.99.46 port 43304 ssh2 2020-04-27T01:04:42.156092vps751288.ovh.net sshd\[2727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46 user=root 2020-04-27T01:04:43.808672vps751288.ovh.net sshd\[2727\]: Failed password for root from 138.68.99.46 port 37712 ssh2 |
2020-04-27 08:02:16 |
| 106.12.183.6 | attackbots | Apr 26 23:26:53 OPSO sshd\[23559\]: Invalid user mcserver from 106.12.183.6 port 40094 Apr 26 23:26:53 OPSO sshd\[23559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.6 Apr 26 23:26:55 OPSO sshd\[23559\]: Failed password for invalid user mcserver from 106.12.183.6 port 40094 ssh2 Apr 26 23:33:18 OPSO sshd\[25222\]: Invalid user denis from 106.12.183.6 port 46428 Apr 26 23:33:18 OPSO sshd\[25222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.6 |
2020-04-27 08:30:11 |
| 174.106.123.237 | attackbotsspam | Ssh brute force |
2020-04-27 08:14:05 |
| 45.55.128.109 | attackbots | Apr 26 12:14:05 XXX sshd[23250]: Invalid user sam from 45.55.128.109 port 59978 |
2020-04-27 08:25:01 |
| 178.32.221.142 | attack | Apr 26 20:36:01 scw-6657dc sshd[14672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.221.142 Apr 26 20:36:01 scw-6657dc sshd[14672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.221.142 Apr 26 20:36:04 scw-6657dc sshd[14672]: Failed password for invalid user ftpuser from 178.32.221.142 port 44070 ssh2 ... |
2020-04-27 08:19:35 |
| 62.210.136.159 | attackbots | k+ssh-bruteforce |
2020-04-27 08:15:57 |
| 62.210.80.125 | attackspam | 0,13-10/02 [bc01/m147] PostRequest-Spammer scoring: essen |
2020-04-27 08:23:44 |