City: Paris
Region: Île-de-France
Country: France
Internet Service Provider: Orange
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '51.159.0.0 - 51.159.255.255'
% Abuse contact for '51.159.0.0 - 51.159.255.255' is 'abuse@scaleway.com'
inetnum: 51.159.0.0 - 51.159.255.255
org: ORG-ONLI1-RIPE
netname: ONLINENET_DEDICATED_SERVERS
country: FR
admin-c: MM42047-RIPE
tech-c: MM42047-RIPE
abuse-c: AR32851-RIPE
status: LEGACY
mnt-routes: ONLINESAS-MNT
mnt-by: ONLINESAS-MNT
created: 2018-02-09T11:38:35Z
last-modified: 2018-02-28T16:21:55Z
source: RIPE
organisation: ORG-ONLI1-RIPE
mnt-ref: MNT-TISCALIFR-B2B
org-name: Scaleway
org-type: OTHER
address: 8 rue de la ville l'eveque 75008 PARIS
abuse-c: AR32851-RIPE
mnt-ref: ONLINE-NET-MNT
mnt-by: ONLINE-NET-MNT
created: 2015-07-10T15:20:41Z
last-modified: 2022-05-03T15:39:01Z
source: RIPE # Filtered
person: Mickael Marchand
address: 8 rue de la ville l'eveque 75008 PARIS
phone: +33173502000
nic-hdl: MM42047-RIPE
mnt-by: MMA-MNT
created: 2015-07-10T15:02:32Z
last-modified: 2016-02-23T12:43:25Z
source: RIPE # Filtered
% Information related to '51.159.96.0/20AS12876'
route: 51.159.96.0/20
origin: AS12876
created: 2024-09-04T10:19:10Z
last-modified: 2024-09-04T10:19:10Z
source: RIPE
descr: Scaleway
descr: Paris, France
mnt-by: ONLINE-NET-MNT
% This query was served by the RIPE Database Query Service version 1.120 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.159.107.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;51.159.107.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 11:00:04 CST 2026
;; MSG SIZE rcvd: 106
98.107.159.51.in-addr.arpa domain name pointer 1dc0c4c3-c324-4057-8770-c374f5f740fb.fr-par-2.baremetal.scw.cloud.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
98.107.159.51.in-addr.arpa name = 1dc0c4c3-c324-4057-8770-c374f5f740fb.fr-par-2.baremetal.scw.cloud.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 189.213.160.28 | attack | Feb 25 17:32:11 h2177944 kernel: \[5846112.641103\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4916 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Feb 25 17:32:11 h2177944 kernel: \[5846112.641118\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4916 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Feb 25 17:32:14 h2177944 kernel: \[5846115.640284\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4917 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Feb 25 17:32:14 h2177944 kernel: \[5846115.640302\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4917 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Feb 25 17:32:20 h2177944 kernel: \[5846121.639348\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117. |
2020-02-26 07:35:49 |
| 5.234.172.209 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-26 07:22:09 |
| 59.126.158.139 | attackbots | suspicious action Tue, 25 Feb 2020 13:32:31 -0300 |
2020-02-26 07:29:08 |
| 79.166.237.247 | attackbotsspam | Telnet Server BruteForce Attack |
2020-02-26 07:41:18 |
| 114.217.141.100 | attack | suspicious action Tue, 25 Feb 2020 13:32:14 -0300 |
2020-02-26 07:43:17 |
| 69.17.158.101 | attack | Feb 25 18:13:04 NPSTNNYC01T sshd[9536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.17.158.101 Feb 25 18:13:05 NPSTNNYC01T sshd[9536]: Failed password for invalid user musikbot from 69.17.158.101 port 56472 ssh2 Feb 25 18:14:40 NPSTNNYC01T sshd[9737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.17.158.101 ... |
2020-02-26 07:27:36 |
| 185.109.250.48 | attackbotsspam | suspicious action Tue, 25 Feb 2020 13:57:14 -0300 |
2020-02-26 07:12:52 |
| 187.189.149.64 | attackbotsspam | 445/tcp [2020-02-25]1pkt |
2020-02-26 07:37:53 |
| 2.59.78.29 | attackbotsspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-02-26 07:36:29 |
| 103.77.78.120 | attackbotsspam | Invalid user vncuser from 103.77.78.120 port 38544 |
2020-02-26 07:28:17 |
| 14.226.42.197 | attackbotsspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-26 07:19:15 |
| 185.143.223.97 | attack | $f2bV_matches |
2020-02-26 07:31:19 |
| 45.238.121.160 | attackbots | Automatic report - Banned IP Access |
2020-02-26 07:46:32 |
| 200.98.163.186 | attackspambots | suspicious action Tue, 25 Feb 2020 14:57:01 -0300 |
2020-02-26 07:19:51 |
| 80.10.54.139 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-26 07:17:21 |