City: unknown
Region: unknown
Country: France
Internet Service Provider: Orange
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '51.68.186.128 - 51.68.186.191'
% Abuse contact for '51.68.186.128 - 51.68.186.191' is 'abuse@ovh.net'
inetnum: 51.68.186.128 - 51.68.186.191
netname: OVH-DEDICATED-FO
country: DE
descr: Failover IPs
org: ORG-OG9-RIPE
admin-c: OTC13-RIPE
tech-c: OTC13-RIPE
status: LEGACY
mnt-by: OVH-MNT
created: 2018-08-16T15:05:08Z
last-modified: 2018-08-16T15:05:08Z
source: RIPE
organisation: ORG-OG9-RIPE
org-name: OVH GmbH
org-type: OTHER
address: Oskar-Jger-Str. 173/K6
address: 50825 Kln
address: Deutschland
abuse-c: ACRO39426-RIPE
admin-c: OTC13-RIPE
mnt-ref: OVH-MNT
mnt-by: OVH-MNT
created: 2005-09-02T12:40:05Z
last-modified: 2025-03-19T14:31:36Z
source: RIPE # Filtered
role: OVH DE Technical Contact
address: OVH GmbH
address: St. Johanner Str. 41-43
address: 66111 Saarbrucken
address: Deutschland
admin-c: OK217-RIPE
tech-c: GM84-RIPE
nic-hdl: OTC13-RIPE
abuse-mailbox: abuse@ovh.net
mnt-by: OVH-MNT
created: 2009-09-16T16:09:57Z
last-modified: 2021-02-26T13:07:37Z
source: RIPE # Filtered
% Information related to '51.68.0.0/16AS16276'
route: 51.68.0.0/16
origin: AS16276
mnt-by: OVH-MNT
created: 2018-03-07T09:22:39Z
last-modified: 2018-03-07T09:22:39Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.68.186.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;51.68.186.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 19:00:50 CST 2026
;; MSG SIZE rcvd: 106
168.186.68.51.in-addr.arpa domain name pointer ip168.ip-51-68-186.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
168.186.68.51.in-addr.arpa name = ip168.ip-51-68-186.eu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.48.243.227 | attackspam | unauthorized connection attempt |
2020-02-26 20:51:35 |
| 115.49.37.41 | attackspambots | unauthorized connection attempt |
2020-02-26 20:56:45 |
| 175.158.57.210 | attackspambots | unauthorized connection attempt |
2020-02-26 20:44:07 |
| 73.138.231.243 | attackspambots | unauthorized connection attempt |
2020-02-26 20:50:26 |
| 175.182.68.40 | attack | unauthorized connection attempt |
2020-02-26 21:03:59 |
| 61.216.133.61 | attackspam | 23/tcp 23/tcp [2020-02-22/26]2pkt |
2020-02-26 20:50:59 |
| 202.79.50.136 | attackspam | unauthorized connection attempt |
2020-02-26 21:02:23 |
| 89.175.217.98 | attack | unauthorized connection attempt |
2020-02-26 20:49:20 |
| 86.120.40.198 | attackspam | unauthorized connection attempt |
2020-02-26 21:09:02 |
| 118.71.251.2 | attackbots | unauthorized connection attempt |
2020-02-26 20:47:17 |
| 36.228.147.131 | attackspam | unauthorized connection attempt |
2020-02-26 20:36:25 |
| 120.150.213.110 | attack | unauthorized connection attempt |
2020-02-26 20:46:54 |
| 80.201.44.8 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=36302)(02261117) |
2020-02-26 21:09:55 |
| 14.241.121.33 | attack | Unauthorized connection attempt from IP address 14.241.121.33 on Port 445(SMB) |
2020-02-26 20:38:03 |
| 190.216.238.243 | attack | Unauthorized connection attempt detected from IP address 190.216.238.243 to port 445 |
2020-02-26 20:43:16 |