City: Demigny
Region: Bourgogne-Franche-Comté
Country: France
Internet Service Provider: SFR
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '77.144.0.0 - 77.151.255.255'
% Abuse contact for '77.144.0.0 - 77.151.255.255' is 'abuse@gaoland.net'
inetnum: 77.144.0.0 - 77.151.255.255
netname: SFR-USER-DATA
descr: Pool for mobile data users
descr: Dynamic IP
country: FR
admin-c: LD699-RIPE
tech-c: LDC76-RIPE
remarks: ***********************************
remarks: * Abuse e-mail: abuse@gaoland.net *
remarks: ***********************************
status: ASSIGNED PA
mnt-by: SFR-MNT
created: 2011-09-27T08:19:22Z
last-modified: 2011-10-03T12:46:43Z
source: RIPE # Filtered
role: SFR Legal Contact
address: Campus SFR
address: 12 rue Jean-Philippe Rameau
address: CS 80001
address: 93634 La-Plaine-Saint-Denis Cedex
address: France
phone: +33 1 70 18 52 00
admin-c: LDC76-RIPE
admin-c: HS10001-RIPE
tech-c: HS10001-RIPE
nic-hdl: LD699-RIPE
abuse-mailbox: abuse@gaoland.net
mnt-by: LDCOM-MNT
created: 2003-10-23T09:15:54Z
last-modified: 2023-09-18T07:21:21Z
source: RIPE # Filtered
role: SFR Tech Contact (formerly Neuf Cegetel / LDCOM Networks)
address: SFR
address: CAMPUS SFR
address: 16 rue du General Alain de Boissieu
address: CS 68217
address: 75741 PARIS CEDEX 15
address: France
phone: +33 1 85 06 00 00
admin-c: LD699-RIPE
admin-c: HS10001-RIPE
tech-c: DG1056-RIPE
nic-hdl: LDC76-RIPE
abuse-mailbox: abuse@gaoland.net
mnt-by: LDCOM-MNT
created: 2001-12-20T14:34:14Z
last-modified: 2024-11-19T08:08:19Z
source: RIPE # Filtered
% Information related to '77.144.0.0/12AS15557'
route: 77.144.0.0/12
descr: SFR ALTICE France
origin: AS15557
mnt-by: SFR-MNT
created: 2016-06-09T15:14:19Z
last-modified: 2025-07-30T14:13:51Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.150.184.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;77.150.184.99. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050400 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 16:13:41 CST 2026
;; MSG SIZE rcvd: 106
99.184.150.77.in-addr.arpa domain name pointer 99.184.150.77.rev.sfr.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.184.150.77.in-addr.arpa name = 99.184.150.77.rev.sfr.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.63.119.107 | attack | 1580619515 - 02/02/2020 05:58:35 Host: 5.63.119.107/5.63.119.107 Port: 445 TCP Blocked |
2020-02-02 13:12:13 |
| 122.51.149.126 | attackbotsspam | Unauthorized connection attempt detected from IP address 122.51.149.126 to port 2220 [J] |
2020-02-02 10:11:27 |
| 45.161.109.35 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.161.109.35 to port 1433 [J] |
2020-02-02 10:05:32 |
| 190.202.32.2 | attack | Feb 2 06:15:31 srv01 sshd[32356]: Invalid user jenkins from 190.202.32.2 port 42264 Feb 2 06:15:31 srv01 sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.32.2 Feb 2 06:15:31 srv01 sshd[32356]: Invalid user jenkins from 190.202.32.2 port 42264 Feb 2 06:15:33 srv01 sshd[32356]: Failed password for invalid user jenkins from 190.202.32.2 port 42264 ssh2 Feb 2 06:18:53 srv01 sshd[32528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.32.2 user=root Feb 2 06:18:55 srv01 sshd[32528]: Failed password for root from 190.202.32.2 port 57177 ssh2 ... |
2020-02-02 13:26:30 |
| 91.183.90.237 | attackbotsspam | Unauthorized connection attempt detected from IP address 91.183.90.237 to port 2220 [J] |
2020-02-02 10:14:28 |
| 112.85.42.186 | attackbots | Feb 2 05:56:02 ns381471 sshd[10003]: Failed password for root from 112.85.42.186 port 35220 ssh2 |
2020-02-02 13:05:09 |
| 222.186.30.57 | attackspambots | Feb 2 03:12:48 v22018076622670303 sshd\[11772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Feb 2 03:12:50 v22018076622670303 sshd\[11772\]: Failed password for root from 222.186.30.57 port 59024 ssh2 Feb 2 03:12:53 v22018076622670303 sshd\[11772\]: Failed password for root from 222.186.30.57 port 59024 ssh2 ... |
2020-02-02 10:14:56 |
| 103.123.8.221 | attack | Feb 2 04:54:56 web8 sshd\[3901\]: Invalid user user1 from 103.123.8.221 Feb 2 04:54:56 web8 sshd\[3901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.221 Feb 2 04:54:58 web8 sshd\[3901\]: Failed password for invalid user user1 from 103.123.8.221 port 48406 ssh2 Feb 2 04:58:37 web8 sshd\[5475\]: Invalid user steam from 103.123.8.221 Feb 2 04:58:37 web8 sshd\[5475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.221 |
2020-02-02 13:08:01 |
| 51.38.232.93 | attackspambots | Feb 1 23:58:35 plusreed sshd[16025]: Invalid user sbserver from 51.38.232.93 ... |
2020-02-02 13:11:11 |
| 54.37.100.120 | attackspam | 54.37.100.120 - - [02/Feb/2020:04:58:15 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.37.100.120 - - [02/Feb/2020:04:58:16 +0000] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-02-02 13:28:24 |
| 188.148.154.34 | attackspambots | Honeypot attack, port: 5555, PTR: c188-148-154-34.bredband.comhem.se. |
2020-02-02 13:07:14 |
| 189.125.93.48 | attackspambots | Feb 2 05:58:07 MK-Soft-VM3 sshd[18132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.93.48 Feb 2 05:58:08 MK-Soft-VM3 sshd[18132]: Failed password for invalid user git from 189.125.93.48 port 35588 ssh2 ... |
2020-02-02 13:19:49 |
| 122.240.62.1 | attackbotsspam | Unauthorized connection attempt detected from IP address 122.240.62.1 to port 3389 [J] |
2020-02-02 10:08:28 |
| 95.129.177.122 | attack | Honeypot attack, port: 445, PTR: 122.177.ptr.deozal.ru. |
2020-02-02 13:03:04 |
| 112.74.106.49 | attackspambots | Unauthorized connection attempt detected from IP address 112.74.106.49 to port 1433 [J] |
2020-02-02 13:15:55 |