City: Stenløse
Region: Region Hovedstaden
Country: Denmark
Internet Service Provider: TDC
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '80.196.29.64 - 80.196.29.127'
% Abuse contact for '80.196.29.64 - 80.196.29.127' is 'postmaster@abuse.mail.dk'
inetnum: 80.196.29.64 - 80.196.29.127
netname: TDC-BREDBAANDSADSL-PROF-NET
descr: TDC Bredbaand Professional users
country: DK
remarks: +---------------------------------------+
remarks: | For abuse and security issues contact |
remarks: | csirt@csirt.dk, http://www.csirt.dk |
remarks: +---------------------------------------+
remarks: RIPE-update project Dec 2003 (Morten Madsen)
admin-c: AS5071-RIPE
tech-c: AS5071-RIPE
status: ASSIGNED PA
mnt-by: TDK-MNT
created: 2003-12-05T00:04:25Z
last-modified: 2003-12-05T00:04:25Z
source: RIPE
role: AS3292 Staff
address: TDC A/S
address: Sletvej 30, 8-062
address: DK-8310 Tranbjerg
address: Denmark
remarks: contact info: http://as3292.peeringdb.com
admin-c: NCB1-RIPE
admin-c: MBP137-RIPE
tech-c: NCB1-RIPE
tech-c: CP11490-RIPE
tech-c: MBP137-RIPE
nic-hdl: AS5071-RIPE
mnt-by: AS3292-MNT
created: 2002-07-02T13:36:00Z
last-modified: 2024-05-21T09:07:14Z
source: RIPE # Filtered
% Information related to '80.196.0.0/14AS3292'
route: 80.196.0.0/14
descr: TDC Tele Danmark
origin: AS3292
remarks: +---------------------------------------+
remarks: | For abuse and security issues please |
remarks: | see http://postmaster.tdc.dk or |
remarks: | contact postmaster@abuse.mail.dk |
remarks: +---------------------------------------+
mnt-by: AS3292-MNT
created: 2002-07-30T18:28:39Z
last-modified: 2010-10-28T13:04:08Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.196.29.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.196.29.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040303 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 10:29:33 CST 2026
;; MSG SIZE rcvd: 105
Host 71.29.196.80.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 71.29.196.80.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.231.8.214 | attackbotsspam | IP attempted unauthorised action |
2020-02-18 16:00:10 |
| 142.93.251.1 | attack | Feb 18 07:07:05 sigma sshd\[17889\]: Invalid user ts from 142.93.251.1Feb 18 07:07:06 sigma sshd\[17889\]: Failed password for invalid user ts from 142.93.251.1 port 57214 ssh2 ... |
2020-02-18 16:28:34 |
| 125.137.191.215 | attackspambots | Invalid user student3 from 125.137.191.215 port 41676 |
2020-02-18 16:22:09 |
| 5.196.75.47 | attackbots | $f2bV_matches |
2020-02-18 16:29:40 |
| 49.49.56.118 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 16:30:50 |
| 218.92.0.168 | attack | Feb 18 09:03:59 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2 Feb 18 09:04:02 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2 Feb 18 09:04:05 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2 Feb 18 09:04:09 SilenceServices sshd[12284]: Failed password for root from 218.92.0.168 port 22472 ssh2 |
2020-02-18 16:14:55 |
| 158.69.167.74 | attackspambots | " " |
2020-02-18 16:26:17 |
| 49.49.56.204 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 16:25:30 |
| 50.63.12.204 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2020-02-18 16:26:45 |
| 123.20.8.185 | attack | Feb 18 05:54:23 grey postfix/smtpd\[25066\]: NOQUEUE: reject: RCPT from unknown\[123.20.8.185\]: 554 5.7.1 Service unavailable\; Client host \[123.20.8.185\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?123.20.8.185\; from=\ |
2020-02-18 16:24:12 |
| 182.38.180.61 | attackspam | firewall-block, port(s): 23/tcp |
2020-02-18 15:56:01 |
| 198.46.135.194 | attackbots | distributed scan |
2020-02-18 16:32:40 |
| 37.48.80.82 | attackspam | unauthorized connection attempt |
2020-02-18 15:57:00 |
| 207.38.128.67 | attack | Invalid user veeam from 207.38.128.67 port 46065 |
2020-02-18 16:21:24 |
| 178.128.76.6 | attackspambots | Feb 18 07:23:12 [host] sshd[9848]: Invalid user 1q Feb 18 07:23:12 [host] sshd[9848]: pam_unix(sshd:a Feb 18 07:23:14 [host] sshd[9848]: Failed password |
2020-02-18 16:26:00 |