City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '82.206.128.0 - 82.206.255.255'
% Abuse contact for '82.206.128.0 - 82.206.255.255' is 'abuse@intelsat.com'
inetnum: 82.206.128.0 - 82.206.255.255
netname: UK-INTELSAT-20031126
country: GB
org: ORG-IA67-RIPE
admin-c: IRA4-RIPE
abuse-c: AA33918-RIPE
tech-c: IRTC1-RIPE
tech-c: RP15107-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS22351-MNT
mnt-routes: AS22351-MNT
created: 2003-11-26T11:50:40Z
last-modified: 2021-07-27T17:54:52Z
source: RIPE # Filtered
organisation: ORG-IA67-RIPE
org-name: Intelsat Global Sales & Marketing LTD
country: GB
org-type: LIR
address: Building 5, Chiswick Park, Chiswick High Road
address: W4 5YF
address: London
address: UNITED KINGDOM
phone: +44 20-3036-6700
phone: +1 404 381 2900
fax-no: +1 404 381 2596
reg-nr: 04098445
abuse-c: AR17721-RIPE
mnt-ref: AS22351-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS22351-MNT
admin-c: RP15107-RIPE
admin-c: SB29124-RIPE
admin-c: IRTC1-RIPE
admin-c: IRA4-RIPE
created: 2004-04-17T12:16:19Z
last-modified: 2026-04-29T05:24:26Z
source: RIPE # Filtered
role: Intelsat Ripe Admin
address: Intelsat Global Service Corporation
address: 7900 Tysons One Place
address: Mclean, VA
address: 22102-5972
address: USA
admin-c: RR13552-RIPE
admin-c: RP15107-RIPE
admin-c: SB29124-RIPE
admin-c: DW5753-RIPE
admin-c: MF20540-RIPE
admin-c: WJ1271-RIPE
abuse-mailbox: ABUSE@INTELSAT.COM
nic-hdl: IRA4-RIPE
mnt-by: AS22351-MNT
remarks:
remarks: *************************************************************
remarks: * *
remarks: * This is a generic ROLE object for an Intelsat Admin *
remarks: * Contact person for RIPE matters. Inquiries about RIPE *
remarks: * issues should be directed to the NOC-DATA@INTELSAT.COM email-box. For *
remarks: * operational issues, send an Email or call *
remarks: * the Intelsat NOC at: *
remarks: * *
remarks: * NOC-DATA@intelsat.com *
remarks: * +1 404 381 2900 *
remarks: * *
remarks: * For issues of network abuse, including spam, please send *
remarks: * email to Intelsat at: *
remarks: * *
remarks: *abuse@intelsat.com *
remarks: * *
remarks: *************************************************************
remarks:
created: 2002-04-25T17:29:20Z
last-modified: 2023-06-19T14:40:02Z
source: RIPE # Filtered
role: Intelsat RIPE Technical Contact
address: Intelsat Global Service Corporation
address: 7900 Tysons One Place
address: Mclean , VA
address: 22102-5972
address: USA
abuse-mailbox: ABUSE@INTELSAT.COM
admin-c: IRA4-RIPE
tech-c: SB29124-RIPE
tech-c: DW5753-RIPE
tech-c: MF20540-RIPE
tech-c: RR13552-RIPE
nic-hdl: IRTC1-RIPE
mnt-by: AS22351-MNT
remarks:
remarks: *************************************************************
remarks: * *
remarks: * This is a generic ROLE object for an Intelsat Technical *
remarks: * Contact person for RIPE matters. Inquiries about RIPE *
remarks: * issues should be directed to NOC-ENG-DATA@INTELSAT.COM.*
remarks: * for operational issues, send an Email or call *
remarks: * the Intelsat NOC at: *
remarks: * *
remarks: * NOC-DATA@intelsat.com *
remarks: * +1 404 381 2828 *
remarks: * *
remarks: * For issues of network abuse, including spam, please send *
remarks: * email to Intelsat at: *
remarks: * *
remarks: * ABUSE@intelsat.com *
remarks: * *
remarks: *************************************************************
remarks:
remarks:
created: 2002-03-07T17:47:02Z
last-modified: 2023-06-19T14:41:52Z
source: RIPE # Filtered
person: Russell Payne
address: 2857 Fork Creek Church Road, , Ellenwood United States
phone: +1-404-381-2714
nic-hdl: RP15107-RIPE
mnt-by: AS22351-MNT
created: 2018-09-17T17:03:27Z
last-modified: 2018-10-31T17:58:47Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.122 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.206.254.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.206.254.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 11:07:34 CST 2026
;; MSG SIZE rcvd: 107
Host 139.254.206.82.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.254.206.82.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.165.101.72 | attackspam | Unauthorized connection attempt detected from IP address 220.165.101.72 to port 5555 [T] |
2020-04-15 02:26:05 |
| 58.209.162.138 | attack | Unauthorized connection attempt detected from IP address 58.209.162.138 to port 22 [T] |
2020-04-15 02:18:59 |
| 183.131.116.0 | attackspambots | Unauthorized connection attempt detected from IP address 183.131.116.0 to port 1433 [T] |
2020-04-15 02:32:47 |
| 42.51.136.12 | attackspam | Unauthorized connection attempt detected from IP address 42.51.136.12 to port 1433 [T] |
2020-04-15 02:20:55 |
| 115.150.177.198 | attack | Unauthorized connection attempt detected from IP address 115.150.177.198 to port 445 [T] |
2020-04-15 02:08:57 |
| 59.63.149.95 | attack | Unauthorized connection attempt detected from IP address 59.63.149.95 to port 445 [T] |
2020-04-15 02:16:46 |
| 176.119.1.181 | attack | SASL authentication brute-force |
2020-04-15 02:37:09 |
| 80.64.167.16 | attack | Unauthorized connection attempt detected from IP address 80.64.167.16 to port 9530 [T] |
2020-04-15 02:14:58 |
| 119.23.63.24 | attackspam | Unauthorized connection attempt detected from IP address 119.23.63.24 to port 6380 [T] |
2020-04-15 02:05:14 |
| 123.114.150.86 | attackspambots | Unauthorized connection attempt detected from IP address 123.114.150.86 to port 1433 [T] |
2020-04-15 02:41:19 |
| 221.13.12.235 | attack | Unauthorized connection attempt detected from IP address 221.13.12.235 to port 992 [T] |
2020-04-15 02:25:36 |
| 117.88.99.41 | attackspambots | Unauthorized connection attempt detected from IP address 117.88.99.41 to port 5555 [T] |
2020-04-15 02:06:45 |
| 123.59.148.35 | attackbots | Unauthorized connection attempt detected from IP address 123.59.148.35 to port 23 [T] |
2020-04-15 02:04:04 |
| 122.225.96.157 | attackspam | Unauthorized connection attempt detected from IP address 122.225.96.157 to port 1433 [T] |
2020-04-15 02:42:31 |
| 106.75.2.81 | attack | Unauthorized connection attempt detected from IP address 106.75.2.81 to port 8090 [T] |
2020-04-15 02:11:11 |