City: unknown
Region: unknown
Country: France
Internet Service Provider: Free
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '82.248.0.0 - 82.255.255.255'
% Abuse contact for '82.248.0.0 - 82.255.255.255' is 'abuse@proxad.net'
inetnum: 82.248.0.0 - 82.255.255.255
netname: FR-PROXAD-ADSL
descr: Proxad / Free SAS
descr: Dynamic pool (IP/ADSL)
descr: NCC#2005090519
country: FR
admin-c: ACP23-RIPE
tech-c: TCP8-RIPE
status: ASSIGNED PA
remarks: Spam/Abuse requests: mailto:abuse@proxad.net
mnt-by: PROXAD-MNT
created: 2005-09-29T12:52:43Z
last-modified: 2005-09-29T12:52:43Z
source: RIPE
role: Administrative Contact for ProXad
address: Free SAS / ProXad
address: 8, rue de la Ville L'Eveque
address: 75008 Paris
phone: +33 1 73 50 20 00
fax-no: +33 1 73 92 25 69
remarks: trouble: Information: http://www.proxad.net/
remarks: trouble: Spam/Abuse requests: mailto:abuse@proxad.net
admin-c: APfP1-RIPE
tech-c: TPfP1-RIPE
nic-hdl: ACP23-RIPE
mnt-by: PROXAD-MNT
abuse-mailbox: abuse@proxad.net
created: 2002-06-26T12:46:56Z
last-modified: 2013-08-01T12:16:00Z
source: RIPE # Filtered
role: Technical Contact for ProXad
address: Free SAS / ProXad
address: 8, rue de la Ville L'Eveque
address: 75008 Paris
phone: +33 1 73 50 20 00
fax-no: +33 1 73 92 25 69
remarks: trouble: Information: http://www.proxad.net/
remarks: trouble: Spam/Abuse requests: mailto:abuse@proxad.net
admin-c: APfP1-RIPE
tech-c: TPfP1-RIPE
nic-hdl: TCP8-RIPE
mnt-by: PROXAD-MNT
created: 2002-06-26T12:29:10Z
last-modified: 2011-06-14T09:03:07Z
source: RIPE # Filtered
abuse-mailbox: abuse@proxad.net
% Information related to '82.254.160.0/19AS12322'
route: 82.254.160.0/19
descr: ProXad network / Free SAS
descr: Paris, France
origin: AS12322
mnt-by: PROXAD-MNT
created: 2026-01-30T16:14:24Z
last-modified: 2026-01-30T16:14:24Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.254.172.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.254.172.3. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 19:07:02 CST 2026
;; MSG SIZE rcvd: 105
3.172.254.82.in-addr.arpa domain name pointer lns-bzn-25-82-254-172-3.adsl.proxad.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
3.172.254.82.in-addr.arpa name = lns-bzn-25-82-254-172-3.adsl.proxad.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.71.211.45 | attackspam | Invalid user honda from 167.71.211.45 port 57658 |
2020-10-13 13:00:05 |
| 220.130.10.13 | attackspambots | 2020-10-13T06:25:11.316425n23.at sshd[1556927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 2020-10-13T06:25:11.308324n23.at sshd[1556927]: Invalid user arts from 220.130.10.13 port 45992 2020-10-13T06:25:13.477045n23.at sshd[1556927]: Failed password for invalid user arts from 220.130.10.13 port 45992 ssh2 ... |
2020-10-13 12:31:26 |
| 37.140.195.88 | attackspam | (sshd) Failed SSH login from 37.140.195.88 (RU/Russia/37-140-195-88.cloudvps.regruhosting.ru): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 13 00:31:24 optimus sshd[30497]: Failed password for root from 37.140.195.88 port 48048 ssh2 Oct 13 00:35:18 optimus sshd[2313]: Failed password for root from 37.140.195.88 port 52850 ssh2 Oct 13 00:39:11 optimus sshd[3522]: Invalid user itt from 37.140.195.88 Oct 13 00:39:14 optimus sshd[3522]: Failed password for invalid user itt from 37.140.195.88 port 57646 ssh2 Oct 13 00:43:02 optimus sshd[4708]: Failed password for root from 37.140.195.88 port 34214 ssh2 |
2020-10-13 13:04:53 |
| 106.54.191.247 | attackspambots | Oct 13 02:43:34 124388 sshd[27738]: Invalid user hn from 106.54.191.247 port 38672 Oct 13 02:43:34 124388 sshd[27738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247 Oct 13 02:43:34 124388 sshd[27738]: Invalid user hn from 106.54.191.247 port 38672 Oct 13 02:43:36 124388 sshd[27738]: Failed password for invalid user hn from 106.54.191.247 port 38672 ssh2 Oct 13 02:48:28 124388 sshd[27928]: Invalid user zizhao from 106.54.191.247 port 33180 |
2020-10-13 13:04:32 |
| 45.227.255.204 | attackspambots | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-13T04:14:55Z |
2020-10-13 12:28:17 |
| 141.8.120.60 | attackspambots | Automatic report - Port Scan Attack |
2020-10-13 13:00:31 |
| 63.240.240.74 | attackbotsspam | Oct 13 01:24:59 firewall sshd[2851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74 Oct 13 01:24:59 firewall sshd[2851]: Invalid user yard from 63.240.240.74 Oct 13 01:25:01 firewall sshd[2851]: Failed password for invalid user yard from 63.240.240.74 port 36247 ssh2 ... |
2020-10-13 12:40:48 |
| 104.248.130.10 | attackspam | $f2bV_matches |
2020-10-13 12:48:46 |
| 124.118.137.10 | attack | Oct 13 06:33:13 sip sshd[1921866]: Invalid user rock from 124.118.137.10 port 46248 Oct 13 06:33:15 sip sshd[1921866]: Failed password for invalid user rock from 124.118.137.10 port 46248 ssh2 Oct 13 06:37:50 sip sshd[1921912]: Invalid user jking from 124.118.137.10 port 44160 ... |
2020-10-13 12:45:17 |
| 163.172.148.34 | attackspam | 2020-10-13T07:25:11.753997lavrinenko.info sshd[8642]: Failed password for invalid user teri from 163.172.148.34 port 39942 ssh2 2020-10-13T07:28:25.618869lavrinenko.info sshd[8855]: Invalid user duncan from 163.172.148.34 port 44156 2020-10-13T07:28:25.630247lavrinenko.info sshd[8855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.148.34 2020-10-13T07:28:25.618869lavrinenko.info sshd[8855]: Invalid user duncan from 163.172.148.34 port 44156 2020-10-13T07:28:27.753422lavrinenko.info sshd[8855]: Failed password for invalid user duncan from 163.172.148.34 port 44156 ssh2 ... |
2020-10-13 12:35:33 |
| 206.81.8.136 | attack | Invalid user admin from 206.81.8.136 port 33130 |
2020-10-13 12:42:21 |
| 35.238.6.69 | attackbotsspam | Invalid user test from 35.238.6.69 port 48062 |
2020-10-13 13:02:46 |
| 90.35.71.95 | attack | Multiport scan : 6 ports scanned 80(x16) 443(x13) 465(x15) 3074(x11) 3478(x6) 8080(x13) |
2020-10-13 12:54:50 |
| 181.49.246.20 | attack | 2020-10-12T20:37:45.707382morrigan.ad5gb.com sshd[845856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.246.20 user=root 2020-10-12T20:37:47.726177morrigan.ad5gb.com sshd[845856]: Failed password for root from 181.49.246.20 port 47316 ssh2 |
2020-10-13 12:34:45 |
| 111.229.159.76 | attackbots | web-1 [ssh] SSH Attack |
2020-10-13 12:44:16 |