City: Huelva
Region: Comunidad Autónoma de Andalucía
Country: Spain
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.137.48.0 - 85.137.48.255'
% Abuse contact for '85.137.48.0 - 85.137.48.255' is 'abuse-ams@v-sys.org'
inetnum: 85.137.48.0 - 85.137.48.255
netname: VSYS-AMS
country: NL
admin-c: VS10657-RIPE
tech-c: VSAA1-RIPE
abuse-c: VSAA1-RIPE
geofeed: https://vsys.host/geofeed.csv
status: SUB-ALLOCATED PA
created: 2026-03-06T15:36:21Z
last-modified: 2026-03-06T15:36:21Z
source: RIPE
mnt-by: VSYS-MNT
role: Virtual Systems Amsterdam Abuse Department
address: Amsterdaam, The Netherlands
address: Haarlem, Lucasweg 35
abuse-mailbox: abuse-ams@v-sys.org
nic-hdl: VSAA1-RIPE
mnt-by: VSYS-MNT
created: 2023-12-22T10:16:19Z
last-modified: 2023-12-22T10:48:55Z
source: RIPE # Filtered
person: Vyacheslav Smyrnov
address: Laboratorna 33/37
address: 03150
address: Kiyv
address: UKRAINE
phone: +380981968199
nic-hdl: VS10657-RIPE
mnt-by: VSYS-MNT
created: 2019-01-23T14:51:44Z
last-modified: 2020-12-24T12:00:56Z
source: RIPE
% Information related to '85.137.48.0/24AS43641'
route: 85.137.48.0/24
origin: AS43641
created: 2026-03-06T15:36:47Z
last-modified: 2026-03-06T15:36:47Z
source: RIPE
mnt-by: VSYS-MNT
% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.137.48.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.137.48.160. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 23:00:11 CST 2026
;; MSG SIZE rcvd: 106
160.48.137.85.in-addr.arpa domain name pointer dedicated.vsys.host.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
160.48.137.85.in-addr.arpa name = dedicated.vsys.host.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 131.221.128.52 | attackbotsspam | SSH bruteforce |
2020-04-14 04:55:57 |
| 51.255.149.55 | attackspambots | Brute-force attempt banned |
2020-04-14 04:22:49 |
| 49.234.50.247 | attackbots | SSH Brute-Forcing (server1) |
2020-04-14 04:53:04 |
| 92.63.194.90 | attackbots | Apr 14 03:09:22 itv-usvr-01 sshd[32580]: Invalid user 1234 from 92.63.194.90 |
2020-04-14 04:21:02 |
| 112.85.42.181 | attackbots | Apr 13 22:23:42 vps sshd[165970]: Failed password for root from 112.85.42.181 port 27967 ssh2 Apr 13 22:23:45 vps sshd[165970]: Failed password for root from 112.85.42.181 port 27967 ssh2 Apr 13 22:23:48 vps sshd[165970]: Failed password for root from 112.85.42.181 port 27967 ssh2 Apr 13 22:23:51 vps sshd[165970]: Failed password for root from 112.85.42.181 port 27967 ssh2 Apr 13 22:23:54 vps sshd[165970]: Failed password for root from 112.85.42.181 port 27967 ssh2 ... |
2020-04-14 04:24:41 |
| 180.76.141.221 | attackspam | (sshd) Failed SSH login from 180.76.141.221 (CN/China/-): 5 in the last 3600 secs |
2020-04-14 04:44:21 |
| 222.186.175.167 | attackspambots | 2020-04-13T20:23:31.800915shield sshd\[29390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root 2020-04-13T20:23:33.662505shield sshd\[29390\]: Failed password for root from 222.186.175.167 port 2706 ssh2 2020-04-13T20:23:36.484913shield sshd\[29390\]: Failed password for root from 222.186.175.167 port 2706 ssh2 2020-04-13T20:23:39.053136shield sshd\[29390\]: Failed password for root from 222.186.175.167 port 2706 ssh2 2020-04-13T20:23:42.374883shield sshd\[29390\]: Failed password for root from 222.186.175.167 port 2706 ssh2 |
2020-04-14 04:26:56 |
| 45.95.168.159 | attackbotsspam | Apr 13 22:06:58 web01.agentur-b-2.de postfix/smtpd[627663]: warning: unknown[45.95.168.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 13 22:06:58 web01.agentur-b-2.de postfix/smtpd[627663]: lost connection after AUTH from unknown[45.95.168.159] Apr 13 22:07:12 web01.agentur-b-2.de postfix/smtpd[627445]: warning: unknown[45.95.168.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 13 22:07:12 web01.agentur-b-2.de postfix/smtpd[627445]: lost connection after AUTH from unknown[45.95.168.159] Apr 13 22:07:57 web01.agentur-b-2.de postfix/smtpd[627445]: warning: unknown[45.95.168.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 13 22:07:57 web01.agentur-b-2.de postfix/smtpd[627445]: lost connection after AUTH from unknown[45.95.168.159] |
2020-04-14 04:44:05 |
| 191.241.239.90 | attackspam | Apr 13 21:14:24 eventyay sshd[7165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.239.90 Apr 13 21:14:26 eventyay sshd[7165]: Failed password for invalid user anonymous from 191.241.239.90 port 56980 ssh2 Apr 13 21:20:25 eventyay sshd[7489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.239.90 ... |
2020-04-14 04:46:43 |
| 222.186.173.238 | attackbotsspam | 04/13/2020-16:38:42.163476 222.186.173.238 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-14 04:40:54 |
| 83.14.66.26 | attackbots | Automatic report - Port Scan Attack |
2020-04-14 04:54:58 |
| 138.68.77.207 | attackbotsspam | Apr 13 21:02:41 haigwepa sshd[10188]: Failed password for root from 138.68.77.207 port 38138 ssh2 ... |
2020-04-14 04:36:08 |
| 124.207.98.213 | attack | Brute-force attempt banned |
2020-04-14 04:47:13 |
| 79.100.213.125 | attack | ddos me every day and spam on web sites :)) |
2020-04-14 04:57:53 |
| 192.99.58.112 | attackbots | 192.99.58.112 - - [13/Apr/2020:19:16:20 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.99.58.112 - - [13/Apr/2020:19:16:22 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.99.58.112 - - [13/Apr/2020:19:16:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-14 05:02:04 |