City: Gravelines
Region: Hauts-de-France
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.217.140.0 - 85.217.140.255'
% Abuse contact for '85.217.140.0 - 85.217.140.255' is 'abuse@modat.io'
inetnum: 85.217.140.0 - 85.217.140.255
geoloc: 48.8582 2.3387
netname: NL-MODAT-20050118
country: FR
org: ORG-MB333-RIPE
admin-c: SA44188-RIPE
tech-c: SA44188-RIPE
status: ALLOCATED PA
mnt-by: lir-nl-modat-1-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2025-10-01T10:50:59Z
last-modified: 2026-01-05T14:34:51Z
source: RIPE
descr: -----BEGIN TOKEN-----0583cd002dd2d40e0493d0b39614036b09af1496be82f0ea11044c6a4f69570044d6239017a1a02777ac81b2b9fb53ace406737ea8afd965b98f4332ad67b88d-----END TOKEN-----
organisation: ORG-MB333-RIPE
org-name: Modat B.V.
country: NL
org-type: LIR
address: Wilhelmina van Pruisenweg 104
address: 2595 AN
address: Den Haag
address: NETHERLANDS
phone: +31625014423
admin-c: SA44188-RIPE
tech-c: SA44188-RIPE
abuse-c: AR78809-RIPE
mnt-ref: lir-nl-modat-1-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-nl-modat-1-MNT
created: 2025-09-16T07:00:41Z
last-modified: 2025-09-16T07:00:41Z
source: RIPE # Filtered
role: security
address: NETHERLANDS
address: Den Haag
address: 2595 AN
address: Wilhelmina van Pruisenweg 104
phone: +31625014423
nic-hdl: SA44188-RIPE
mnt-by: lir-nl-modat-1-MNT
created: 2025-09-16T07:00:41Z
last-modified: 2025-09-16T07:00:41Z
source: RIPE # Filtered
% Information related to '85.217.140.0/24AS209334'
route: 85.217.140.0/24
origin: AS209334
mnt-by: lir-nl-modat-1-MNT
created: 2025-10-10T08:43:52Z
last-modified: 2025-10-10T08:43:52Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.217.140.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.217.140.26. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040802 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 06:00:14 CST 2026
;; MSG SIZE rcvd: 106
26.140.217.85.in-addr.arpa domain name pointer o325.scanner.modat.io.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
26.140.217.85.in-addr.arpa name = o325.scanner.modat.io.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.148.5.23 | attack | 2019-09-09 20:43:53,978 fail2ban.actions [814]: NOTICE [sshd] Ban 180.148.5.23 2019-09-10 00:43:17,642 fail2ban.actions [814]: NOTICE [sshd] Ban 180.148.5.23 2019-09-10 04:03:01,364 fail2ban.actions [814]: NOTICE [sshd] Ban 180.148.5.23 ... |
2019-09-13 13:16:22 |
| 188.240.208.26 | attackspam | B: zzZZzz blocked content access |
2019-09-13 14:09:35 |
| 27.254.130.69 | attackbotsspam | Sep 13 05:15:14 ip-172-31-1-72 sshd\[6333\]: Invalid user root123 from 27.254.130.69 Sep 13 05:15:14 ip-172-31-1-72 sshd\[6333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69 Sep 13 05:15:16 ip-172-31-1-72 sshd\[6333\]: Failed password for invalid user root123 from 27.254.130.69 port 38413 ssh2 Sep 13 05:20:57 ip-172-31-1-72 sshd\[6397\]: Invalid user 123456 from 27.254.130.69 Sep 13 05:20:57 ip-172-31-1-72 sshd\[6397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69 |
2019-09-13 13:54:48 |
| 218.78.50.252 | attack | 218.78.50.252 has been banned from MailServer for Abuse ... |
2019-09-13 13:57:59 |
| 175.197.77.3 | attack | Sep 13 07:11:10 icinga sshd[11147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.77.3 Sep 13 07:11:12 icinga sshd[11147]: Failed password for invalid user sftptest from 175.197.77.3 port 53554 ssh2 ... |
2019-09-13 13:18:34 |
| 190.193.110.10 | attackbots | Sep 13 02:14:51 MK-Soft-VM6 sshd\[12490\]: Invalid user server from 190.193.110.10 port 39030 Sep 13 02:14:51 MK-Soft-VM6 sshd\[12490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.110.10 Sep 13 02:14:52 MK-Soft-VM6 sshd\[12490\]: Failed password for invalid user server from 190.193.110.10 port 39030 ssh2 ... |
2019-09-13 13:49:22 |
| 81.198.222.29 | attack | LV - 1H : (2) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : LV NAME ASN : ASN12578 IP : 81.198.222.29 CIDR : 81.198.208.0/20 PREFIX COUNT : 102 UNIQUE IP COUNT : 459008 WYKRYTE ATAKI Z ASN12578 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-09-13 14:01:07 |
| 68.183.133.21 | attackbots | Sep 13 05:07:20 lnxmysql61 sshd[20015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21 |
2019-09-13 13:43:46 |
| 118.25.189.123 | attackspambots | Invalid user bot from 118.25.189.123 port 55656 |
2019-09-13 13:26:11 |
| 51.77.146.136 | attackbots | Invalid user admin from 51.77.146.136 port 50738 |
2019-09-13 13:44:11 |
| 49.81.92.93 | attackspambots | $f2bV_matches |
2019-09-13 13:45:19 |
| 190.0.159.86 | attack | $f2bV_matches |
2019-09-13 13:13:31 |
| 115.55.98.191 | attackbotsspam | Sep 13 04:44:58 *** sshd[20669]: User root from 115.55.98.191 not allowed because not listed in AllowUsers |
2019-09-13 13:50:07 |
| 62.234.134.139 | attackspam | Sep 12 17:54:41 lcdev sshd\[24315\]: Invalid user admin from 62.234.134.139 Sep 12 17:54:41 lcdev sshd\[24315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.134.139 Sep 12 17:54:43 lcdev sshd\[24315\]: Failed password for invalid user admin from 62.234.134.139 port 57136 ssh2 Sep 12 17:59:35 lcdev sshd\[24693\]: Invalid user ftp from 62.234.134.139 Sep 12 17:59:35 lcdev sshd\[24693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.134.139 |
2019-09-13 13:53:19 |
| 129.28.115.92 | attackspambots | Invalid user git from 129.28.115.92 port 47658 |
2019-09-13 13:40:28 |