City: Strasbourg
Region: Grand Est
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.25.172.0 - 85.25.174.255'
% Abuse contact for '85.25.172.0 - 85.25.174.255' is 'abuse-inquiries@server4you.com'
inetnum: 85.25.172.0 - 85.25.174.255
netname: DE-VELIANET1-20051205
country: DE
geofeed: https://www.velia.net/geofeed.csv
org: ORG-VIG33-RIPE
admin-c: NA8204-RIPE
tech-c: NA8204-RIPE
status: ALLOCATED PA
mnt-by: FGK-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2023-10-27T06:40:19Z
last-modified: 2025-07-03T15:48:48Z
source: RIPE
organisation: ORG-VIG33-RIPE
org-name: velia.net Internetdienste GmbH
country: DE
org-type: LIR
address: Hessen-Homburg-Platz 1
address: 63452
address: Hanau
address: GERMANY
phone: +4915165485359
admin-c: NA8204-RIPE
tech-c: NA8204-RIPE
abuse-c: AR70495-RIPE
mnt-by: RIPE-NCC-HM-MNT
mnt-by: FGK-MNT
created: 2023-06-29T07:51:31Z
last-modified: 2024-02-14T08:32:48Z
source: RIPE # Filtered
mnt-ref: FGK-MNT
role: Network
address: GERMANY
address: Hanau
address: 63452
address: Hessen-Homburg-Platz 5
phone: +4915165485359
nic-hdl: NA8204-RIPE
mnt-by: lir-de-velianet1-1-MNT
created: 2023-06-29T07:51:30Z
last-modified: 2024-07-18T07:36:25Z
source: RIPE # Filtered
% Information related to '85.25.172.0/23AS29066'
route: 85.25.172.0/23
origin: AS29066
mnt-by: FGK-MNT
created: 2023-10-16T11:20:08Z
last-modified: 2023-10-16T11:20:08Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.25.172.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.25.172.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032800 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 20:30:53 CST 2026
;; MSG SIZE rcvd: 106
249.172.25.85.in-addr.arpa domain name pointer batty1158.startdedicated.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.172.25.85.in-addr.arpa name = batty1158.startdedicated.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.141.84.29 | attackspam | 45.141.84.29 was recorded 9 times by 7 hosts attempting to connect to the following ports: 3389,3356,3360,3347,3392,3391,3305. Incident counter (4h, 24h, all-time): 9, 70, 454 |
2019-11-14 03:28:02 |
| 114.98.232.165 | attackspambots | Nov 13 19:46:47 tuxlinux sshd[63356]: Invalid user reihold from 114.98.232.165 port 52498 Nov 13 19:46:47 tuxlinux sshd[63356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.232.165 Nov 13 19:46:47 tuxlinux sshd[63356]: Invalid user reihold from 114.98.232.165 port 52498 Nov 13 19:46:47 tuxlinux sshd[63356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.232.165 Nov 13 19:46:47 tuxlinux sshd[63356]: Invalid user reihold from 114.98.232.165 port 52498 Nov 13 19:46:47 tuxlinux sshd[63356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.232.165 Nov 13 19:46:48 tuxlinux sshd[63356]: Failed password for invalid user reihold from 114.98.232.165 port 52498 ssh2 ... |
2019-11-14 03:30:18 |
| 91.216.61.99 | attackbots | Unauthorized connection attempt from IP address 91.216.61.99 on Port 445(SMB) |
2019-11-14 03:29:34 |
| 111.242.25.96 | attackspambots | scan z |
2019-11-14 03:39:44 |
| 24.104.74.26 | attack | Unauthorized connection attempt from IP address 24.104.74.26 on Port 445(SMB) |
2019-11-14 03:44:23 |
| 125.24.198.23 | attackspambots | Unauthorized connection attempt from IP address 125.24.198.23 on Port 445(SMB) |
2019-11-14 03:54:08 |
| 2.134.148.106 | attack | Unauthorized connection attempt from IP address 2.134.148.106 on Port 445(SMB) |
2019-11-14 03:30:58 |
| 123.16.247.2 | attackspam | Unauthorized connection attempt from IP address 123.16.247.2 on Port 445(SMB) |
2019-11-14 03:50:43 |
| 218.92.0.193 | attack | Nov 13 16:33:16 ovpn sshd\[23735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193 user=root Nov 13 16:33:19 ovpn sshd\[23735\]: Failed password for root from 218.92.0.193 port 17410 ssh2 Nov 13 16:33:37 ovpn sshd\[23819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193 user=root Nov 13 16:33:39 ovpn sshd\[23819\]: Failed password for root from 218.92.0.193 port 40478 ssh2 Nov 13 16:33:51 ovpn sshd\[23819\]: Failed password for root from 218.92.0.193 port 40478 ssh2 |
2019-11-14 03:31:44 |
| 137.74.80.36 | attackbots | 2019-11-13T17:20:50.760384abusebot-2.cloudsearch.cf sshd\[1052\]: Invalid user miyagaki from 137.74.80.36 port 38634 |
2019-11-14 03:29:56 |
| 103.93.221.228 | attackbots | Unauthorized connection attempt from IP address 103.93.221.228 on Port 445(SMB) |
2019-11-14 03:40:11 |
| 111.250.130.121 | attackspam | Port scan |
2019-11-14 03:32:23 |
| 100.32.176.179 | attack | Automatic report - Port Scan Attack |
2019-11-14 03:30:42 |
| 167.114.113.173 | attackbots | SSH brutforce |
2019-11-14 03:41:28 |
| 118.187.6.171 | attackspambots | Unauthorized connection attempt from IP address 118.187.6.171 on Port 3389(RDP) |
2019-11-14 03:39:13 |