City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.30.178.0 - 85.30.178.255'
% Abuse contact for '85.30.178.0 - 85.30.178.255' is 'abuse@teleservice.net'
inetnum: 85.30.178.0 - 85.30.178.255
netname: TELESERVICE-SE
descr: TOM-FTTH-HSI
remarks: INFRA-AW
country: SE
admin-c: TR1369-RIPE
tech-c: TR1369-RIPE
status: ASSIGNED PA
mnt-by: TELESERVICE-MNT
created: 2012-04-12T09:25:05Z
last-modified: 2012-04-12T09:25:05Z
source: RIPE
role: TELESERVICE ROLE
address: Teleservice Bredband Skane AB
address: Vastergatan 14 S-275 23 SJOBO Sweden
phone: +46 416-585000
fax-no: +46 416-585010
abuse-mailbox: abuse@teleservice.net
admin-c: JA838-RIPE
tech-c: JA838-RIPE
mnt-by: TELESERVICE-MNT
nic-hdl: TR1369-RIPE
created: 2005-07-24T18:42:42Z
last-modified: 2011-07-26T08:34:38Z
source: RIPE # Filtered
% Information related to '85.30.128.0/18AS34244'
route: 85.30.128.0/18
origin: AS34244
mnt-by: TELESERVICE-MNT
created: 2025-03-09T22:14:20Z
last-modified: 2025-03-09T22:14:20Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.30.178.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.30.178.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:42:18 CST 2026
;; MSG SIZE rcvd: 106
162.178.30.85.in-addr.arpa domain name pointer host-85-30-178-162.sydskane.nu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
162.178.30.85.in-addr.arpa name = host-85-30-178-162.sydskane.nu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.35.168.220 | attackbots | Icarus honeypot on github |
2020-09-06 03:56:24 |
| 62.194.207.217 | attackbotsspam | Sep 4 18:44:54 mellenthin postfix/smtpd[31059]: NOQUEUE: reject: RCPT from h207217.upc-h.chello.nl[62.194.207.217]: 554 5.7.1 Service unavailable; Client host [62.194.207.217] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/62.194.207.217; from= |
2020-09-06 04:14:58 |
| 218.51.205.132 | attackspambots | SSH Brute-Forcing (server1) |
2020-09-06 04:10:07 |
| 165.22.89.225 | attackspam | IP blocked |
2020-09-06 04:09:47 |
| 190.2.215.22 | attackspam | Sep 4 18:44:50 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[190.2.215.22]: 554 5.7.1 Service unavailable; Client host [190.2.215.22] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/190.2.215.22; from= |
2020-09-06 04:15:38 |
| 52.173.28.92 | attackspambots | Sep 3 18:17:36 finn sshd[31529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.28.92 user=r.r Sep 3 18:17:38 finn sshd[31529]: Failed password for r.r from 52.173.28.92 port 59198 ssh2 Sep 3 18:17:38 finn sshd[31529]: Received disconnect from 52.173.28.92 port 59198:11: Bye Bye [preauth] Sep 3 18:17:38 finn sshd[31529]: Disconnected from 52.173.28.92 port 59198 [preauth] Sep 3 18:31:24 finn sshd[3950]: Invalid user rachel from 52.173.28.92 port 32910 Sep 3 18:31:24 finn sshd[3950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.28.92 Sep 3 18:31:26 finn sshd[3950]: Failed password for invalid user rachel from 52.173.28.92 port 32910 ssh2 Sep 3 18:31:26 finn sshd[3950]: Received disconnect from 52.173.28.92 port 32910:11: Bye Bye [preauth] Sep 3 18:31:26 finn sshd[3950]: Disconnected from 52.173.28.92 port 32910 [preauth] Sep 3 18:36:00 finn sshd[5255]: Invalid use........ ------------------------------- |
2020-09-06 04:20:01 |
| 159.203.74.227 | attackbotsspam | Sep 5 21:40:08 minden010 sshd[31495]: Failed password for root from 159.203.74.227 port 44090 ssh2 Sep 5 21:44:52 minden010 sshd[1051]: Failed password for root from 159.203.74.227 port 52152 ssh2 ... |
2020-09-06 04:21:46 |
| 122.226.73.50 | attackbots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-09-06 03:59:29 |
| 78.128.113.42 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 5907 proto: tcp cat: Misc Attackbytes: 60 |
2020-09-06 04:17:20 |
| 45.123.221.174 | attack | hacking |
2020-09-06 04:13:23 |
| 105.112.101.250 | attack | Unauthorized connection attempt from IP address 105.112.101.250 on Port 445(SMB) |
2020-09-06 04:01:06 |
| 188.195.136.33 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-05T19:34:29Z and 2020-09-05T19:51:33Z |
2020-09-06 04:16:52 |
| 1.7.161.234 | attackspam | Wordpress attack |
2020-09-06 04:08:47 |
| 107.172.140.119 | attackspambots |
|
2020-09-06 04:11:44 |
| 200.73.128.90 | attack | $f2bV_matches |
2020-09-06 04:18:28 |