City: Amsterdam
Region: Noord Holland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '94.142.240.71 - 94.142.240.71'
% Abuse contact for '94.142.240.71 - 94.142.240.71' is 'abuse@coloclue.net'
inetnum: 94.142.240.71 - 94.142.240.71
netname: COLOCLUE-MEMBER-146
descr: Dedicated space for member 146
country: NL
admin-c: CLUE1-RIPE
tech-c: CLUE1-RIPE
status: ASSIGNED PA
mnt-by: COLOCLUE-MNT
mnt-routes: COLOCLUE-MNT
created: 2022-12-24T15:54:02Z
last-modified: 2022-12-24T15:54:02Z
source: RIPE # Filtered
role: Netwerkvereniging Coloclue
address: Mortelweg 10d
address: 6551AE Weurt
address: Netherlands
phone: +31651387718
abuse-mailbox: abuse@coloclue.net
remarks: -----------------------------------------------------
remarks: Operational issues: routers@coloclue.net
remarks: Abuse issues: abuse@coloclue.net
remarks: -----------------------------------------------------
admin-c: MWTS1-RIPE
admin-c: PDW-RIPE
admin-c: NH5144-RIPE
tech-c: JVI-RIPE
tech-c: LUJE-RIPE
tech-c: MS44437-RIPE
tech-c: RAK24-RIPE
tech-c: CNPR-RIPE
tech-c: TDB189-RIPE
tech-c: PDW-RIPE
tech-c: JWJS1-RIPE
tech-c: NH5144-RIPE
nic-hdl: CLUE1-RIPE
mnt-by: COLOCLUE-MNT
created: 2009-02-24T12:16:45Z
last-modified: 2026-03-25T08:52:11Z
source: RIPE # Filtered
% Information related to '94.142.240.0/21AS8283'
route: 94.142.240.0/21
descr: Netwerkvereniging Coloclue, Amsterdam, Netherlands
origin: AS8283
remarks: ----------------------------------------
remarks: Send abuse reports to abuse@coloclue.net
remarks: ----------------------------------------
mnt-by: COLOCLUE-MNT
created: 2009-01-14T14:50:11Z
last-modified: 2009-01-14T14:50:11Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.142.240.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.142.240.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042202 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 09:39:23 CST 2026
;; MSG SIZE rcvd: 106
71.240.142.94.in-addr.arpa domain name pointer hvn0.nlams2.ipng.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.240.142.94.in-addr.arpa name = hvn0.nlams2.ipng.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.55.52 | attack | Nov 7 21:22:06 srv1 sshd[29225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52 Nov 7 21:22:08 srv1 sshd[29225]: Failed password for invalid user brz from 178.128.55.52 port 53426 ssh2 ... |
2019-11-08 06:13:47 |
| 211.152.62.14 | attackspam | Nov 7 17:42:31 dev0-dcde-rnet sshd[23231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.62.14 Nov 7 17:42:33 dev0-dcde-rnet sshd[23231]: Failed password for invalid user ym from 211.152.62.14 port 44580 ssh2 Nov 7 17:46:57 dev0-dcde-rnet sshd[23259]: Failed password for root from 211.152.62.14 port 58958 ssh2 |
2019-11-08 06:04:08 |
| 125.124.73.4 | attackspam | $f2bV_matches |
2019-11-08 06:25:53 |
| 27.5.227.68 | attack | Caught in portsentry honeypot |
2019-11-08 06:09:04 |
| 36.110.78.62 | attackspambots | 2019-11-07T21:41:23.646028abusebot-5.cloudsearch.cf sshd\[24478\]: Invalid user hp from 36.110.78.62 port 41674 |
2019-11-08 06:08:25 |
| 112.170.69.163 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-08 06:08:47 |
| 49.88.112.77 | attackbotsspam | 2019-11-07T15:09:48.626825abusebot-3.cloudsearch.cf sshd\[6173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.77 user=root |
2019-11-08 05:53:31 |
| 198.108.67.105 | attack | ET DROP Dshield Block Listed Source group 1 - port: 9217 proto: TCP cat: Misc Attack |
2019-11-08 06:10:13 |
| 218.71.86.52 | attackspambots | FTP brute-force attack |
2019-11-08 06:11:48 |
| 37.39.146.229 | attackbotsspam | 07.11.2019 15:39:48 - SMTP Spam without Auth on hMailserver Detected by ELinOX-hMail-A2F |
2019-11-08 05:52:54 |
| 218.93.33.52 | attack | $f2bV_matches |
2019-11-08 06:09:25 |
| 113.65.153.51 | attack | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2019-11-08 05:57:57 |
| 129.211.77.44 | attackbots | Nov 7 23:49:05 hosting sshd[22712]: Invalid user wpyan from 129.211.77.44 port 56484 ... |
2019-11-08 06:06:08 |
| 222.112.70.86 | attackbots | KR South Korea - Hits: 11 |
2019-11-08 06:02:20 |
| 37.49.231.121 | attackbotsspam | firewall-block, port(s): 2362/udp |
2019-11-08 06:07:20 |