City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: Telia
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '95.196.0.0 - 95.199.255.255'
% Abuse contact for '95.196.0.0 - 95.199.255.255' is 'abuse@telia.com'
inetnum: 95.196.0.0 - 95.199.255.255
netname: TELIANET
descr: Telia Network Services
descr: ISP
country: SE
admin-c: TR889-RIPE
tech-c: TR889-RIPE
status: ASSIGNED PA
mnt-domains: TELIANET-LIR
mnt-by: TELIANET-LIR
mnt-lower: TELIANET-LIR
mnt-routes: TELIANET-RR
created: 2010-12-10T08:30:37Z
last-modified: 2010-12-10T08:30:37Z
source: RIPE # Filtered
role: TeliaNet Registry
address: Telia Company AB
address: Stjarntorget 1
address: 16979 Solna
address: Sweden
address: ********************************
address: Abuse and intrusion reports should
address: be sent to: abuse@telia.com
address: ********************************
abuse-mailbox: abuse@telia.com
admin-c: EVAO
tech-c: IC106-RIPE
tech-c: ACA-RIPE
tech-c: EVAO
tech-c: PJ2540-RIPE
tech-c: LS483-RIPE
tech-c: PB8229-RIPE
nic-hdl: TR889-RIPE
mnt-by: TELIANET-LIR
created: 2002-08-21T12:58:15Z
last-modified: 2018-01-10T13:32:21Z
source: RIPE # Filtered
% Information related to '95.192.0.0/12AS3301'
route: 95.192.0.0/12
descr: TELIANET-BLK
origin: AS3301
mnt-by: TELIANET-RR
created: 2009-01-08T11:26:42Z
last-modified: 2009-01-08T11:26:42Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.198.127.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.198.127.111. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 18:31:42 CST 2026
;; MSG SIZE rcvd: 107
111.127.198.95.in-addr.arpa domain name pointer host-95-198-127-111.mobileonline.telia.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
111.127.198.95.in-addr.arpa name = host-95-198-127-111.mobileonline.telia.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.248.121.67 | attackspambots | Aug 2 21:25:29 vpn01 sshd\[25467\]: Invalid user user from 104.248.121.67 Aug 2 21:25:29 vpn01 sshd\[25467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 Aug 2 21:25:30 vpn01 sshd\[25467\]: Failed password for invalid user user from 104.248.121.67 port 35774 ssh2 |
2019-08-03 07:20:26 |
| 79.124.7.4 | attack | Automatic report - Banned IP Access |
2019-08-03 07:12:55 |
| 217.61.0.236 | attack | 5060/udp 5060/udp 5060/udp... [2019-07-26/08-02]29pkt,1pt.(udp) |
2019-08-03 07:35:16 |
| 77.87.77.11 | attackspambots | 08/02/2019-15:25:11.164503 77.87.77.11 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-08-03 07:32:51 |
| 136.243.64.152 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: static.152.64.243.136.clients.your-server.de. |
2019-08-03 07:35:46 |
| 185.189.115.37 | attackbotsspam | Aug 3 00:33:11 icinga sshd[28057]: Failed password for root from 185.189.115.37 port 26918 ssh2 ... |
2019-08-03 06:54:25 |
| 201.86.168.252 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-03 07:45:39 |
| 185.175.93.3 | attackbots | 08/02/2019-19:07:29.325680 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-03 07:16:29 |
| 189.45.37.254 | attackspam | Honeypot attack, port: 445, PTR: gw.stech.net.br. |
2019-08-03 06:50:38 |
| 124.29.246.106 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-03 06:57:13 |
| 167.99.230.57 | attackbotsspam | Aug 2 19:25:42 *** sshd[9540]: User root from 167.99.230.57 not allowed because not listed in AllowUsers |
2019-08-03 07:08:14 |
| 201.184.2.18 | attackspam | 60001/tcp [2019-08-02]1pkt |
2019-08-03 07:43:44 |
| 178.162.208.250 | attackspambots | Automatic report - Banned IP Access |
2019-08-03 07:28:18 |
| 62.210.11.172 | attackspambots | Original message Message ID <19XUENCUT06T23ZY03CWM.19XUENCUT06T23ZY03CWM@7355.mail-wi0-f171.google.com> Created on: 2 August 2019 at 03:57 (Delivered after 1 second) From: PAYPAAL ? |
2019-08-03 07:45:13 |
| 188.165.194.169 | attackbotsspam | Aug 3 01:21:55 dedicated sshd[17607]: Invalid user arun from 188.165.194.169 port 38060 |
2019-08-03 07:24:15 |