城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '151.89.0.0 - 151.89.255.255'
% Abuse contact for '151.89.0.0 - 151.89.255.255' is 'ict_wan@leonardo.com'
inetnum: 151.89.0.0 - 151.89.255.255
netname: LEONARDO
descr: Leonardo spa network
country: IT
org: ORG-MSCS1-RIPE
admin-c: DT9668-RIPE
tech-c: DT9668-RIPE
status: LEGACY
mnt-by: RIPE-NCC-LEGACY-MNT
mnt-by: ITMSC-MNT
mnt-by: LEONARDO-MNT
mnt-routes: ITMSC-MNT
mnt-routes: LEONARDO-MNT
created: 2006-04-24T08:52:02Z
last-modified: 2024-04-12T09:56:41Z
source: RIPE
organisation: ORG-MSCS1-RIPE
org-name: Leonardo S.p.A.
country: IT
org-type: LIR
address: Via Faustiniana 29 Rome Italy
address: 00131
address: Rome
address: ITALY
phone: +39 3316067215
reg-nr: 00401990585
abuse-c: AR15839-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: ITMSC-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: ITMSC-MNT
admin-c: SL2077-RIPE
admin-c: FM3212-RIPE
admin-c: CF651-RIPE
admin-c: PJ4310-RIPE
admin-c: LM1415-RIPE
created: 2005-01-31T13:01:48Z
last-modified: 2026-04-29T05:30:11Z
source: RIPE # Filtered
person: Danilo Ticconi
address: Via Faustiniana 29 00131 Roma
phone: +39 331 606 7215
nic-hdl: DT9668-RIPE
mnt-by: ITMSC-MNT
created: 2024-01-17T10:10:43Z
last-modified: 2024-04-12T09:52:21Z
source: RIPE # Filtered
% Information related to '151.89.0.0/17AS48135'
route: 151.89.0.0/17
descr: Leonardo spa net
origin: AS48135
mnt-by: ITMSC-MNT
mnt-by: LEONARDO-MNT
created: 2014-06-18T14:23:06Z
last-modified: 2017-07-21T12:19:41Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 151.89.90.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;151.89.90.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042902 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 07:06:21 CST 2026
;; MSG SIZE rcvd: 106
Host 137.90.89.151.in-addr.arpa not found: 2(SERVFAIL)
server can't find 151.89.90.137.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.92.11.250 | attackbots | firewall-block, port(s): 445/tcp |
2020-04-04 07:28:17 |
| 144.131.134.105 | attackbots | Apr 3 19:44:33 vps46666688 sshd[19341]: Failed password for root from 144.131.134.105 port 46757 ssh2 ... |
2020-04-04 06:57:59 |
| 45.125.65.35 | attackbots | Apr 4 01:13:08 srv01 postfix/smtpd\[15524\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 4 01:13:24 srv01 postfix/smtpd\[19037\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 4 01:13:28 srv01 postfix/smtpd\[15524\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 4 01:22:20 srv01 postfix/smtpd\[19037\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 4 01:22:41 srv01 postfix/smtpd\[8188\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-04 07:25:54 |
| 58.211.122.66 | attackspambots | (sshd) Failed SSH login from 58.211.122.66 (CN/China/-): 5 in the last 3600 secs |
2020-04-04 07:24:37 |
| 192.241.237.68 | attackspambots | firewall-block, port(s): 554/tcp |
2020-04-04 07:25:27 |
| 185.175.93.23 | attack | Multiport scan : 15 ports scanned 5920 5921 5922 5925 5927 5932 5933 5937 5938 5939 5941 5946 5950 5952 5953 |
2020-04-04 07:15:06 |
| 150.136.236.53 | attackbotsspam | Invalid user fm from 150.136.236.53 port 60842 |
2020-04-04 07:14:10 |
| 94.102.49.206 | attackbots | Apr 4 00:22:44 OPSO sshd\[28653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root Apr 4 00:22:46 OPSO sshd\[28653\]: Failed password for root from 94.102.49.206 port 50832 ssh2 Apr 4 00:22:47 OPSO sshd\[28655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root Apr 4 00:22:49 OPSO sshd\[28655\]: Failed password for root from 94.102.49.206 port 55300 ssh2 Apr 4 00:22:49 OPSO sshd\[28658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root |
2020-04-04 07:08:51 |
| 51.158.96.229 | attackspam | 2020-04-03T21:51:12.162462ionos.janbro.de sshd[43689]: Failed password for root from 51.158.96.229 port 58944 ssh2 2020-04-03T21:54:48.538763ionos.janbro.de sshd[43752]: Invalid user oracle from 51.158.96.229 port 43002 2020-04-03T21:54:48.689050ionos.janbro.de sshd[43752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.96.229 2020-04-03T21:54:48.538763ionos.janbro.de sshd[43752]: Invalid user oracle from 51.158.96.229 port 43002 2020-04-03T21:54:50.301543ionos.janbro.de sshd[43752]: Failed password for invalid user oracle from 51.158.96.229 port 43002 ssh2 2020-04-03T21:58:31.674804ionos.janbro.de sshd[43797]: Invalid user icn from 51.158.96.229 port 55302 2020-04-03T21:58:32.252965ionos.janbro.de sshd[43797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.96.229 2020-04-03T21:58:31.674804ionos.janbro.de sshd[43797]: Invalid user icn from 51.158.96.229 port 55302 2020-04-03T21:58:34.289298i ... |
2020-04-04 06:59:09 |
| 110.35.173.103 | attackspam | Invalid user hata from 110.35.173.103 port 33140 |
2020-04-04 07:28:55 |
| 178.62.23.60 | attackbotsspam | Apr 3 23:40:41 srv206 sshd[29595]: Invalid user fanshikui from 178.62.23.60 Apr 3 23:40:41 srv206 sshd[29595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=kitsong.co.za Apr 3 23:40:41 srv206 sshd[29595]: Invalid user fanshikui from 178.62.23.60 Apr 3 23:40:43 srv206 sshd[29595]: Failed password for invalid user fanshikui from 178.62.23.60 port 32862 ssh2 ... |
2020-04-04 07:02:57 |
| 222.186.169.194 | attackspambots | Apr 3 17:25:57 debian sshd[7685]: Unable to negotiate with 222.186.169.194 port 3166: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 3 19:12:50 debian sshd[12516]: Unable to negotiate with 222.186.169.194 port 60834: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-04-04 07:14:50 |
| 185.176.27.162 | attackspam | Multiport scan : 17 ports scanned 1991 3383 3847 3922 4010 4111 4226 5382 5511 8081 8300 9124 10015 27010 33856 61143 64532 |
2020-04-04 07:31:13 |
| 51.15.51.2 | attack | Apr 3 21:40:53 *** sshd[15369]: User root from 51.15.51.2 not allowed because not listed in AllowUsers |
2020-04-04 06:54:39 |
| 104.248.1.92 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-04-04 07:08:34 |