城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '160.61.0.0 - 160.61.255.255'
% Abuse contact for '160.61.0.0 - 160.61.255.255' is 'abuse.contacts@novartis.com'
inetnum: 160.61.0.0 - 160.61.255.255
netname: CH-NOVARTIS-19931203
org: ORG-NA7-RIPE
descr: Novartis AG
country: CH
geoloc: 47.559601 7.588576
admin-c: NOVN1-RIPE
tech-c: NOVN2-RIPE
status: ASSIGNED PA
mnt-by: NOVARTIS-MNT
mnt-lower: NOVARTIS-MNT
mnt-routes: NOVARTIS-MNT
mnt-domains: NOVARTIS-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2019-03-29T08:26:58Z
source: RIPE
organisation: ORG-NA7-RIPE
org-name: Novartis AG
country: CH
org-type: LIR
address: Novartis Basel
address: CH-4002
address: Basel
address: SWITZERLAND
phone: +1 817 9167984
admin-c: NOVN1-RIPE
tech-c: NOVN2-RIPE
abuse-c: NAC45-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: NOVARTIS-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NOVARTIS-MNT
created: 2004-04-17T11:02:56Z
last-modified: 2020-12-16T12:53:17Z
source: RIPE # Filtered
role: Novartis AG Administrative Contact
address: CH-4002 Basel
address: Switzerland
remarks: Role Account for general administrative issues
admin-c: FK3907-RIPE
admin-c: DM18522-RIPE
tech-c: NOVN2-RIPE
nic-hdl: NOVN1-RIPE
mnt-by: NOVARTIS-MNT
created: 2008-05-23T14:50:26Z
last-modified: 2021-09-15T20:59:27Z
source: RIPE # Filtered
role: Novartis AG Technical Contact
address: CH-4002 Basel
address: Switzerland
remarks: Role Account for technical issues
admin-c: NOVN1-RIPE
tech-c: FK3907-RIPE
tech-c: DM18522-RIPE
nic-hdl: NOVN2-RIPE
mnt-by: NOVARTIS-MNT
created: 2008-05-23T14:50:26Z
last-modified: 2021-09-15T20:59:05Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.61.158.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.61.158.123. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 08:33:07 CST 2026
;; MSG SIZE rcvd: 107
Host 123.158.61.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 123.158.61.160.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 71.6.146.185 | attackspam | Brute force attack stopped by firewall |
2019-07-05 09:02:55 |
| 27.66.254.146 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 22:36:28,093 INFO [amun_request_handler] PortScan Detected on Port: 445 (27.66.254.146) |
2019-07-05 08:51:33 |
| 89.38.145.78 | attack | 52869/tcp... [2019-07-04]5pkt,2pt.(tcp) |
2019-07-05 08:32:53 |
| 200.76.195.208 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-05 08:44:48 |
| 81.22.100.7 | attackspambots | firewall-block_invalid_GET_Request |
2019-07-05 09:04:24 |
| 185.53.88.17 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-05 08:48:19 |
| 59.124.203.186 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 22:52:02,790 INFO [amun_request_handler] PortScan Detected on Port: 25 (59.124.203.186) |
2019-07-05 08:21:00 |
| 31.170.49.27 | attackbots | SMTP-sasl brute force ... |
2019-07-05 08:50:16 |
| 5.59.133.122 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 22:46:08,555 INFO [amun_request_handler] PortScan Detected on Port: 445 (5.59.133.122) |
2019-07-05 08:25:32 |
| 104.248.55.99 | attackbots | Jul 5 02:12:11 OPSO sshd\[23066\]: Invalid user webxmore from 104.248.55.99 port 55450 Jul 5 02:12:11 OPSO sshd\[23066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.55.99 Jul 5 02:12:13 OPSO sshd\[23066\]: Failed password for invalid user webxmore from 104.248.55.99 port 55450 ssh2 Jul 5 02:14:12 OPSO sshd\[23210\]: Invalid user controller from 104.248.55.99 port 51472 Jul 5 02:14:12 OPSO sshd\[23210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.55.99 |
2019-07-05 08:19:16 |
| 95.0.88.68 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 22:37:01,630 INFO [amun_request_handler] PortScan Detected on Port: 445 (95.0.88.68) |
2019-07-05 08:49:59 |
| 104.222.32.86 | attackbotsspam | Chat Spam |
2019-07-05 08:46:07 |
| 185.53.88.122 | attack | $f2bV_matches |
2019-07-05 08:52:44 |
| 51.254.140.108 | attackbots | Jul 5 02:11:06 lnxweb62 sshd[26316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.140.108 |
2019-07-05 08:40:54 |
| 5.135.181.11 | attackspambots | Invalid user sf from 5.135.181.11 port 44756 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11 Failed password for invalid user sf from 5.135.181.11 port 44756 ssh2 Invalid user upload1234 from 5.135.181.11 port 41414 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11 |
2019-07-05 08:46:41 |