城市(city): Amsterdam
省份(region): Noord Holland
国家(country): The Netherlands
运营商(isp): Vodafone
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '178.84.0.0 - 178.84.255.255'
% Abuse contact for '178.84.0.0 - 178.84.255.255' is 'abuse@ziggo.nl'
inetnum: 178.84.0.0 - 178.84.255.255
netname: ZIGGO-NL-NET
descr: Ziggo Services residential CPE Customers NL
country: NL
admin-c: LGI-RIPE
admin-c: LGI-RIPE
tech-c: LGI-RIPE
status: ASSIGNED PA
remarks: Contact abuse@ziggo.nl concerning criminal
remarks: activities like spam, hacks, portscans
mnt-by: ZIGGO-SERVICES-MNT
created: 2010-09-16T13:47:40Z
last-modified: 2025-10-22T08:51:00Z
source: RIPE # Filtered
role: Liberty Global RIPE DBM
address: Liberty Global B.V.
address: Boeing Avenue 53
address: 1119PE Schiphol-Rijk
address: Netherlands
phone: +31 20 778 9840
fax-no: +31 20 7788203
admin-c: LRM47-RIPE
tech-c: LRM47-RIPE
nic-hdl: LGI-RIPE
mnt-by: MNT-LGI
created: 2012-07-03T07:33:27Z
last-modified: 2025-02-06T12:50:33Z
source: RIPE # Filtered
% Information related to '178.84.0.0/16AS33915'
route: 178.84.0.0/16
descr: VODAFONE_ZIGGO
origin: AS33915
mnt-by: AS6830-MNT
mnt-by: TNF-MNT
mnt-by: ZIGGO-RTRMGMT
created: 2020-10-16T16:01:12Z
last-modified: 2025-10-20T12:59:35Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.84.29.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;178.84.29.83. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 20:18:32 CST 2026
;; MSG SIZE rcvd: 105
83.29.84.178.in-addr.arpa domain name pointer 178-84-29-83.dynamic.upc.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
83.29.84.178.in-addr.arpa name = 178-84-29-83.dynamic.upc.nl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.199.96.55 | attackspambots | Failed password for invalid user law from 128.199.96.55 port 7652 ssh2 |
2020-06-10 00:18:05 |
| 108.241.247.201 | attackbots | 'Fail2Ban' |
2020-06-09 23:49:54 |
| 179.106.84.28 | attackbotsspam | failed_logins |
2020-06-09 23:52:27 |
| 122.224.237.234 | attackbots | 2020-06-09T05:05:07.153723-07:00 suse-nuc sshd[18684]: Invalid user web from 122.224.237.234 port 44951 ... |
2020-06-10 00:27:51 |
| 14.127.81.0 | attack | Jun 9 14:30:44 localhost sshd\[7394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.127.81.0 user=root Jun 9 14:30:45 localhost sshd\[7394\]: Failed password for root from 14.127.81.0 port 36165 ssh2 Jun 9 14:37:13 localhost sshd\[7773\]: Invalid user codserver from 14.127.81.0 Jun 9 14:37:13 localhost sshd\[7773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.127.81.0 Jun 9 14:37:15 localhost sshd\[7773\]: Failed password for invalid user codserver from 14.127.81.0 port 34912 ssh2 ... |
2020-06-10 00:19:46 |
| 93.139.27.28 | attack | [09/Jun/2020 x@x [09/Jun/2020 x@x [09/Jun/2020 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.139.27.28 |
2020-06-09 23:57:58 |
| 192.95.6.110 | attackbots | Jun 9 17:58:54 ArkNodeAT sshd\[11977\]: Invalid user jd from 192.95.6.110 Jun 9 17:58:54 ArkNodeAT sshd\[11977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.95.6.110 Jun 9 17:58:57 ArkNodeAT sshd\[11977\]: Failed password for invalid user jd from 192.95.6.110 port 58765 ssh2 |
2020-06-10 00:16:21 |
| 93.174.1.215 | attackspambots | Jun 9 14:13:59 124388 sshd[16832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.174.1.215 Jun 9 14:13:59 124388 sshd[16832]: Invalid user a4abroad from 93.174.1.215 port 21649 Jun 9 14:14:01 124388 sshd[16832]: Failed password for invalid user a4abroad from 93.174.1.215 port 21649 ssh2 Jun 9 14:16:37 124388 sshd[16839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.174.1.215 user=root Jun 9 14:16:39 124388 sshd[16839]: Failed password for root from 93.174.1.215 port 52425 ssh2 |
2020-06-10 00:22:58 |
| 83.233.100.211 | attackspambots | Brute-force attempt banned |
2020-06-10 00:28:24 |
| 114.67.66.26 | attack | bruteforce detected |
2020-06-10 00:01:28 |
| 201.184.68.58 | attackbotsspam | Jun 9 17:02:44 ajax sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.68.58 Jun 9 17:02:46 ajax sshd[14685]: Failed password for invalid user admin from 201.184.68.58 port 38042 ssh2 |
2020-06-10 00:20:03 |
| 121.254.111.63 | attackspambots | Brute-force attempt banned |
2020-06-10 00:07:18 |
| 54.39.96.155 | attackspambots | Jun 9 16:15:39 scw-6657dc sshd[17151]: Failed password for root from 54.39.96.155 port 32906 ssh2 Jun 9 16:15:39 scw-6657dc sshd[17151]: Failed password for root from 54.39.96.155 port 32906 ssh2 Jun 9 16:19:04 scw-6657dc sshd[17305]: Invalid user rs from 54.39.96.155 port 33905 ... |
2020-06-10 00:28:54 |
| 41.67.138.6 | attackbots | RCPT=EAVAIL |
2020-06-10 00:24:40 |
| 74.219.184.26 | attackbotsspam | 2020/06/09 14:52:00 [error] 4061#0: *4560 An error occurred in mail zmauth: user not found:berrington_alma@*fathog.com while SSL handshaking to lookup handler, client: 74.219.184.26:32677, server: 45.79.145.195:993, login: "berrington_alma@*fathog.com" |
2020-06-10 00:26:32 |