城市(city): unknown
省份(region): unknown
国家(country): Portugal
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '185.180.141.0 - 185.180.141.255'
% Abuse contact for '185.180.141.0 - 185.180.141.255' is 'optout@internet-census.org'
inetnum: 185.180.141.0 - 185.180.141.255
netname: ICG-1-ZEN-DFW
descr: ICG-1-ZEN-DFW
country: US
admin-c: AR59913-RIPE
abuse-c: AR59913-RIPE
tech-c: AR59913-RIPE
status: ASSIGNED PA
mnt-by: MNT-BST
created: 2024-08-27T14:01:10Z
last-modified: 2025-09-23T12:37:43Z
source: RIPE
remarks: https://internet-census.org
remarks: Internet Census Group seeks to measure the global Internet with non-intrusive data collection techniques in order to analyze trends and benchmark security performance across a broad range of industries
remarks: We are committed to upholding the security and privacy of the entire online community. As part of that mission, we maintain a list of entities that have contacted us and wish to prevent us from attempting to access their addresses or ports
remarks: To have your IP address added to this list, provide us with the IP addresses you wish to remove via email to: optout@internet-census.org
remarks: Please continue to update us if your IP addresses or networks change so we can continue to keep you opted out. You will receive a confirmation email when completed
role: Abuse-C Role
address: Operations for Internet Census Group
address: https://internet-census.org
nic-hdl: AR59913-RIPE
abuse-mailbox: optout@internet-census.org
mnt-by: MNT-BST
created: 2020-02-21T08:44:10Z
last-modified: 2021-03-12T21:58:21Z
source: RIPE # Filtered
% Information related to '185.180.141.0/24AS21859'
route: 185.180.141.0/24
origin: AS21859
mnt-by: MNT-BST
created: 2024-10-15T22:55:50Z
last-modified: 2024-10-15T22:55:50Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.180.141.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.180.141.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 10:00:51 CST 2026
;; MSG SIZE rcvd: 107
38.141.180.185.in-addr.arpa domain name pointer zl-dala-us-gp1-wk123b.internet-census.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.141.180.185.in-addr.arpa name = zl-dala-us-gp1-wk123b.internet-census.org.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 172.81.250.106 | attackspambots | Dec 30 01:43:32 server sshd\[7464\]: Invalid user devarea from 172.81.250.106 Dec 30 01:43:32 server sshd\[7464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.106 Dec 30 01:43:35 server sshd\[7464\]: Failed password for invalid user devarea from 172.81.250.106 port 47628 ssh2 Dec 30 02:02:10 server sshd\[12077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.106 user=root Dec 30 02:02:12 server sshd\[12077\]: Failed password for root from 172.81.250.106 port 35400 ssh2 ... |
2019-12-30 08:48:25 |
| 183.80.251.117 | attack | Unauthorized connection attempt detected from IP address 183.80.251.117 to port 23 |
2019-12-30 09:03:10 |
| 139.199.127.60 | attackspam | Dec 30 01:01:27 MK-Soft-Root1 sshd[19077]: Failed password for root from 139.199.127.60 port 43310 ssh2 ... |
2019-12-30 08:52:34 |
| 123.25.70.12 | attack | Unauthorized connection attempt detected from IP address 123.25.70.12 to port 445 |
2019-12-30 09:07:17 |
| 1.55.174.140 | attack | Unauthorized connection attempt detected from IP address 1.55.174.140 to port 23 |
2019-12-30 09:20:58 |
| 220.194.64.148 | attack | Unauthorized connection attempt detected from IP address 220.194.64.148 to port 2323 |
2019-12-30 09:22:14 |
| 59.145.221.103 | attackspambots | Dec 29 19:46:02 plusreed sshd[24770]: Invalid user shufro from 59.145.221.103 ... |
2019-12-30 09:16:16 |
| 154.117.154.62 | attack | Unauthorized connection attempt detected from IP address 154.117.154.62 to port 23 |
2019-12-30 09:06:06 |
| 111.2.95.191 | attack | Unauthorized connection attempt detected from IP address 111.2.95.191 to port 23 |
2019-12-30 09:12:16 |
| 180.218.122.48 | attackspambots | Unauthorized connection attempt detected from IP address 180.218.122.48 to port 81 |
2019-12-30 09:04:58 |
| 112.49.235.93 | attack | Unauthorized connection attempt detected from IP address 112.49.235.93 to port 23 |
2019-12-30 09:11:29 |
| 138.197.89.186 | attackspam | Dec 30 00:16:20 localhost sshd\[66199\]: Invalid user server from 138.197.89.186 port 43816 Dec 30 00:16:20 localhost sshd\[66199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.186 Dec 30 00:16:22 localhost sshd\[66199\]: Failed password for invalid user server from 138.197.89.186 port 43816 ssh2 Dec 30 00:18:41 localhost sshd\[66269\]: Invalid user yoyo from 138.197.89.186 port 40136 Dec 30 00:18:41 localhost sshd\[66269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.186 ... |
2019-12-30 08:48:37 |
| 123.31.47.20 | attackbotsspam | Dec 29 01:57:28 XXX sshd[8706]: Invalid user demo from 123.31.47.20 port 60945 |
2019-12-30 09:01:07 |
| 103.82.116.20 | attack | 2019-12-30T01:48:30.797078vps751288.ovh.net sshd\[27744\]: Invalid user chinwang from 103.82.116.20 port 50042 2019-12-30T01:48:30.806671vps751288.ovh.net sshd\[27744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.116.20 2019-12-30T01:48:32.178375vps751288.ovh.net sshd\[27744\]: Failed password for invalid user chinwang from 103.82.116.20 port 50042 ssh2 2019-12-30T01:51:41.624466vps751288.ovh.net sshd\[27756\]: Invalid user combee from 103.82.116.20 port 51044 2019-12-30T01:51:41.636226vps751288.ovh.net sshd\[27756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.116.20 |
2019-12-30 09:01:26 |
| 101.51.201.41 | attackspambots | Unauthorized connection attempt detected from IP address 101.51.201.41 to port 23 |
2019-12-30 09:13:10 |