城市(city): Miami
省份(region): Florida
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '193.26.115.0 - 193.26.115.255'
% Abuse contact for '193.26.115.0 - 193.26.115.255' is 'abuse@as210558.net'
inetnum: 193.26.115.0 - 193.26.115.255
netname: LEET-193-26-115-0
country: US
geofeed: https://rdp.sh/geofeed
org: ORG-SG402-RIPE
admin-c: SGAH4-RIPE
tech-c: SGAH4-RIPE
status: ASSIGNED PA
mnt-by: PREFIXBROKER-MNT
created: 2022-03-09T16:21:30Z
last-modified: 2025-04-16T07:35:07Z
source: RIPE
organisation: ORG-SG402-RIPE
org-name: 1337 Services GmbH
org-type: OTHER
address: Ludwig-Erhard-Str. 18
address: DE-20459 Hamburg
address: Germany
abuse-c: SGAH4-RIPE
mnt-ref: PREFIXBROKER-MNT
mnt-by: PREFIXBROKER-MNT
created: 2022-03-09T16:21:14Z
last-modified: 2022-03-09T16:21:14Z
source: RIPE # Filtered
role: 1337 Services GmbH abuse handling
address: Ludwig-Erhard-Str. 18
address: DE-20459 Hamburg
address: Germany
nic-hdl: SGAH4-RIPE
mnt-by: PREFIXBROKER-MNT
created: 2022-03-09T16:21:14Z
last-modified: 2022-03-09T16:21:14Z
source: RIPE # Filtered
abuse-mailbox: abuse@as210558.net
% Information related to '193.26.115.0/24AS210558'
route: 193.26.115.0/24
origin: AS210558
mnt-by: PREFIXBROKER-MNT
created: 2025-04-24T17:26:12Z
last-modified: 2025-04-24T17:26:12Z
source: RIPE
% Information related to '193.26.115.0/24AS23470'
route: 193.26.115.0/24
origin: AS23470
mnt-by: PREFIXBROKER-MNT
created: 2022-04-01T12:34:41Z
last-modified: 2022-04-01T12:34:41Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.26.115.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.26.115.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031302 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 14 07:00:20 CST 2026
;; MSG SIZE rcvd: 106
13.115.26.193.in-addr.arpa domain name pointer 193.26.115.13.powered.by.rdp.sh.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.115.26.193.in-addr.arpa name = 193.26.115.13.powered.by.rdp.sh.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 172.113.183.83 | attack | Sep 15 01:06:20 www sshd\[58248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.113.183.83 user=root Sep 15 01:06:22 www sshd\[58248\]: Failed password for root from 172.113.183.83 port 49914 ssh2 Sep 15 01:10:25 www sshd\[58701\]: Invalid user valerie from 172.113.183.83 ... |
2020-09-15 06:16:39 |
| 138.68.75.113 | attack | Sep 14 21:25:01 vps647732 sshd[11990]: Failed password for root from 138.68.75.113 port 36970 ssh2 ... |
2020-09-15 06:02:09 |
| 83.48.29.116 | attackspam | 2020-09-14T20:51:11.002872upcloud.m0sh1x2.com sshd[3839]: Invalid user android from 83.48.29.116 port 11560 |
2020-09-15 06:33:03 |
| 51.15.209.81 | attackspambots | 2020-09-14T19:42:26.670477upcloud.m0sh1x2.com sshd[3302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.209.81 user=root 2020-09-14T19:42:28.934507upcloud.m0sh1x2.com sshd[3302]: Failed password for root from 51.15.209.81 port 45044 ssh2 |
2020-09-15 06:12:16 |
| 51.38.50.99 | attack | Fail2Ban Ban Triggered |
2020-09-15 06:08:19 |
| 84.92.92.196 | attackspambots | Sep 14 22:04:05 h2829583 sshd[10231]: Failed password for root from 84.92.92.196 port 50052 ssh2 |
2020-09-15 06:15:03 |
| 51.91.56.33 | attackspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-09-15 06:35:26 |
| 207.46.13.249 | attack | arw-Joomla User : try to access forms... |
2020-09-15 06:36:01 |
| 188.217.181.18 | attack | Sep 14 19:55:42 scw-tender-jepsen sshd[4579]: Failed password for root from 188.217.181.18 port 40604 ssh2 Sep 14 20:01:46 scw-tender-jepsen sshd[4752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.217.181.18 |
2020-09-15 06:14:20 |
| 41.66.227.149 | attack | Sep 14 16:03:32 XXX sshd[29442]: Invalid user avanthi from 41.66.227.149 port 16802 |
2020-09-15 06:01:30 |
| 171.25.193.78 | attackspam | 2020-09-14T23:49[Censored Hostname] sshd[21869]: Failed password for root from 171.25.193.78 port 23235 ssh2 2020-09-14T23:49[Censored Hostname] sshd[21869]: Failed password for root from 171.25.193.78 port 23235 ssh2 2020-09-14T23:50[Censored Hostname] sshd[21869]: Failed password for root from 171.25.193.78 port 23235 ssh2[...] |
2020-09-15 06:31:53 |
| 4.17.231.196 | attackspambots | SSH Invalid Login |
2020-09-15 06:04:49 |
| 167.250.49.216 | attack | 2020-09-15T02:38:29.783385hostname sshd[82940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.250.49.216 user=root 2020-09-15T02:38:31.179543hostname sshd[82940]: Failed password for root from 167.250.49.216 port 44858 ssh2 ... |
2020-09-15 06:33:58 |
| 51.77.200.139 | attackbotsspam | Sep 14 21:19:20 PorscheCustomer sshd[12712]: Failed password for root from 51.77.200.139 port 41122 ssh2 Sep 14 21:23:11 PorscheCustomer sshd[12939]: Failed password for root from 51.77.200.139 port 54402 ssh2 ... |
2020-09-15 06:38:08 |
| 2a01:4f8:190:94b6::2 | attack | Excessive crawling : exceed crawl-delay defined in robots.txt |
2020-09-15 06:25:04 |