城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '195.46.39.0 - 195.46.39.255'
% Abuse contact for '195.46.39.0 - 195.46.39.255' is 'abuse@safedns.com'
inetnum: 195.46.39.0 - 195.46.39.255
netname: SAFEDNS-ANYCAST-NET
country: DE
country: GB
country: NL
country: NZ
country: US
org: ORG-SI174-RIPE
sponsoring-org: ORG-ML847-RIPE
admin-c: SN6176-RIPE
tech-c: SN6176-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: RIPE-DB-MNT
mnt-by: SAFEDNS-MNT
mnt-routes: SAFEDNS-MNT
mnt-domains: SAFEDNS-MNT
created: 2012-03-08T10:19:05Z
last-modified: 2024-06-24T15:49:16Z
source: RIPE
organisation: ORG-SI174-RIPE
org-name: SafeDNS, Inc.
country: US
org-type: OTHER
address: 901 North Pitt Street, Suite 325
address: Alexandria, VA 22314
address: United States
abuse-c: SN6176-RIPE
mnt-ref: SAFEDNS-MNT
mnt-by: SAFEDNS-MNT
mnt-by: RIPE-DB-MNT
created: 2017-01-17T11:58:14Z
last-modified: 2024-06-21T09:56:32Z
source: RIPE # Filtered
role: SafeDNS NOC
address: 901 North Pitt Street, Suite 325
address: Alexandria, VA 22314
address: United States
abuse-mailbox: abuse@safedns.com
nic-hdl: SN6176-RIPE
mnt-by: SAFEDNS-MNT
mnt-by: RIPE-DB-MNT
created: 2017-01-17T11:53:09Z
last-modified: 2024-06-21T09:56:32Z
source: RIPE # Filtered
% Information related to '195.46.39.0/24AS57926'
route: 195.46.39.0/24
descr: SAFEDNS-ANYCAST
origin: AS57926
mnt-by: SAFEDNS-MNT
created: 2014-10-14T05:44:19Z
last-modified: 2017-04-03T10:51:38Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.46.39.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.46.39.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 10:54:14 CST 2026
;; MSG SIZE rcvd: 105
40.39.46.195.in-addr.arpa domain name pointer dns2.safedns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.39.46.195.in-addr.arpa name = dns2.safedns.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.234.190.206 | attackbotsspam | Unauthorized connection attempt detected from IP address 62.234.190.206 to port 2220 [J] |
2020-01-16 15:10:08 |
| 218.92.0.168 | attackspambots | Jan 16 07:00:42 marvibiene sshd[2821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Jan 16 07:00:44 marvibiene sshd[2821]: Failed password for root from 218.92.0.168 port 21466 ssh2 Jan 16 07:00:47 marvibiene sshd[2821]: Failed password for root from 218.92.0.168 port 21466 ssh2 Jan 16 07:00:42 marvibiene sshd[2821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Jan 16 07:00:44 marvibiene sshd[2821]: Failed password for root from 218.92.0.168 port 21466 ssh2 Jan 16 07:00:47 marvibiene sshd[2821]: Failed password for root from 218.92.0.168 port 21466 ssh2 ... |
2020-01-16 15:03:01 |
| 150.223.4.70 | attack | Jan 16 13:00:50 webhost01 sshd[719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.4.70 Jan 16 13:00:52 webhost01 sshd[719]: Failed password for invalid user lucene from 150.223.4.70 port 36232 ssh2 ... |
2020-01-16 15:06:36 |
| 201.218.49.197 | attack | Jan 16 05:47:30 srv-ubuntu-dev3 sshd[115440]: Invalid user deploy from 201.218.49.197 Jan 16 05:47:30 srv-ubuntu-dev3 sshd[115440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.218.49.197 Jan 16 05:47:30 srv-ubuntu-dev3 sshd[115440]: Invalid user deploy from 201.218.49.197 Jan 16 05:47:32 srv-ubuntu-dev3 sshd[115440]: Failed password for invalid user deploy from 201.218.49.197 port 44916 ssh2 Jan 16 05:50:34 srv-ubuntu-dev3 sshd[115696]: Invalid user ts3 from 201.218.49.197 Jan 16 05:50:34 srv-ubuntu-dev3 sshd[115696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.218.49.197 Jan 16 05:50:34 srv-ubuntu-dev3 sshd[115696]: Invalid user ts3 from 201.218.49.197 Jan 16 05:50:37 srv-ubuntu-dev3 sshd[115696]: Failed password for invalid user ts3 from 201.218.49.197 port 43276 ssh2 Jan 16 05:53:33 srv-ubuntu-dev3 sshd[115946]: Invalid user yuan from 201.218.49.197 ... |
2020-01-16 14:28:08 |
| 222.186.52.78 | attackspam | Jan 16 07:44:57 v22018053744266470 sshd[12762]: Failed password for root from 222.186.52.78 port 36374 ssh2 Jan 16 07:45:45 v22018053744266470 sshd[12817]: Failed password for root from 222.186.52.78 port 18088 ssh2 ... |
2020-01-16 14:56:05 |
| 182.52.30.22 | attackbots | Multiple SSH login attempts. |
2020-01-16 15:04:16 |
| 196.30.31.58 | attack | Unauthorized connection attempt detected from IP address 196.30.31.58 to port 2220 [J] |
2020-01-16 15:01:21 |
| 184.168.46.162 | attack | Automatic report - XMLRPC Attack |
2020-01-16 14:25:28 |
| 152.32.251.49 | attack | Jan 16 07:17:58 vpn01 sshd[31913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.251.49 Jan 16 07:18:00 vpn01 sshd[31913]: Failed password for invalid user superman from 152.32.251.49 port 56512 ssh2 ... |
2020-01-16 14:26:01 |
| 111.59.93.76 | attackbotsspam | Brute-force attempt banned |
2020-01-16 15:10:49 |
| 95.28.246.196 | attackspambots | 1579150412 - 01/16/2020 05:53:32 Host: 95.28.246.196/95.28.246.196 Port: 445 TCP Blocked |
2020-01-16 14:28:32 |
| 146.185.206.25 | attack | B: zzZZzz blocked content access |
2020-01-16 15:05:52 |
| 45.132.184.65 | attack | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage=" |
2020-01-16 14:51:37 |
| 152.32.185.30 | attack | Unauthorized connection attempt detected from IP address 152.32.185.30 to port 2220 [J] |
2020-01-16 15:05:25 |
| 107.179.19.68 | attack | WordPress wp-login brute force :: 107.179.19.68 0.144 BYPASS [16/Jan/2020:06:09:31 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-01-16 14:26:27 |