城市(city): Kuala Lumpur
省份(region): Kuala Lumpur
国家(country): Malaysia
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '195.86.248.0 - 195.86.255.255'
% Abuse contact for '195.86.248.0 - 195.86.255.255' is 'abuse@gtt.net'
inetnum: 195.86.248.0 - 195.86.255.255
descr: ZTNET Co., LTD
netname: ZTNET-CO-LTD
country: MY
admin-c: MW11929-RIPE
tech-c: MW11929-RIPE
status: SUB-ALLOCATED PA
mnt-by: AS3257-IPAM-MNT
created: 2025-08-21T10:00:01Z
last-modified: 2025-08-22T12:54:59Z
source: RIPE
person: May Wang
address: 19H Maxgrand Plaza, No.3, Tai Yau Street
address: San Po Kong
address: Hong Kong
phone: +8613013963377
nic-hdl: MW11929-RIPE
mnt-by: AS3257-IPAM-MNT
created: 2025-08-21T09:48:26Z
last-modified: 2025-08-21T09:49:10Z
source: RIPE # Filtered
% Information related to '195.86.248.0/21AS984'
route: 195.86.248.0/21
origin: AS984
mnt-by: AS3257-IPAM-MNT
created: 2025-08-21T10:23:14Z
last-modified: 2025-08-21T10:23:14Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.86.248.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.86.248.110. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 16:12:18 CST 2026
;; MSG SIZE rcvd: 107
b'110.248.86.195.in-addr.arpa domain name pointer 195-86-248-110.easynet.nl.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
110.248.86.195.in-addr.arpa name = 195-86-248-110.easynet.nl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 74.82.47.40 | attackbots | srv02 Mass scanning activity detected Target: 523 .. |
2020-09-11 13:22:40 |
| 54.36.165.34 | attack | Sep 10 21:21:40 game-panel sshd[17374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.165.34 Sep 10 21:21:42 game-panel sshd[17374]: Failed password for invalid user zhangzhenjin from 54.36.165.34 port 47482 ssh2 Sep 10 21:22:23 game-panel sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.165.34 |
2020-09-11 13:13:34 |
| 114.141.150.110 | attack | Automatic report - Banned IP Access |
2020-09-11 13:30:22 |
| 212.70.149.52 | attack | Sep 11 07:47:18 srv01 postfix/smtpd\[30332\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 07:47:20 srv01 postfix/smtpd\[3104\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 07:47:24 srv01 postfix/smtpd\[3225\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 07:47:26 srv01 postfix/smtpd\[3227\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 07:47:44 srv01 postfix/smtpd\[3227\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-11 13:48:50 |
| 144.34.172.241 | attack | Sep 10 18:57:53 buvik sshd[6111]: Invalid user minecraftserver from 144.34.172.241 Sep 10 18:57:53 buvik sshd[6111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.172.241 Sep 10 18:57:56 buvik sshd[6111]: Failed password for invalid user minecraftserver from 144.34.172.241 port 39292 ssh2 ... |
2020-09-11 13:32:49 |
| 201.140.110.78 | attackspam | Distributed brute force attack |
2020-09-11 13:24:45 |
| 60.248.249.190 | attack | (imapd) Failed IMAP login from 60.248.249.190 (TW/Taiwan/60-248-249-190.HINET-IP.hinet.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 11 02:01:40 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user= |
2020-09-11 13:31:09 |
| 202.61.129.225 | attackspambots | Invalid user support from 202.61.129.225 port 51730 |
2020-09-11 13:32:07 |
| 106.12.165.253 | attackbots | Sep 11 09:09:51 itv-usvr-02 sshd[7944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253 user=root Sep 11 09:11:26 itv-usvr-02 sshd[7983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253 user=root Sep 11 09:15:05 itv-usvr-02 sshd[8123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253 user=root |
2020-09-11 13:47:20 |
| 180.246.25.140 | attack | 20/9/10@16:10:14: FAIL: Alarm-Network address from=180.246.25.140 ... |
2020-09-11 13:37:15 |
| 35.196.75.48 | attackbotsspam | Sep 10 18:59:10 vps639187 sshd\[22180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.196.75.48 user=root Sep 10 18:59:12 vps639187 sshd\[22180\]: Failed password for root from 35.196.75.48 port 36130 ssh2 Sep 10 19:02:20 vps639187 sshd\[22280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.196.75.48 user=root ... |
2020-09-11 13:48:27 |
| 167.60.235.25 | attackspam | Sep 10 18:53:07 prod4 sshd\[5947\]: Failed password for root from 167.60.235.25 port 2048 ssh2 Sep 10 18:57:48 prod4 sshd\[7878\]: Invalid user object from 167.60.235.25 Sep 10 18:57:50 prod4 sshd\[7878\]: Failed password for invalid user object from 167.60.235.25 port 2049 ssh2 ... |
2020-09-11 13:36:15 |
| 91.228.8.168 | attack | Automatic report - XMLRPC Attack |
2020-09-11 13:11:47 |
| 86.100.13.247 | attackbots | Sep 10 18:56:42 dev sshd\[24559\]: Invalid user admin from 86.100.13.247 port 48036 Sep 10 18:56:42 dev sshd\[24559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.100.13.247 Sep 10 18:56:44 dev sshd\[24559\]: Failed password for invalid user admin from 86.100.13.247 port 48036 ssh2 |
2020-09-11 13:46:19 |
| 45.227.255.4 | attack | Sep 11 07:08:13 pve1 sshd[27407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.4 Sep 11 07:08:15 pve1 sshd[27407]: Failed password for invalid user user from 45.227.255.4 port 18573 ssh2 ... |
2020-09-11 13:09:22 |