城市(city): Tokyo
省份(region): Tokyo
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.135.214.0 - 212.135.214.255'
% Abuse contact for '212.135.214.0 - 212.135.214.255' is 'abuse@gtt.net'
inetnum: 212.135.214.0 - 212.135.214.255
netname: CYBERVERSE_JP
descr: CYBERVERSE_JP
country: JP
geofeed: https://cyberverse-assets.s3.ap-northeast-1.amazonaws.com/geofeed.csv
admin-c: CL10672-RIPE
tech-c: CL10672-RIPE
status: SUB-ALLOCATED PA
remarks:
mnt-by: CYBERVERSE-MNT
created: 2026-01-02T06:27:11Z
last-modified: 2026-01-02T06:27:11Z
source: RIPE
role: CYBERVERSE LLC
address: 16192 Coastal Hwy
address: 19958
address: Lewes
address: US
nic-hdl: CL10672-RIPE
remarks: End User Organization
abuse-mailbox: report@abuseradar.com
mnt-by: netutils-mnt
created: 2025-10-01T12:26:09Z
last-modified: 2025-10-01T12:26:09Z
source: RIPE # Filtered
% Information related to '212.135.208.0/21AS216211'
route: 212.135.208.0/21
origin: AS216211
mnt-by: AS3257-IPAM-MNT
created: 2025-09-03T12:24:22Z
last-modified: 2025-09-03T12:24:22Z
source: RIPE
% Information related to '212.135.208.0/21AS216245'
route: 212.135.208.0/21
origin: AS216245
created: 2026-02-25T10:49:49Z
last-modified: 2026-02-25T10:49:49Z
source: RIPE
mnt-by: AS3257-IPAM-MNT
% Information related to '212.135.208.0/21AS3257'
route: 212.135.208.0/21
origin: AS3257
mnt-by: AS3257-IPAM-MNT
created: 2025-09-05T14:52:05Z
last-modified: 2025-09-05T14:52:05Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.135.214.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.135.214.5. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 15:10:30 CST 2026
;; MSG SIZE rcvd: 106
5.214.135.212.in-addr.arpa domain name pointer dsl-212-135-214-5.dsl.easynet.co.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.214.135.212.in-addr.arpa name = dsl-212-135-214-5.dsl.easynet.co.uk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 50.244.37.249 | attackbotsspam | Brute force acceess on sshd |
2020-03-27 03:24:51 |
| 14.186.179.69 | attackbots | Mar 26 13:03:44 tux sshd[20448]: Address 14.186.179.69 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 26 13:03:44 tux sshd[20448]: Invalid user admin from 14.186.179.69 Mar 26 13:03:44 tux sshd[20448]: Connection closed by 14.186.179.69 [preauth] Mar 26 13:03:51 tux sshd[20450]: Address 14.186.179.69 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 26 13:03:51 tux sshd[20450]: Invalid user admin from 14.186.179.69 Mar 26 13:03:51 tux sshd[20450]: Connection closed by 14.186.179.69 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.186.179.69 |
2020-03-27 03:37:51 |
| 31.19.202.158 | attackspam | Invalid user airflow from 31.19.202.158 port 58264 |
2020-03-27 03:10:55 |
| 36.68.74.159 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-27 03:37:13 |
| 103.245.72.15 | attack | Mar 26 12:07:15 ws22vmsma01 sshd[75306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.72.15 Mar 26 12:07:17 ws22vmsma01 sshd[75306]: Failed password for invalid user cacti from 103.245.72.15 port 60170 ssh2 ... |
2020-03-27 03:21:42 |
| 96.114.71.147 | attackbots | $f2bV_matches |
2020-03-27 03:20:29 |
| 138.255.110.240 | attack | Automatic report - Port Scan Attack |
2020-03-27 03:07:44 |
| 118.126.128.5 | attackspam | Mar 26 17:47:21 ns3042688 sshd\[1838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.128.5 user=root Mar 26 17:47:22 ns3042688 sshd\[1838\]: Failed password for root from 118.126.128.5 port 57298 ssh2 Mar 26 17:50:47 ns3042688 sshd\[2071\]: Invalid user admin from 118.126.128.5 Mar 26 17:50:47 ns3042688 sshd\[2071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.128.5 Mar 26 17:50:49 ns3042688 sshd\[2071\]: Failed password for invalid user admin from 118.126.128.5 port 43478 ssh2 ... |
2020-03-27 03:40:39 |
| 63.131.189.127 | attackspambots | Brute forcing email accounts |
2020-03-27 03:45:13 |
| 92.118.161.49 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-03-27 03:36:22 |
| 146.164.28.2 | attackspambots | Mar 26 20:57:48 site2 sshd\[26198\]: Invalid user hisano from 146.164.28.2Mar 26 20:57:51 site2 sshd\[26198\]: Failed password for invalid user hisano from 146.164.28.2 port 40618 ssh2Mar 26 21:01:11 site2 sshd\[26282\]: Invalid user tzo from 146.164.28.2Mar 26 21:01:12 site2 sshd\[26282\]: Failed password for invalid user tzo from 146.164.28.2 port 39930 ssh2Mar 26 21:04:40 site2 sshd\[26341\]: Invalid user eb from 146.164.28.2 ... |
2020-03-27 03:32:23 |
| 14.116.208.72 | attackbots | Brute force acceess on sshd |
2020-03-27 03:05:45 |
| 180.253.241.111 | attackspambots | 1585225283 - 03/26/2020 13:21:23 Host: 180.253.241.111/180.253.241.111 Port: 445 TCP Blocked |
2020-03-27 03:31:50 |
| 51.38.224.84 | attackspam | 5x Failed Password |
2020-03-27 03:31:04 |
| 92.118.37.86 | attack | 03/26/2020-15:11:01.748257 92.118.37.86 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-27 03:29:03 |