城市(city): unknown
省份(region): unknown
国家(country): Poland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.23.222.0 - 212.23.222.255'
% Abuse contact for '212.23.222.0 - 212.23.222.255' is 'abuse@mevspace.com'
inetnum: 212.23.222.0 - 212.23.222.255
netname: PL-MEV-20211105
remarks:
remarks: --------------------------------------------------------------
remarks: For DMCA or abuse reports, please use our online form:
remarks: https://mevspace.com/abuse-report
remarks:
remarks: Or contact us via email at: abuse@mevspace.com
remarks:
remarks: Reports submitted through other channels may not be
remarks: processed or acknowledged.
remarks: --------------------------------------------------------------
remarks:
org: ORG-MSZO78-RIPE
country: PL
abuse-c: AR49979-RIPE
admin-c: mevs2-ripe
tech-c: mevs2-ripe
status: ALLOCATED PA
mnt-by: SKYTECH-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2024-01-02T13:51:41Z
last-modified: 2025-05-13T13:04:40Z
source: RIPE
organisation: ORG-MSZO78-RIPE
org-name: MEVSPACE sp. z o.o.
country: PL
org-type: LIR
address: Augustyna Locciego 33
address: 02-928
address: Warszawa
address: POLAND
phone: +48221004144
admin-c: mevs2-ripe
tech-c: mevs2-ripe
abuse-c: AR49979-RIPE
mnt-ref: SKYTECH-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SKYTECH-MNT
created: 2018-12-20T08:55:28Z
last-modified: 2023-01-16T12:16:04Z
source: RIPE # Filtered
role: Mevspace Admins
address: MEVSPACE Sp. z o.o.
address: Augustyna Locciego 33
address: 02-928 Warszawa
admin-c: AO3529-RIPE
admin-c: SO4268-RIPE
admin-c: DP17971-RIPE
admin-c: HK7240-RIPE
admin-c: PK10813-RIPE
admin-c: MW12122-RIPE
tech-c: AO3529-RIPE
tech-c: SO4268-RIPE
tech-c: DP17971-RIPE
tech-c: HK7240-RIPE
tech-c: PK10813-RIPE
tech-c: MW12122-RIPE
nic-hdl: mevs2-ripe
mnt-by: SKYTECH-MNT
created: 2022-12-07T13:04:36Z
last-modified: 2026-02-27T12:18:14Z
source: RIPE # Filtered
% Information related to '212.23.222.0/24as201814'
route: 212.23.222.0/24
origin: as201814
mnt-by: SKYTECH-MNT
created: 2022-01-25T15:54:16Z
last-modified: 2022-01-25T15:54:16Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.23.222.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.23.222.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 04:30:06 CST 2026
;; MSG SIZE rcvd: 106
Host 58.222.23.212.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 58.222.23.212.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 148.235.57.183 | attackbotsspam | 2020-06-14T07:49:38.727001server.mjenks.net sshd[759669]: Failed password for root from 148.235.57.183 port 56967 ssh2 2020-06-14T07:52:03.749468server.mjenks.net sshd[759989]: Invalid user endian from 148.235.57.183 port 44890 2020-06-14T07:52:03.756707server.mjenks.net sshd[759989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.183 2020-06-14T07:52:03.749468server.mjenks.net sshd[759989]: Invalid user endian from 148.235.57.183 port 44890 2020-06-14T07:52:05.582598server.mjenks.net sshd[759989]: Failed password for invalid user endian from 148.235.57.183 port 44890 ssh2 ... |
2020-06-15 03:08:12 |
| 45.14.233.151 | attackspambots | Jun 14 20:04:26 gestao sshd[21510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.233.151 Jun 14 20:04:28 gestao sshd[21510]: Failed password for invalid user daniel from 45.14.233.151 port 34252 ssh2 Jun 14 20:06:01 gestao sshd[21564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.233.151 ... |
2020-06-15 03:18:41 |
| 91.134.167.236 | attackbotsspam | Jun 14 20:42:17 ns382633 sshd\[24681\]: Invalid user relay from 91.134.167.236 port 49040 Jun 14 20:42:17 ns382633 sshd\[24681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.167.236 Jun 14 20:42:18 ns382633 sshd\[24681\]: Failed password for invalid user relay from 91.134.167.236 port 49040 ssh2 Jun 14 20:52:16 ns382633 sshd\[26856\]: Invalid user testwww from 91.134.167.236 port 58315 Jun 14 20:52:16 ns382633 sshd\[26856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.167.236 |
2020-06-15 03:17:32 |
| 190.221.151.226 | attackspambots | Unauthorized connection attempt from IP address 190.221.151.226 on Port 445(SMB) |
2020-06-15 02:51:50 |
| 1.60.228.35 | attackspambots | Automatic report - Port Scan Attack |
2020-06-15 03:19:09 |
| 123.231.244.133 | attackspambots | Unauthorized connection attempt from IP address 123.231.244.133 on Port 445(SMB) |
2020-06-15 02:47:58 |
| 103.16.202.174 | attackbots | k+ssh-bruteforce |
2020-06-15 03:00:12 |
| 188.19.47.193 | attackbots | Unauthorized connection attempt from IP address 188.19.47.193 on Port 445(SMB) |
2020-06-15 02:42:34 |
| 188.166.246.46 | attack | SSH login attempts. |
2020-06-15 02:41:24 |
| 201.48.206.146 | attackbotsspam | $f2bV_matches |
2020-06-15 02:38:56 |
| 49.233.205.82 | attack | Jun 14 17:57:53 ns382633 sshd\[24714\]: Invalid user test from 49.233.205.82 port 55806 Jun 14 17:57:53 ns382633 sshd\[24714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.205.82 Jun 14 17:57:55 ns382633 sshd\[24714\]: Failed password for invalid user test from 49.233.205.82 port 55806 ssh2 Jun 14 18:02:17 ns382633 sshd\[25705\]: Invalid user francisca from 49.233.205.82 port 38978 Jun 14 18:02:17 ns382633 sshd\[25705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.205.82 |
2020-06-15 03:11:54 |
| 128.199.211.68 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-15 02:57:15 |
| 96.114.64.128 | attackbotsspam | DATE:2020-06-14 14:45:06, IP:96.114.64.128, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq) |
2020-06-15 02:52:38 |
| 123.207.142.31 | attack | Jun 14 21:40:31 root sshd[2206]: Invalid user aip from 123.207.142.31 ... |
2020-06-15 03:15:43 |
| 120.92.11.9 | attackspam | 2020-06-14 10:02:28.198308-0500 localhost sshd[49818]: Failed password for invalid user admin from 120.92.11.9 port 34562 ssh2 |
2020-06-15 03:14:19 |