城市(city): Conflans-Sainte-Honorine
省份(region): Île-de-France
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '212.73.216.0 - 212.73.217.255'
% Abuse contact for '212.73.216.0 - 212.73.217.255' is 'abuse@level3.com'
inetnum: 212.73.216.0 - 212.73.217.255
netname: GIP-PACRRET
descr: BBBM13381
country: fr
admin-c: DL3509-RIPE
tech-c: LTHM
status: ASSIGNED PA
remarks: all abuse reports to abuse@level3.com
mnt-by: LEVEL3-MNT
mnt-lower: LEVEL3-MNT
created: 2007-12-28T10:26:50Z
last-modified: 2007-12-28T10:26:50Z
source: RIPE
role: LEVEL3 Hostmaster
address: Level (3) Communications
address: 260-266 GOSWELL ROAD
address: LONDON
remarks: trouble: Abuse reports to abuse@centurylinkservices.net
admin-c: STUD1-RIPE
admin-c: NZ74-RIPE
tech-c: LTEE
nic-hdl: LTHM
remarks: Peering issues to peering@centurylink.com
mnt-by: LEVEL3-MNT
created: 2002-07-09T10:25:27Z
last-modified: 2020-07-27T09:06:54Z
source: RIPE # Filtered
person: Didier Lefebvre
address: GIP PACRRET
address: Avenue Bernard Hirsh
address: Cergy Pontoise, 95021
address: France
phone: +33 (0) 1 34 43 33 26
nic-hdl: DL3509-RIPE
mnt-by: LEVEL3-MNT
created: 2007-12-28T10:07:05Z
last-modified: 2007-12-28T10:07:05Z
source: RIPE # Filtered
% Information related to '212.73.192.0/18AS9057'
route: 212.73.192.0/18
descr: Level 3 RIPE block
origin: AS9057
remarks: Abuse reports to abuse@level3.com
remarks: Peering contact is peering@Level3.net
mnt-by: LEVEL3-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2021-10-14T08:25:22Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.73.217.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.73.217.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 17:00:57 CST 2026
;; MSG SIZE rcvd: 106
b'Host 80.217.73.212.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 212.73.217.80.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.254.129.128 | attackspambots | Dec 21 20:05:18 nextcloud sshd\[5804\]: Invalid user navy from 51.254.129.128 Dec 21 20:05:18 nextcloud sshd\[5804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128 Dec 21 20:05:20 nextcloud sshd\[5804\]: Failed password for invalid user navy from 51.254.129.128 port 52004 ssh2 ... |
2019-12-22 03:52:01 |
| 66.70.189.236 | attack | Dec 21 12:57:37 linuxvps sshd\[65349\]: Invalid user server from 66.70.189.236 Dec 21 12:57:37 linuxvps sshd\[65349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236 Dec 21 12:57:38 linuxvps sshd\[65349\]: Failed password for invalid user server from 66.70.189.236 port 33110 ssh2 Dec 21 13:02:36 linuxvps sshd\[3586\]: Invalid user lisa from 66.70.189.236 Dec 21 13:02:36 linuxvps sshd\[3586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236 |
2019-12-22 03:49:37 |
| 201.182.223.59 | attackspam | Dec 21 14:46:23 TORMINT sshd\[15928\]: Invalid user fahrland from 201.182.223.59 Dec 21 14:46:23 TORMINT sshd\[15928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.223.59 Dec 21 14:46:25 TORMINT sshd\[15928\]: Failed password for invalid user fahrland from 201.182.223.59 port 41038 ssh2 ... |
2019-12-22 03:58:18 |
| 104.168.250.71 | attack | Dec 21 18:01:14 ns381471 sshd[10121]: Failed password for root from 104.168.250.71 port 59002 ssh2 Dec 21 18:07:29 ns381471 sshd[10296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.250.71 |
2019-12-22 04:06:10 |
| 41.203.156.254 | attackspam | Dec 21 20:48:16 v22018076622670303 sshd\[15700\]: Invalid user mouttham from 41.203.156.254 port 32972 Dec 21 20:48:16 v22018076622670303 sshd\[15700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.156.254 Dec 21 20:48:18 v22018076622670303 sshd\[15700\]: Failed password for invalid user mouttham from 41.203.156.254 port 32972 ssh2 ... |
2019-12-22 04:04:08 |
| 116.86.166.93 | attackbotsspam | "Fail2Ban detected SSH brute force attempt" |
2019-12-22 03:46:23 |
| 79.137.33.20 | attackspam | $f2bV_matches |
2019-12-22 03:29:00 |
| 206.189.35.254 | attackbots | Dec 21 17:50:44 hosting sshd[21617]: Invalid user amadeo from 206.189.35.254 port 59532 ... |
2019-12-22 03:57:22 |
| 202.179.103.114 | attack | Dec 21 20:53:02 cp sshd[13725]: Failed password for mysql from 202.179.103.114 port 47164 ssh2 Dec 21 20:53:02 cp sshd[13725]: Failed password for mysql from 202.179.103.114 port 47164 ssh2 |
2019-12-22 04:07:36 |
| 134.17.94.229 | attack | 2019-12-21T12:26:12.789465suse-nuc sshd[22867]: Invalid user sinh from 134.17.94.229 port 2583 ... |
2019-12-22 03:46:11 |
| 218.106.154.114 | attackspam | firewall-block, port(s): 8087/tcp |
2019-12-22 04:07:00 |
| 218.92.0.156 | attack | 2019-12-21T20:43:08.801937vps751288.ovh.net sshd\[22868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.156 user=root 2019-12-21T20:43:10.491758vps751288.ovh.net sshd\[22868\]: Failed password for root from 218.92.0.156 port 47477 ssh2 2019-12-21T20:43:14.167899vps751288.ovh.net sshd\[22868\]: Failed password for root from 218.92.0.156 port 47477 ssh2 2019-12-21T20:43:17.397321vps751288.ovh.net sshd\[22868\]: Failed password for root from 218.92.0.156 port 47477 ssh2 2019-12-21T20:43:21.032174vps751288.ovh.net sshd\[22868\]: Failed password for root from 218.92.0.156 port 47477 ssh2 |
2019-12-22 03:53:38 |
| 84.2.104.71 | attack | Automatic report - Port Scan Attack |
2019-12-22 03:34:21 |
| 187.103.8.90 | attackspam | "Fail2Ban detected SSH brute force attempt" |
2019-12-22 03:52:58 |
| 159.203.32.71 | attack | $f2bV_matches |
2019-12-22 03:38:29 |