城市(city): unknown
省份(region): unknown
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.180.199.0 - 213.180.199.255'
% Abuse contact for '213.180.199.0 - 213.180.199.255' is 'abuse@yandex.ru'
inetnum: 213.180.199.0 - 213.180.199.255
netname: YANDEX-213-180-199-0
status: ASSIGNED PA
country: RU
descr: Yandex enterprise network
mnt-by: YANDEX-MNT
admin-c: YNDX1-RIPE
tech-c: YNDX1-RIPE
org: ORG-YA1-RIPE
remarks: INFRA-AW
source: RIPE
created: 2015-04-09T10:16:51Z
last-modified: 2024-10-28T10:36:33Z
organisation: ORG-YA1-RIPE
org-name: YANDEX LLC
country: RU
org-type: LIR
address: LVA TOLSTOY STREET, 16
address: 119021
address: Moscow
address: RUSSIAN FEDERATION
phone: +74957397000
fax-no: +74957397070
admin-c: YNDX1-RIPE
tech-c: YNDX1-RIPE
abuse-c: YAH6-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: YANDEX-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: YANDEX-MNT
created: 2004-04-22T14:39:02Z
last-modified: 2025-08-04T11:07:18Z
source: RIPE # Filtered
role: Yandex LLC Network Operations
address: Yandex LLC
address: 16, Leo Tolstoy St.
address: 119021
address: Moscow
address: Russian Federation
phone: +7 495 739 7000
fax-no: +7 495 739 7070
remarks: trouble: ------------------------------------------------------
remarks: trouble: Points of contact for Yandex LLC Network Operations
remarks: trouble: ------------------------------------------------------
remarks: trouble: Routing and peering issues: noc@yandex.net
remarks: trouble: SPAM issues: abuse@yandex.ru
remarks: trouble: Network security issues: abuse@yandex.ru
remarks: trouble: Mail issues: postmaster@yandex.ru
remarks: trouble: General information: info@yandex.ru
remarks: trouble: ------------------------------------------------------
admin-c: MK24579-RIPE
tech-c: EM3673-RIPE
tech-c: AUR2-RIPE
nic-hdl: YNDX1-RIPE
mnt-by: YANDEX-MNT
created: 2002-06-07T05:35:50Z
last-modified: 2025-12-30T09:47:31Z
source: RIPE # Filtered
abuse-mailbox: abuse@yandex.ru
% Information related to '213.180.199.0/24AS13238'
route: 213.180.199.0/24
descr: Yandex network
origin: AS13238
mnt-by: YANDEX-MNT
created: 2021-07-26T12:11:59Z
last-modified: 2021-07-26T12:11:59Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.180.199.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.180.199.9. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 01:15:05 CST 2026
;; MSG SIZE rcvd: 106
b'9.199.180.213.in-addr.arpa domain name pointer kp-nginx-stable-balancer.kp.yandex.net.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
9.199.180.213.in-addr.arpa name = kp-nginx-stable-balancer.kp.yandex.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 210.86.228.18 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:07:44 |
| 216.218.206.101 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:52:56 |
| 216.218.206.115 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:52:12 |
| 213.153.137.233 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:56:48 |
| 202.185.141.97 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:14:26 |
| 220.135.109.193 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:37:59 |
| 216.189.116.247 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:55:27 |
| 213.80.175.159 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:57:30 |
| 217.182.44.117 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:49:29 |
| 213.74.206.123 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:57:46 |
| 220.134.158.106 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:39:37 |
| 211.72.126.252 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 08:04:07 |
| 220.135.147.21 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:37:26 |
| 212.129.17.32 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:59:41 |
| 218.161.96.86 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-24 07:47:20 |