城市(city): Nevinnomyssk
省份(region): Stavropol
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.222.232.0 - 213.222.235.255'
% Abuse contact for '213.222.232.0 - 213.222.235.255' is 'abuse@mtu.ru'
inetnum: 213.222.232.0 - 213.222.235.255
netname: OOOSET-NET
descr: OOO SET
remarks: INFRA-AW
country: RU
admin-c: OOO4-RIPE
tech-c: OOO4-RIPE
status: ASSIGNED PA
mnt-by: OOOSET-MNT
created: 2010-12-22T12:00:32Z
last-modified: 2014-09-29T06:29:46Z
source: RIPE
role: LLC Set Main Operating Center
address: Russia, Stavropol Khetagurova str, 9
phone: +7 8652 333454
fax-no: +7 8652 334217
abuse-mailbox: abuse@zelenaya.net
admin-c: IVS61-RIPE
tech-c: IVS61-RIPE
mnt-by: OOOSET-MNT
nic-hdl: OOO4-RIPE
created: 2008-09-16T13:38:28Z
last-modified: 2015-05-22T07:26:13Z
source: RIPE # Filtered
% Information related to '213.222.232.0/21AS48176'
route: 213.222.232.0/21
origin: AS48176
mnt-by: OOOSET-MNT
created: 2018-03-12T13:50:58Z
last-modified: 2018-03-12T13:50:58Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.222.235.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.222.235.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 19:04:30 CST 2026
;; MSG SIZE rcvd: 108
132.235.222.213.in-addr.arpa domain name pointer mx2.cons-stav.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
132.235.222.213.in-addr.arpa name = mx2.cons-stav.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.144.135.118 | attack | Oct 31 04:42:36 kapalua sshd\[6026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118 user=root Oct 31 04:42:38 kapalua sshd\[6026\]: Failed password for root from 190.144.135.118 port 38874 ssh2 Oct 31 04:46:14 kapalua sshd\[6312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118 user=root Oct 31 04:46:16 kapalua sshd\[6312\]: Failed password for root from 190.144.135.118 port 56269 ssh2 Oct 31 04:50:07 kapalua sshd\[6586\]: Invalid user gi from 190.144.135.118 |
2019-11-01 00:29:30 |
| 115.201.218.50 | attackspam | Unauthorized connection attempt from IP address 115.201.218.50 on Port 445(SMB) |
2019-11-01 00:21:32 |
| 31.184.218.126 | attackspambots | TCP 3389 (RDP) |
2019-11-01 00:03:17 |
| 95.108.4.67 | attack | Unauthorised access (Oct 31) SRC=95.108.4.67 LEN=52 TTL=119 ID=630 DF TCP DPT=1433 WINDOW=8192 SYN |
2019-10-31 23:58:21 |
| 171.234.63.20 | attackspambots | Unauthorized connection attempt from IP address 171.234.63.20 on Port 445(SMB) |
2019-11-01 00:07:47 |
| 212.64.53.252 | attackspambots | Port 1433 Scan |
2019-11-01 00:18:15 |
| 59.95.158.138 | attackbotsspam | Unauthorized connection attempt from IP address 59.95.158.138 on Port 445(SMB) |
2019-11-01 00:22:01 |
| 78.187.239.88 | attackbots | Unauthorized connection attempt from IP address 78.187.239.88 on Port 445(SMB) |
2019-11-01 00:20:32 |
| 85.93.20.148 | attackspambots | 191031 9:35:06 \[Warning\] Access denied for user 'root'@'85.93.20.148' \(using password: YES\) 191031 9:52:25 \[Warning\] Access denied for user 'root'@'85.93.20.148' \(using password: YES\) 191031 10:36:48 \[Warning\] Access denied for user 'root'@'85.93.20.148' \(using password: YES\) ... |
2019-11-01 00:03:00 |
| 110.137.176.133 | attackspam | Unauthorized connection attempt from IP address 110.137.176.133 on Port 445(SMB) |
2019-11-01 00:31:03 |
| 212.83.129.182 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-01 00:27:48 |
| 64.201.57.114 | attackbotsspam | Unauthorized connection attempt from IP address 64.201.57.114 on Port 445(SMB) |
2019-11-01 00:06:18 |
| 200.107.236.174 | attackbots | Oct 31 13:03:20 srv206 sshd[4147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.236.174 user=sys Oct 31 13:03:21 srv206 sshd[4147]: Failed password for sys from 200.107.236.174 port 55897 ssh2 ... |
2019-11-01 00:02:26 |
| 51.75.37.174 | attackspam | detected by Fail2Ban |
2019-11-01 00:10:39 |
| 74.82.47.56 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-01 00:23:54 |