城市(city): Burgthann
省份(region): Bayern
国家(country): Germany
运营商(isp): Telekom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2a01:598:8000::/33'
% Abuse contact for '2a01:598:8000::/33' is 'abuse@telekom.de'
inet6num: 2a01:598:8000::/33
assignment-size:64
netname: Customer-v6-0001
country: DE
admin-c: AS8728-RIPE
tech-c: MS47198-RIPE
status: AGGREGATED-BY-LIR
remarks: ***************************************************************************
remarks: Please send any abuse complaints to: abuse@telekom.de
remarks: Behoerdenauskuenfte koennen nur ueber folgende Ruf- bzw. Faxnummern beantwortet werden:
remarks: Fax: 0180-18811-66 (0,039 Euro/Minute aus dem Festnetz der Deutschen Telekom AG.)
remarks: Tel.: 0180-18811-77 (0,039 Euro/Minute aus dem Festnetz der Deutschen Telekom AG.)
remarks: ***************************************************************************
mnt-by: MNT-TMD
created: 2018-10-04T07:12:50Z
last-modified: 2019-01-24T09:22:11Z
source: RIPE
person: Alexander Schloesser
address: Telekom Deutschland GmbH
address: Landgrabenweg 149
address: D-53227 Bonn
address: Germany
phone: +49 228 181 0
mnt-by: MNT-TMD
nic-hdl: AS8728-RIPE
created: 2005-08-09T11:13:06Z
last-modified: 2025-03-10T08:28:56Z
source: RIPE # Filtered
person: Mirko Sitte
address: Telekom Deutschland GmbH
address: Landgrabenweg 149
address: D-53227 Bonn
address: Germany
phone: +49 228 936 0
nic-hdl: MS47198-RIPE
mnt-by: MNT-TMD
created: 2002-07-08T07:23:50Z
last-modified: 2025-03-10T08:29:48Z
source: RIPE # Filtered
% Information related to '2a01:598:8000::/33AS44178'
route6: 2a01:598:8000::/33
descr: Telekom Deutschland GmbH
origin: AS44178
mnt-by: MNT-TMD
created: 2012-08-10T10:49:01Z
last-modified: 2012-08-10T10:49:01Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a01:598:8190:972b:1:1:9621:a023
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 49275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a01:598:8190:972b:1:1:9621:a023. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 20 10:25:17 CST 2026
;; MSG SIZE rcvd: 61
'
Host 3.2.0.a.1.2.6.9.1.0.0.0.1.0.0.0.b.2.7.9.0.9.1.8.8.9.5.0.1.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 3.2.0.a.1.2.6.9.1.0.0.0.1.0.0.0.b.2.7.9.0.9.1.8.8.9.5.0.1.0.a.2.ip6.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 110.45.147.77 | attack | Jun 20 20:52:10 vps647732 sshd[18468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.147.77 Jun 20 20:52:13 vps647732 sshd[18468]: Failed password for invalid user fe from 110.45.147.77 port 50874 ssh2 ... |
2020-06-21 03:18:31 |
| 49.234.213.237 | attack | Jun 20 13:35:09 r.ca sshd[7382]: Failed password for root from 49.234.213.237 port 57328 ssh2 |
2020-06-21 03:26:34 |
| 216.218.206.80 | attackbotsspam | trying to access non-authorized port |
2020-06-21 03:16:35 |
| 103.114.107.133 | attackspam | 20 attempts against mh_ha-misbehave-ban on field |
2020-06-21 03:16:59 |
| 222.186.180.130 | attack | Jun 20 21:21:53 vpn01 sshd[24922]: Failed password for root from 222.186.180.130 port 48160 ssh2 Jun 20 21:21:55 vpn01 sshd[24922]: Failed password for root from 222.186.180.130 port 48160 ssh2 ... |
2020-06-21 03:22:37 |
| 87.251.74.41 | attackbots | Jun 20 21:10:55 debian-2gb-nbg1-2 kernel: \[14938938.285200\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.41 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=26896 PROTO=TCP SPT=52787 DPT=11999 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 03:38:07 |
| 195.116.123.198 | attack | ... |
2020-06-21 03:08:51 |
| 187.189.108.139 | attackspam | MX__<177>1592675372 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]: |
2020-06-21 03:27:02 |
| 51.178.87.192 | attackbotsspam | Jun 20 20:43:52 journals sshd\[38288\]: Invalid user woo from 51.178.87.192 Jun 20 20:43:52 journals sshd\[38288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.87.192 Jun 20 20:43:54 journals sshd\[38288\]: Failed password for invalid user woo from 51.178.87.192 port 42708 ssh2 Jun 20 20:49:23 journals sshd\[38782\]: Invalid user devops from 51.178.87.192 Jun 20 20:49:23 journals sshd\[38782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.87.192 ... |
2020-06-21 03:32:54 |
| 193.70.12.236 | attack | CMS (WordPress or Joomla) login attempt. |
2020-06-21 03:46:27 |
| 185.162.235.66 | attackspambots | 2020-06-20T20:00:51.872334MailD postfix/smtpd[13983]: warning: unknown[185.162.235.66]: SASL LOGIN authentication failed: authentication failure 2020-06-20T20:01:08.759141MailD postfix/smtpd[13983]: warning: unknown[185.162.235.66]: SASL LOGIN authentication failed: authentication failure 2020-06-20T20:01:09.520246MailD postfix/smtpd[13983]: warning: unknown[185.162.235.66]: SASL LOGIN authentication failed: authentication failure |
2020-06-21 03:47:35 |
| 222.186.175.182 | attack | 2020-06-20T21:41:59.152496amanda2.illicoweb.com sshd\[33528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root 2020-06-20T21:42:00.871582amanda2.illicoweb.com sshd\[33528\]: Failed password for root from 222.186.175.182 port 11092 ssh2 2020-06-20T21:42:04.328526amanda2.illicoweb.com sshd\[33528\]: Failed password for root from 222.186.175.182 port 11092 ssh2 2020-06-20T21:42:07.197974amanda2.illicoweb.com sshd\[33528\]: Failed password for root from 222.186.175.182 port 11092 ssh2 2020-06-20T21:42:11.146389amanda2.illicoweb.com sshd\[33528\]: Failed password for root from 222.186.175.182 port 11092 ssh2 ... |
2020-06-21 03:42:25 |
| 45.14.149.46 | attackbotsspam | $f2bV_matches |
2020-06-21 03:40:00 |
| 51.178.55.92 | attackspam | 2020-06-20T19:21:28.886268mail.csmailer.org sshd[940]: Invalid user unmesh from 51.178.55.92 port 52844 2020-06-20T19:21:28.890409mail.csmailer.org sshd[940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-178-55.eu 2020-06-20T19:21:28.886268mail.csmailer.org sshd[940]: Invalid user unmesh from 51.178.55.92 port 52844 2020-06-20T19:21:30.617894mail.csmailer.org sshd[940]: Failed password for invalid user unmesh from 51.178.55.92 port 52844 ssh2 2020-06-20T19:24:48.113354mail.csmailer.org sshd[1586]: Invalid user mailman from 51.178.55.92 port 54348 ... |
2020-06-21 03:38:44 |
| 101.32.19.173 | attackspam | Jun 20 15:11:08 NPSTNNYC01T sshd[32498]: Failed password for root from 101.32.19.173 port 39906 ssh2 Jun 20 15:14:48 NPSTNNYC01T sshd[370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.19.173 Jun 20 15:14:51 NPSTNNYC01T sshd[370]: Failed password for invalid user administrador from 101.32.19.173 port 42084 ssh2 ... |
2020-06-21 03:39:43 |