城市(city): unknown
省份(region): unknown
国家(country): The Netherlands
运营商(isp): Vodafone
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '31.136.0.0 - 31.139.255.255'
% Abuse contact for '31.136.0.0 - 31.139.255.255' is 'technicalsecurity.nl@vodafone.com'
inetnum: 31.136.0.0 - 31.139.255.255
org: ORG-VN2-RIPE
netname: NL-VODAFONE-20110301
country: NL
admin-c: VFHM-RIPE
tech-c: VFHM-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: VODAFONE-NL-MNT
mnt-routes: VODAFONE-NL-MNT
created: 2011-03-01T09:37:01Z
last-modified: 2016-04-14T08:05:11Z
source: RIPE # Filtered
organisation: ORG-VN2-RIPE
org-name: Vodafone Libertel B.V.
country: NL
org-type: LIR
address: Avenue Ceramique 300
address: 6201 BM
address: Maastricht
address: NETHERLANDS
phone: +31 43 355 5555
fax-no: +31 43 355 9064
admin-c: RP9881-RIPE
admin-c: NC1977-RIPE
admin-c: PT2582-RIPE
mnt-by: VODAFONE-NL-MNT
mnt-ref: VODAFONE-NL-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
abuse-c: VFHM-RIPE
created: 2004-04-17T11:42:08Z
last-modified: 2024-01-24T14:09:33Z
source: RIPE # Filtered
role: VODAFONE NL Hostmaster
address: P.O. Box 1500
address: NL - 6201 BM Maastricht
address: The Netherlands
phone: +31 43 355 5555
fax-no: +31 43 3557444
remarks: trouble: contact +31 43 3557905
remarks: trouble: contact nmc.nl@vodafone.com
admin-c: RP9881-RIPE
tech-c: PT2582-RIPE
tech-c: NC1977-RIPE
nic-hdl: VFHM-RIPE
abuse-mailbox: technicalsecurity.nl@vodafone.com
mnt-by: VODAFONE-NL-MNT
created: 2003-12-01T14:20:46Z
last-modified: 2013-05-13T12:34:59Z
source: RIPE # Filtered
% Information related to '31.136.0.0/14AS33915'
route: 31.136.0.0/14
origin: AS33915
mnt-by: VODAFONE-NL-MNT
created: 2024-03-06T14:32:17Z
last-modified: 2024-03-06T14:32:17Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.120 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.139.233.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.139.233.243. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026021901 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 20 00:58:17 CST 2026
;; MSG SIZE rcvd: 107
Host 243.233.139.31.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 243.233.139.31.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 108.176.0.2 | attackbotsspam | Oct 11 14:50:54 [host] sshd[22852]: Invalid user pi from 108.176.0.2 Oct 11 14:50:54 [host] sshd[22852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.176.0.2 Oct 11 14:50:56 [host] sshd[22852]: Failed password for invalid user pi from 108.176.0.2 port 57287 ssh2 |
2019-10-11 20:52:39 |
| 171.100.61.190 | attack | Invalid user admin from 171.100.61.190 port 45618 |
2019-10-11 21:09:42 |
| 183.88.39.168 | attackbots | Invalid user admin from 183.88.39.168 port 37604 |
2019-10-11 20:46:12 |
| 14.177.137.133 | attackbotsspam | Invalid user admin from 14.177.137.133 port 45800 |
2019-10-11 21:01:56 |
| 123.21.0.163 | attackspam | Invalid user admin from 123.21.0.163 port 42304 |
2019-10-11 20:50:09 |
| 157.245.207.43 | attack | Invalid user ubnt from 157.245.207.43 port 52560 |
2019-10-11 20:47:53 |
| 14.190.10.199 | attackbotsspam | Invalid user admin from 14.190.10.199 port 33347 |
2019-10-11 21:00:11 |
| 84.73.72.60 | attackbotsspam | Invalid user pi from 84.73.72.60 port 40692 |
2019-10-11 20:53:36 |
| 81.22.45.29 | attackspambots | 10/11/2019-07:59:25.545643 81.22.45.29 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 84 |
2019-10-11 20:31:40 |
| 197.251.253.144 | attack | Invalid user admin from 197.251.253.144 port 51305 |
2019-10-11 21:05:57 |
| 186.101.206.163 | attack | Invalid user admin from 186.101.206.163 port 48995 |
2019-10-11 20:44:48 |
| 212.98.122.91 | attackbots | Invalid user admin from 212.98.122.91 port 55899 |
2019-10-11 21:05:06 |
| 188.163.99.43 | attackbotsspam | Invalid user admin from 188.163.99.43 port 48020 |
2019-10-11 21:07:03 |
| 109.202.117.132 | attack | 10/11/2019-08:30:38.556671 109.202.117.132 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-11 20:35:02 |
| 14.177.136.208 | attack | Invalid user admin from 14.177.136.208 port 28898 |
2019-10-11 21:02:26 |