城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): EE
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '31.71.0.0 - 31.79.255.255'
% Abuse contact for '31.71.0.0 - 31.79.255.255' is 'abuse@ee.co.uk'
inetnum: 31.71.0.0 - 31.79.255.255
netname: UK-TM-20101125
country: GB
org: ORG-TIUL1-RIPE
admin-c: TMUK-RIPE
tech-c: TMUK-RIPE
status: ALLOCATED PA
remarks: For matters relating to abuse of services by individual customers, please contact abuse@ee.co.uk
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS12576-MNT
mnt-lower: TMUK-MNT
mnt-lower: AS12576-MNT
mnt-domains: TMUK-MNT
mnt-routes: TMUK-MNT
created: 2026-03-13T15:11:09Z
last-modified: 2026-03-13T15:11:09Z
source: RIPE # Filtered
organisation: ORG-TIUL1-RIPE
org-name: EE Limited
country: GB
org-type: LIR
address: PP1, Floor1, Orion, Adastral Park, Martlesham Heath
address: IP5 3RE
address: Ipswich
address: UNITED KINGDOM
phone: +44 (0)20 7356 5000
admin-c: TMUK-RIPE
admin-c: EE1964-RIPE
admin-c: FLS15-RIPE
abuse-c: EA8069-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: AS12576-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS12576-MNT
created: 2004-04-17T12:22:43Z
last-modified: 2024-03-22T17:58:16Z
source: RIPE # Filtered
role: EE UK RIPE Admin
address: PP1, Floor1, Orion, Adastral Park, Martlesham Heath
address: Ipswich
address: IP5 3RE
abuse-mailbox: abuse@ee.co.uk
admin-c: EE1964-RIPE
mnt-by: TMUK-MNT
tech-c: EE1964-RIPE
tech-c: EE1964-RIPE
nic-hdl: TMUK-RIPE
created: 2009-07-15T08:59:08Z
last-modified: 2024-03-28T15:37:05Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.77.102.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.77.102.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:54:33 CST 2026
;; MSG SIZE rcvd: 105
Host 54.102.77.31.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.102.77.31.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.201.76.248 | attack | Invalid user b from 128.201.76.248 port 39803 |
2020-04-17 13:14:44 |
| 112.85.42.180 | attackspam | Apr 17 05:42:44 combo sshd[10254]: Failed password for root from 112.85.42.180 port 56314 ssh2 Apr 17 05:42:47 combo sshd[10254]: Failed password for root from 112.85.42.180 port 56314 ssh2 Apr 17 05:42:51 combo sshd[10254]: Failed password for root from 112.85.42.180 port 56314 ssh2 ... |
2020-04-17 13:19:06 |
| 189.213.166.80 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-17 12:51:41 |
| 94.254.125.44 | attackspam | Apr 17 05:00:39 web8 sshd\[17018\]: Invalid user lj from 94.254.125.44 Apr 17 05:00:39 web8 sshd\[17018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.254.125.44 Apr 17 05:00:41 web8 sshd\[17018\]: Failed password for invalid user lj from 94.254.125.44 port 47674 ssh2 Apr 17 05:04:19 web8 sshd\[19053\]: Invalid user oz from 94.254.125.44 Apr 17 05:04:19 web8 sshd\[19053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.254.125.44 |
2020-04-17 13:24:17 |
| 150.109.23.36 | attack | Honeypot hit. |
2020-04-17 13:02:21 |
| 171.103.166.146 | attackspam | Autoban 171.103.166.146 AUTH/CONNECT |
2020-04-17 12:55:19 |
| 59.9.210.52 | attack | Apr 17 05:58:44 pornomens sshd\[22240\]: Invalid user pe from 59.9.210.52 port 53283 Apr 17 05:58:44 pornomens sshd\[22240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.9.210.52 Apr 17 05:58:47 pornomens sshd\[22240\]: Failed password for invalid user pe from 59.9.210.52 port 53283 ssh2 ... |
2020-04-17 12:50:05 |
| 64.225.100.126 | attack | Apr 17 03:49:23 marvibiene sshd[9252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.100.126 user=root Apr 17 03:49:25 marvibiene sshd[9252]: Failed password for root from 64.225.100.126 port 60338 ssh2 Apr 17 03:58:44 marvibiene sshd[9325]: Invalid user nq from 64.225.100.126 port 47718 ... |
2020-04-17 12:53:33 |
| 35.199.73.100 | attackbots | Apr 17 07:40:22 pkdns2 sshd\[20243\]: Invalid user postgres from 35.199.73.100Apr 17 07:40:23 pkdns2 sshd\[20243\]: Failed password for invalid user postgres from 35.199.73.100 port 36514 ssh2Apr 17 07:44:38 pkdns2 sshd\[20370\]: Invalid user ip from 35.199.73.100Apr 17 07:44:40 pkdns2 sshd\[20370\]: Failed password for invalid user ip from 35.199.73.100 port 44044 ssh2Apr 17 07:48:56 pkdns2 sshd\[20539\]: Invalid user gq from 35.199.73.100Apr 17 07:48:59 pkdns2 sshd\[20539\]: Failed password for invalid user gq from 35.199.73.100 port 51570 ssh2 ... |
2020-04-17 13:05:27 |
| 114.99.3.209 | attackspambots | Forbidden directory scan :: 2020/04/17 03:57:52 [error] 1155#1155: *1042219 access forbidden by rule, client: 114.99.3.209, server: [censored_1], request: "GET /wp-content/plugins/wp-quick-front-end-editor/readme.txt HTTP/1.1", host: "[censored_1]" |
2020-04-17 13:22:40 |
| 139.155.22.165 | attack | Invalid user dasusr from 139.155.22.165 port 55780 |
2020-04-17 13:32:02 |
| 158.69.222.2 | attackspambots | SSH auth scanning - multiple failed logins |
2020-04-17 13:09:34 |
| 164.163.111.142 | attack | Automatic report - Port Scan Attack |
2020-04-17 13:07:30 |
| 119.90.61.52 | attackbots | Invalid user oracle from 119.90.61.52 port 56620 |
2020-04-17 13:08:31 |
| 119.47.90.197 | attackspam | Invalid user zte from 119.47.90.197 port 39878 |
2020-04-17 13:33:32 |