城市(city): Baku
省份(region): Baki
国家(country): Azerbaijan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 37.114.147.36 | attackspambots | invalid login attempt (admin) |
2020-01-25 16:54:36 |
| 37.114.147.145 | attackspambots | T: f2b postfix sasl 3x |
2019-10-15 20:44:35 |
| 37.114.147.23 | attackspambots | Chat Spam |
2019-09-25 06:40:45 |
| 37.114.147.117 | attackspam | " " |
2019-07-15 05:21:12 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '37.114.128.0 - 37.114.159.255'
% Abuse contact for '37.114.128.0 - 37.114.159.255' is 'sammy@azqtel.com'
inetnum: 37.114.128.0 - 37.114.159.255
netname: SAZZNET
country: AZ
admin-c: bosm11-ripe
tech-c: bosm11-ripe
org: ORG-AL210-RIPE
status: ASSIGNED PA
mnt-by: SB3282-MNT
created: 2024-07-23T13:28:06Z
last-modified: 2024-07-23T13:28:06Z
source: RIPE
organisation: ORG-AL210-RIPE
org-name: Azqtel, Limited
country: AZ
org-type: LIR
address: 17B, Suleyman Rustam Street
address: AZ1014
address: Baku
address: AZERBAIJAN
phone: +994555907850
fax-no: +994124414734
reg-nr: 1401030021
abuse-c: AR13936-RIPE
mnt-ref: SB3282-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SB3282-MNT
created: 2011-12-15T09:37:14Z
last-modified: 2026-04-29T05:33:17Z
source: RIPE # Filtered
person: Ramiz Nasirov
address: 17B, Suleyman Rustam Str
address: Baku Azerbaijan
phone: +994559007018
nic-hdl: bosm11-ripe
mnt-by: SB3282-MNT
created: 2012-02-03T11:53:04Z
last-modified: 2022-10-10T10:40:13Z
source: RIPE # Filtered
% Information related to '37.114.128.0/19AS39232'
route: 37.114.128.0/19
origin: AS39232
mnt-by: SB3282-MNT
created: 2025-03-17T07:25:41Z
last-modified: 2025-03-17T07:25:41Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.114.147.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;37.114.147.100. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 04:17:54 CST 2026
;; MSG SIZE rcvd: 107
Host 100.147.114.37.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 100.147.114.37.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.61.37.231 | attack | SSH bruteforce (Triggered fail2ban) |
2020-03-17 04:02:59 |
| 109.42.2.89 | attackspam | Mar 16 15:39:59 [host] kernel: [999272.679429] [UF Mar 16 15:39:59 [host] kernel: [999272.687385] [UF Mar 16 15:40:03 [host] kernel: [999276.246722] [UF Mar 16 15:40:03 [host] kernel: [999276.254836] [UF Mar 16 15:40:10 [host] kernel: [999283.365306] [UF Mar 16 15:40:10 [host] kernel: [999283.413355] [UF |
2020-03-17 03:28:50 |
| 173.53.23.48 | attack | Mar 16 20:37:31 jupiter sshd[18211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.53.23.48 Mar 16 20:37:33 jupiter sshd[18211]: Failed password for invalid user vyatta from 173.53.23.48 port 39798 ssh2 ... |
2020-03-17 03:52:37 |
| 95.154.173.171 | attack | 1584369601 - 03/16/2020 15:40:01 Host: 95.154.173.171/95.154.173.171 Port: 445 TCP Blocked |
2020-03-17 03:38:39 |
| 114.35.59.144 | attack | firewall-block, port(s): 23/tcp |
2020-03-17 03:27:16 |
| 105.208.57.128 | attack | firewall-block, port(s): 23/tcp |
2020-03-17 03:31:02 |
| 165.22.177.224 | attackbotsspam | DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks node-superagent/4.1.0 |
2020-03-17 03:47:14 |
| 78.128.113.93 | attackbotsspam | Hi, The IP 78.128.113.93 has just been banned by Fail2Ban after 9 attempts against Qpsmtpd. Regards, Fail2Ban |
2020-03-17 04:14:04 |
| 203.95.212.41 | attackspambots | Mar 16 19:01:25 ks10 sshd[2567468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 Mar 16 19:01:27 ks10 sshd[2567468]: Failed password for invalid user 10022\r from 203.95.212.41 port 21558 ssh2 ... |
2020-03-17 03:36:46 |
| 114.231.42.31 | attackspam | SMTP |
2020-03-17 03:51:17 |
| 192.241.239.249 | attackbots | *Port Scan* detected from 192.241.239.249 (US/United States/zg-0312b-240.stretchoid.com). 4 hits in the last 145 seconds |
2020-03-17 03:45:38 |
| 114.231.82.63 | attackbotsspam | SMTP |
2020-03-17 03:43:17 |
| 182.61.48.178 | attack | Mar 16 14:34:57 124388 sshd[14504]: Invalid user gitolite from 182.61.48.178 port 45572 Mar 16 14:34:57 124388 sshd[14504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.48.178 Mar 16 14:34:57 124388 sshd[14504]: Invalid user gitolite from 182.61.48.178 port 45572 Mar 16 14:34:59 124388 sshd[14504]: Failed password for invalid user gitolite from 182.61.48.178 port 45572 ssh2 Mar 16 14:39:46 124388 sshd[14704]: Invalid user samba from 182.61.48.178 port 39778 |
2020-03-17 03:47:36 |
| 163.172.113.19 | attackspambots | 2020-03-16T09:40:46.865535linuxbox-skyline sshd[1951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19 user=root 2020-03-16T09:40:48.700525linuxbox-skyline sshd[1951]: Failed password for root from 163.172.113.19 port 41484 ssh2 ... |
2020-03-17 03:41:55 |
| 178.171.67.92 | attackbotsspam | Chat Spam |
2020-03-17 03:35:03 |