城市(city): Biyalā
省份(region): Kafr ash Shaykh
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
41.235.166.97 | attack | port scan and connect, tcp 23 (telnet) |
2019-09-22 03:02:49 |
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.235.0.0 - 41.235.255.255'
% No abuse contact registered for 41.235.0.0 - 41.235.255.255
inetnum: 41.235.0.0 - 41.235.255.255
netname: All-09
descr: TE Data
country: EG
org: ORG-TD2-AFRINIC
admin-c: TDCR1-AFRINIC
tech-c: TDCR2-AFRINIC
status: ASSIGNED PA
remarks: ====================================================
remarks: For Internet Abuse & Spam reports : admins@tedata.net
remarks: ====================================================
mnt-by: GEGA-MNT
source: AFRINIC # Filtered
parent: 41.232.0.0 - 41.239.255.255
organisation: ORG-TD2-AFRINIC
org-name: TE Data
org-type: LIR
country: EG
address: TE Data,
address: Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km
address: 6th October 12577
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: MH7-AFRINIC
tech-c: MS150-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: GEGA-MNT
mnt-by: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered
role: TE Data Contact Role
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR2-AFRINIC
nic-hdl: TDCR1-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
role: TE Data Contact Role-2
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR1-AFRINIC
nic-hdl: TDCR2-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
% Information related to '41.235.160.0/21AS8452'
route: 41.235.160.0/21
descr: Telecom-Egypt-Data
origin: AS8452
mnt-lower: GEGA-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.235.166.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.235.166.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101700 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 17 20:34:37 CST 2025
;; MSG SIZE rcvd: 106
Host 61.166.235.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 61.166.235.41.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
171.231.227.50 | attackspambots | unauthorized connection attempt |
2020-02-19 13:18:21 |
183.106.82.10 | attackspambots | unauthorized connection attempt |
2020-02-19 13:41:45 |
223.197.161.43 | attack | unauthorized connection attempt |
2020-02-19 13:45:32 |
218.3.61.204 | attack | unauthorized connection attempt |
2020-02-19 13:26:00 |
114.34.35.186 | attackbots | unauthorized connection attempt |
2020-02-19 13:31:20 |
196.50.209.27 | attackbots | unauthorized connection attempt |
2020-02-19 13:46:40 |
113.141.64.31 | attackspambots | unauthorized connection attempt |
2020-02-19 13:19:04 |
27.77.47.140 | attack | unauthorized connection attempt |
2020-02-19 13:37:23 |
223.16.82.38 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 13:24:29 |
180.163.220.96 | attackspam | unauthorized connection attempt |
2020-02-19 13:17:06 |
36.82.101.230 | attackbotsspam | unauthorized connection attempt |
2020-02-19 13:53:52 |
89.46.143.91 | attackbotsspam | unauthorized connection attempt |
2020-02-19 13:45:10 |
178.33.45.156 | attackspam | Feb 18 21:33:05 server sshd\[12779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip156.ip-178-33-45.eu user=shutdown Feb 18 21:33:07 server sshd\[12779\]: Failed password for shutdown from 178.33.45.156 port 54284 ssh2 Feb 19 07:56:55 server sshd\[26828\]: Invalid user vmail from 178.33.45.156 Feb 19 07:56:55 server sshd\[26828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip156.ip-178-33-45.eu Feb 19 07:56:57 server sshd\[26828\]: Failed password for invalid user vmail from 178.33.45.156 port 38490 ssh2 ... |
2020-02-19 13:17:34 |
190.74.218.113 | attackspambots | unauthorized connection attempt |
2020-02-19 13:16:49 |
201.177.67.200 | attack | unauthorized connection attempt |
2020-02-19 13:26:47 |