城市(city): Bucharest
省份(region): Bucuresti
国家(country): Romania
运营商(isp): Digi.Mobil
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.12.128.0 - 5.12.131.255'
% Abuse contact for '5.12.128.0 - 5.12.131.255' is 'abuse@rcs-rds.ro'
inetnum: 5.12.128.0 - 5.12.131.255
netname: RO-RESIDENTIAL
descr: RCS & RDS Residential
descr: City: Bucuresti
remarks: INFRA-AW
country: RO
admin-c: RDS-RIPE
tech-c: RDS-RIPE
tech-c: RDS2012-RIPE
status: ASSIGNED PA
mnt-by: AS8708-MNT
mnt-lower: AS8708-MNT
created: 2023-08-03T08:21:01Z
last-modified: 2023-08-03T08:21:01Z
source: RIPE # Filtered
role: RCS & RDS NOC
address: 71-75 Dr. Staicovici
address: Bucharest / ROMANIA
phone: +40 21 30 10 888
fax-no: +40 21 30 10 892
abuse-mailbox: abuse@rcs-rds.ro
admin-c: GEPU1-RIPE
tech-c: GEPU1-RIPE
nic-hdl: RDS-RIPE
mnt-by: RDS-MNT
remarks: +------------------------------------------------------------+
remarks: | Please use ABUSE@RCS-RDS.RO for complaints and only after |
remarks: | you have tried contacting directly our customers according |
remarks: | to the details registered in RIPE database. |
remarks: +------------------------------------------------------------+
remarks: | DO NOT CALL, FAX, OR CONTACT US BY ANY OTHER MEANS EXCEPT |
remarks: | abuse@rcs-rds.ro |
remarks: +------------------------------------------------------------+
created: 1970-01-01T00:00:00Z
last-modified: 2019-08-21T07:16:42Z
source: RIPE # Filtered
role: RCS RDS
address: 71-75 Dr. Staicovici
address: Bucharest / ROMANIA
phone: +40 21 30 10 888
fax-no: +40 21 30 10 892
abuse-mailbox: abuse@rcs-rds.ro
admin-c: GEPU1-RIPE
tech-c: GEPU1-RIPE
nic-hdl: RDS2012-RIPE
mnt-by: RDS-MNT
remarks: +------------------------------------------------------------+
remarks: | Please use ABUSE@RCS-RDS.RO for complaints and only after |
remarks: | you have tried contacting directly our customers according |
remarks: | to the details registered in RIPE database. |
remarks: +------------------------------------------------------------+
remarks: | DO NOT CALL, FAX, OR CONTACT US BY ANY OTHER MEANS EXCEPT |
remarks: | abuse@rcs-rds.ro |
remarks: +------------------------------------------------------------+
created: 2012-01-24T08:33:39Z
last-modified: 2013-05-11T03:16:10Z
source: RIPE # Filtered
% Information related to '5.12.0.0/14AS8708'
route: 5.12.0.0/14
descr: RCS-RDS
origin: AS8708
mnt-by: RDS-MNT
created: 2012-05-03T12:08:36Z
last-modified: 2012-05-08T12:14:19Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.12.131.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.12.131.35. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 10:56:13 CST 2026
;; MSG SIZE rcvd: 104
35.131.12.5.in-addr.arpa domain name pointer 5-12-131-35.residential.rdsnet.ro.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
35.131.12.5.in-addr.arpa name = 5-12-131-35.residential.rdsnet.ro.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 170.130.187.14 | attack |
|
2020-10-06 07:12:36 |
| 5.124.28.234 | attackbotsspam | 445/tcp [2020-10-04]1pkt |
2020-10-06 07:07:30 |
| 165.232.43.17 | attackspambots | port |
2020-10-06 07:01:03 |
| 195.54.167.167 | attack | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-05T21:14:31Z and 2020-10-05T22:54:17Z |
2020-10-06 07:00:48 |
| 81.104.154.51 | attackbotsspam | Hits on port : 80(x3) 443(x2) 465(x2) 8080(x2) |
2020-10-06 07:17:37 |
| 182.151.32.144 | attackbots | Bruteforce detected by fail2ban |
2020-10-06 06:56:57 |
| 182.127.66.27 | attackbots | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=52928 . dstport=52869 . (3533) |
2020-10-06 07:31:09 |
| 139.198.122.19 | attackbotsspam | 2020-10-06T01:47:37.738892mail.standpoint.com.ua sshd[5918]: Failed password for root from 139.198.122.19 port 48554 ssh2 2020-10-06T01:49:56.963074mail.standpoint.com.ua sshd[6235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19 user=root 2020-10-06T01:49:59.178603mail.standpoint.com.ua sshd[6235]: Failed password for root from 139.198.122.19 port 59090 ssh2 2020-10-06T01:52:19.209054mail.standpoint.com.ua sshd[6583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19 user=root 2020-10-06T01:52:21.388833mail.standpoint.com.ua sshd[6583]: Failed password for root from 139.198.122.19 port 41398 ssh2 ... |
2020-10-06 07:20:07 |
| 94.107.1.247 | attack | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=64091 . dstport=445 SMB . (3534) |
2020-10-06 07:24:45 |
| 103.232.120.109 | attack | 2020-10-05T18:04:38.5577501495-001 sshd[14265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109 user=root 2020-10-05T18:04:41.3057901495-001 sshd[14265]: Failed password for root from 103.232.120.109 port 52326 ssh2 2020-10-05T18:08:41.4955201495-001 sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109 user=root 2020-10-05T18:08:43.6013711495-001 sshd[14502]: Failed password for root from 103.232.120.109 port 44702 ssh2 2020-10-05T18:12:41.8871911495-001 sshd[14686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109 user=root 2020-10-05T18:12:43.2752451495-001 sshd[14686]: Failed password for root from 103.232.120.109 port 37078 ssh2 ... |
2020-10-06 07:12:24 |
| 139.59.169.37 | attackbotsspam | 2020-10-05 10:48:51.019369-0500 localhost sshd[6050]: Failed password for root from 139.59.169.37 port 36660 ssh2 |
2020-10-06 07:27:52 |
| 65.184.202.228 | attackbotsspam | Hits on port : 23 |
2020-10-06 07:18:02 |
| 104.248.63.105 | attackspam |
|
2020-10-06 07:20:26 |
| 115.77.240.69 | attackbotsspam | Automatic report - Port Scan Attack |
2020-10-06 07:08:10 |
| 118.25.152.169 | attackspam | Oct 6 00:38:39 vps639187 sshd\[31930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169 user=root Oct 6 00:38:40 vps639187 sshd\[31930\]: Failed password for root from 118.25.152.169 port 60158 ssh2 Oct 6 00:44:36 vps639187 sshd\[32223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169 user=root ... |
2020-10-06 07:29:48 |