城市(city): Vantaa
省份(region): Uusimaa [Finnish] / Nyland [Swedish]
国家(country): Finland
运营商(isp): DNA
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '62.197.160.0 - 62.197.191.255'
% Abuse contact for '62.197.160.0 - 62.197.191.255' is 'abuse@dnaip.fi'
inetnum: 62.197.160.0 - 62.197.191.255
netname: FI-DNA-20020320
country: FI
org: ORG-FNL1-RIPE
admin-c: DNAR-RIPE
tech-c: DNAR-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: FI2G-MNT
mnt-lower: FI2G-MNT
mnt-routes: FI2G-MNT
created: 2002-03-20T09:59:42Z
last-modified: 2016-07-14T13:24:14Z
source: RIPE # Filtered
organisation: ORG-FNL1-RIPE
org-name: DNA Oyj
country: FI
org-type: LIR
address: P.O. BOX 10
address: FI-01044 DNA
address: Helsinki
address: FINLAND
phone: +358440440
fax-no: +358290996292
admin-c: DNA999-RIPE
abuse-c: DNAR-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: FI2G-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: FI2G-MNT
created: 2004-04-17T11:20:32Z
last-modified: 2020-12-16T13:18:15Z
source: RIPE # Filtered
role: DNA Registry
address: DNA Oyj
address: PL 10
address: 01044 DNA
address: Finland
admin-c: DNA999-RIPE
tech-c: DNA999-RIPE
nic-hdl: DNAR-RIPE
abuse-mailbox: abuse@dnaip.fi
mnt-by: FI2G-MNT
created: 2008-01-21T13:04:15Z
last-modified: 2016-12-09T09:13:24Z
source: RIPE # Filtered
% Information related to '62.197.160.0/19AS16086'
route: 62.197.160.0/19
descr: DNA Oy
origin: AS16086
mnt-by: FI2G-MNT
created: 2002-03-21T18:10:40Z
last-modified: 2011-01-12T08:28:54Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.197.169.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;62.197.169.166. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032900 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 18:21:24 CST 2026
;; MSG SIZE rcvd: 107
166.169.197.62.in-addr.arpa domain name pointer 62-197-169-166.rev.dnainternet.fi.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
166.169.197.62.in-addr.arpa name = 62-197-169-166.rev.dnainternet.fi.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.114.97.209 | attackbots | Dec 27 07:52:41 legacy sshd[19959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.97.209 Dec 27 07:52:43 legacy sshd[19959]: Failed password for invalid user mysql from 167.114.97.209 port 49490 ssh2 Dec 27 07:55:33 legacy sshd[20045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.97.209 ... |
2019-12-27 17:48:13 |
| 103.99.155.250 | attackspam | Host Scan |
2019-12-27 17:44:23 |
| 92.118.160.37 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-27 17:57:33 |
| 209.17.97.18 | attackspambots | Unauthorized connection attempt detected from IP address 209.17.97.18 to port 8888 |
2019-12-27 17:47:08 |
| 218.92.0.172 | attackbotsspam | Dec 27 10:30:52 ns3042688 sshd\[19604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172 user=root Dec 27 10:30:54 ns3042688 sshd\[19604\]: Failed password for root from 218.92.0.172 port 52081 ssh2 Dec 27 10:30:56 ns3042688 sshd\[19604\]: Failed password for root from 218.92.0.172 port 52081 ssh2 Dec 27 10:31:00 ns3042688 sshd\[19604\]: Failed password for root from 218.92.0.172 port 52081 ssh2 Dec 27 10:31:03 ns3042688 sshd\[19604\]: Failed password for root from 218.92.0.172 port 52081 ssh2 ... |
2019-12-27 17:43:39 |
| 116.196.120.101 | attackbotsspam | Dec 27 10:25:02 srv-ubuntu-dev3 sshd[115470]: Invalid user csgoserver from 116.196.120.101 Dec 27 10:25:02 srv-ubuntu-dev3 sshd[115470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.120.101 Dec 27 10:25:02 srv-ubuntu-dev3 sshd[115470]: Invalid user csgoserver from 116.196.120.101 Dec 27 10:25:03 srv-ubuntu-dev3 sshd[115470]: Failed password for invalid user csgoserver from 116.196.120.101 port 47879 ssh2 Dec 27 10:28:36 srv-ubuntu-dev3 sshd[115749]: Invalid user Administrator from 116.196.120.101 Dec 27 10:28:36 srv-ubuntu-dev3 sshd[115749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.120.101 Dec 27 10:28:36 srv-ubuntu-dev3 sshd[115749]: Invalid user Administrator from 116.196.120.101 Dec 27 10:28:39 srv-ubuntu-dev3 sshd[115749]: Failed password for invalid user Administrator from 116.196.120.101 port 59537 ssh2 Dec 27 10:32:11 srv-ubuntu-dev3 sshd[116047]: Invalid user lturpin from 1 ... |
2019-12-27 17:44:54 |
| 122.179.133.6 | attack | Unauthorized connection attempt detected from IP address 122.179.133.6 to port 445 |
2019-12-27 17:58:20 |
| 190.153.249.99 | attack | no |
2019-12-27 17:41:13 |
| 139.59.80.65 | attack | Dec 27 09:39:23 localhost sshd\[1350\]: Invalid user lynda from 139.59.80.65 port 42180 Dec 27 09:39:23 localhost sshd\[1350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65 Dec 27 09:39:26 localhost sshd\[1350\]: Failed password for invalid user lynda from 139.59.80.65 port 42180 ssh2 |
2019-12-27 17:45:31 |
| 63.33.164.10 | attack | Host Scan |
2019-12-27 17:58:52 |
| 51.15.95.127 | attackspam | SSH Brute Force, server-1 sshd[572]: Failed password for root from 51.15.95.127 port 45966 ssh2 |
2019-12-27 17:59:24 |
| 202.72.204.226 | attackspambots | Dec 27 10:33:53 lnxweb61 sshd[23941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.204.226 Dec 27 10:33:53 lnxweb61 sshd[23941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.204.226 |
2019-12-27 18:10:20 |
| 94.53.53.47 | attackspam | Port 22 Scan, PTR: None |
2019-12-27 18:04:52 |
| 46.40.119.104 | attackspam | 1577427996 - 12/27/2019 07:26:36 Host: iliq.dbr.ddns.bulsat.com/46.40.119.104 Port: 27015 UDP Blocked |
2019-12-27 17:55:51 |
| 51.89.151.214 | attack | Dec 27 07:53:09 jane sshd[24088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.151.214 Dec 27 07:53:11 jane sshd[24088]: Failed password for invalid user wattier from 51.89.151.214 port 36958 ssh2 ... |
2019-12-27 17:49:39 |