城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): Vodafone
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '80.174.220.0 - 80.174.223.255'
% Abuse contact for '80.174.220.0 - 80.174.223.255' is 'tech@grupo-ion.es'
inetnum: 80.174.220.0 - 80.174.223.255
netname: US-EUROPEAN-NET
country: US
org: ORG-EIIG1-RIPE
admin-c: SCH32-RIPE
tech-c: SCH32-RIPE
status: SUB-ALLOCATED PA
mnt-by: lir-es-european-1-MNT
mnt-by: mnt-es-airenetworks-1
created: 2026-02-13T14:15:26Z
last-modified: 2026-02-13T14:15:26Z
source: RIPE
geofeed: https://grupo-ion.es/geofeed.csv
remarks: Geofeed https://grupo-ion.es/geofeed.csv
geoloc: 39.0438 -77.487
organisation: ORG-EIIG1-RIPE
org-name: European ION Investment Group SL
country: ES
org-type: LIR
address: C/ JUAN DE LA CIERVA 27 Bl.4 1 A - ELCHE PARQUE EMPRESARIAL
address: 03203
address: Elche
address: SPAIN
phone: +34865660151
admin-c: TS41062-RIPE
tech-c: TS41062-RIPE
abuse-c: AR65469-RIPE
mnt-ref: lir-es-european-1-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-es-european-1-MNT
created: 2021-10-06T07:52:44Z
last-modified: 2025-03-12T12:36:52Z
source: RIPE # Filtered
role: Strictly Cloud Hostmaster
address: 24A Trolley Square # 1430
address: Wilmington DE 19806-3334
address: USA
nic-hdl: SCH32-RIPE
mnt-by: MANITU-MNT
created: 2024-09-03T06:09:03Z
last-modified: 2024-09-03T06:09:03Z
source: RIPE # Filtered
% Information related to '80.174.220.0/22AS3949'
route: 80.174.220.0/22
descr: Strictly
origin: AS3949
mnt-by: lir-es-european-1-MNT
mnt-by: mnt-es-airenetworks-1
created: 2026-02-13T14:08:01Z
last-modified: 2026-02-13T14:08:01Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.174.222.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.174.222.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031200 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 16:55:04 CST 2026
;; MSG SIZE rcvd: 107
Host 112.222.174.80.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 112.222.174.80.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 43.227.68.26 | attackspambots | Automatic report - Banned IP Access |
2019-08-08 05:31:41 |
| 180.126.235.225 | attackspambots | Automatic report - Port Scan Attack |
2019-08-08 05:27:59 |
| 104.206.128.22 | attack | firewall-block, port(s): 21/tcp |
2019-08-08 05:18:54 |
| 195.154.86.34 | attackbotsspam | GET /pma/scripts/setup.php HTTP/1.1 |
2019-08-08 05:13:35 |
| 222.122.31.133 | attackspambots | 2019-08-07T20:27:02.893354abusebot-7.cloudsearch.cf sshd\[6903\]: Invalid user joshua from 222.122.31.133 port 43650 |
2019-08-08 04:51:10 |
| 144.217.164.104 | attackspam | Automatic report - Banned IP Access |
2019-08-08 05:11:52 |
| 61.114.217.72 | attack | 61.114.217.72 [07/Aug/2019:13:33:59 +0100] "GET /phpmyadmin2011/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:33:59 +0100] "GET /phpmyadmin2012/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2013/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2014/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:00 +0100] "GET /phpmyadmin2015/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:01 +0100] "GET /phpmyadmin2016/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:01 +0100] "GET /phpmyadmin2017/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:02 +0100] "GET /phpmyadmin2018/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:02 +0100] "GET /phpmyadmin2019/index.php?lang=en HTTP/1.1" 61.114.217.72 [07/Aug/2019:13:34:03 +0100] "GET /index.php?lang=en HTTP/1.1" |
2019-08-08 05:10:50 |
| 81.44.65.195 | attackbotsspam | ssh intrusion attempt |
2019-08-08 05:24:40 |
| 95.110.227.199 | attack | Hacking script: 95.110.227.199 - - [06/Aug/2019:19:41:58 +0100] "GET /muieblackcat HTTP/1.1" 404 544 "-" "-" |
2019-08-08 05:36:12 |
| 144.217.85.183 | attackspambots | Aug 7 19:38:53 ncomp sshd[30723]: Invalid user shane from 144.217.85.183 Aug 7 19:38:53 ncomp sshd[30723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.85.183 Aug 7 19:38:53 ncomp sshd[30723]: Invalid user shane from 144.217.85.183 Aug 7 19:38:55 ncomp sshd[30723]: Failed password for invalid user shane from 144.217.85.183 port 58272 ssh2 |
2019-08-08 05:35:54 |
| 218.92.1.130 | attack | SSH Brute Force, server-1 sshd[28600]: Failed password for root from 218.92.1.130 port 28529 ssh2 |
2019-08-08 05:14:51 |
| 49.88.112.69 | attackspam | Failed password for root from 49.88.112.69 port 39364 ssh2 Failed password for root from 49.88.112.69 port 39364 ssh2 Failed password for root from 49.88.112.69 port 39364 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69 user=root Failed password for root from 49.88.112.69 port 62188 ssh2 |
2019-08-08 05:24:21 |
| 209.141.44.238 | attack | Automatic report - Banned IP Access |
2019-08-08 04:57:47 |
| 185.175.93.105 | attackbots | 08/07/2019-16:33:44.246115 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-08 05:18:01 |
| 134.209.189.224 | attackspambots | Aug 7 22:41:02 microserver sshd[30672]: Invalid user pe from 134.209.189.224 port 46218 Aug 7 22:41:02 microserver sshd[30672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224 Aug 7 22:41:04 microserver sshd[30672]: Failed password for invalid user pe from 134.209.189.224 port 46218 ssh2 Aug 7 22:45:18 microserver sshd[31448]: Invalid user cedric from 134.209.189.224 port 45920 Aug 7 22:45:18 microserver sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224 Aug 7 22:57:42 microserver sshd[33516]: Invalid user rajesh from 134.209.189.224 port 42168 Aug 7 22:57:42 microserver sshd[33516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.189.224 Aug 7 22:57:44 microserver sshd[33516]: Failed password for invalid user rajesh from 134.209.189.224 port 42168 ssh2 Aug 7 23:01:54 microserver sshd[34328]: Invalid user gilberto from 134.209.189.22 |
2019-08-08 05:27:33 |