城市(city): Stockholm
省份(region): Stockholms
国家(country): Sweden
运营商(isp): Tele2
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '80.217.96.0 - 80.217.111.255'
% Abuse contact for '80.217.96.0 - 80.217.111.255' is 'abuse@tele2.com'
inetnum: 80.217.96.0 - 80.217.111.255
netname: SE-TELE2-CABLE-CUSTOMER
country: SE
admin-c: SWIP-RIPE
tech-c: SWIP-RIPE
status: ASSIGNED PA
mnt-by: COMHEM-MNT
created: 2018-09-04T08:53:34Z
last-modified: 2021-04-27T05:31:45Z
source: RIPE
role: Swipnet Staff
address: Tele2 AB/Swedish IP Network
address: IP Registry
address: Torshamnsgatan 17 164 40 Kista SWEDEN
fax-no: +46 8 5626 42 10
abuse-mailbox: abuse@tele2.com
remarks: The database object describes the staff of SWIPNET LIR.
admin-c: ROSI3-RIPE
admin-c: TH6544-RIPE
tech-c: ROSI3-RIPE
tech-c: TH6544-RIPE
nic-hdl: SWIP-RIPE
mnt-by: SWIPNET-LIR-MNT
created: 2002-03-21T14:25:04Z
last-modified: 2022-11-23T10:36:53Z
source: RIPE # Filtered
% Information related to '80.216.0.0/15AS1257'
route: 80.216.0.0/15
origin: AS1257
mnt-by: AS1257-MNT
created: 2021-07-13T10:14:08Z
last-modified: 2021-07-13T10:14:08Z
source: RIPE
% Information related to '80.216.0.0/15AS39651'
route: 80.216.0.0/15
descr: Com Hem AB
origin: AS39651
mnt-by: COMHEM-MNT
created: 2006-10-25T11:55:24Z
last-modified: 2008-05-05T19:51:40Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.217.106.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.217.106.60. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 05:30:07 CST 2026
;; MSG SIZE rcvd: 106
60.106.217.80.in-addr.arpa domain name pointer c80-217-106-60.bredband.tele2.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
60.106.217.80.in-addr.arpa name = c80-217-106-60.bredband.tele2.se.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.231.93.130 | attackspambots | Jul 21 15:03:27 Invalid user wxx from 152.231.93.130 port 7076 |
2020-07-21 22:15:43 |
| 202.131.234.226 | attack | Unauthorized connection attempt from IP address 202.131.234.226 on Port 445(SMB) |
2020-07-21 22:30:41 |
| 197.50.105.85 | attackbotsspam | Unauthorized connection attempt from IP address 197.50.105.85 on Port 445(SMB) |
2020-07-21 22:42:15 |
| 104.236.100.228 | attackbotsspam | 104.236.100.228 - - [21/Jul/2020:15:01:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" 104.236.100.228 - - [21/Jul/2020:15:01:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" ... |
2020-07-21 22:24:36 |
| 46.229.168.163 | attackspambots | Automatic report - Banned IP Access |
2020-07-21 22:47:05 |
| 20.52.51.9 | attack | W 31101,/var/log/nginx/access.log,-,- |
2020-07-21 22:28:53 |
| 210.151.176.198 | attackbots | Unauthorized connection attempt detected from IP address 210.151.176.198 to port 23 [T] |
2020-07-21 22:58:51 |
| 72.44.21.237 | attack | Unauthorized connection attempt from IP address 72.44.21.237 on Port 445(SMB) |
2020-07-21 22:32:34 |
| 192.99.168.9 | attack | Jul 21 14:27:13 onepixel sshd[2438060]: Invalid user sanchit from 192.99.168.9 port 42624 Jul 21 14:27:13 onepixel sshd[2438060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.168.9 Jul 21 14:27:13 onepixel sshd[2438060]: Invalid user sanchit from 192.99.168.9 port 42624 Jul 21 14:27:15 onepixel sshd[2438060]: Failed password for invalid user sanchit from 192.99.168.9 port 42624 ssh2 Jul 21 14:31:43 onepixel sshd[2440283]: Invalid user admin from 192.99.168.9 port 58186 |
2020-07-21 22:35:24 |
| 157.47.47.115 | attackspambots | Unauthorized connection attempt from IP address 157.47.47.115 on Port 445(SMB) |
2020-07-21 22:44:24 |
| 35.226.241.164 | attackbotsspam | 35.226.241.164 - - [21/Jul/2020:15:01:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" 35.226.241.164 - - [21/Jul/2020:15:01:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" ... |
2020-07-21 22:25:34 |
| 139.162.99.243 | attack | Unauthorized connection attempt detected from IP address 139.162.99.243 to port 102 [T] |
2020-07-21 23:02:37 |
| 95.173.190.4 | attackbotsspam | 95.173.190.4 - - [21/Jul/2020:15:00:51 +0200] "POST /xmlrpc.php HTTP/2.0" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" 95.173.190.4 - - [21/Jul/2020:15:00:52 +0200] "POST /xmlrpc.php HTTP/2.0" 403 1026 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" ... |
2020-07-21 22:36:40 |
| 49.232.162.235 | attack | $f2bV_matches |
2020-07-21 22:49:40 |
| 213.152.161.234 | attackspam | Unauthorized IMAP connection attempt |
2020-07-21 22:23:59 |