城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '82.206.128.0 - 82.206.255.255'
% Abuse contact for '82.206.128.0 - 82.206.255.255' is 'abuse@intelsat.com'
inetnum: 82.206.128.0 - 82.206.255.255
netname: UK-INTELSAT-20031126
country: GB
org: ORG-IA67-RIPE
admin-c: IRA4-RIPE
abuse-c: AA33918-RIPE
tech-c: IRTC1-RIPE
tech-c: RP15107-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS22351-MNT
mnt-routes: AS22351-MNT
created: 2003-11-26T11:50:40Z
last-modified: 2021-07-27T17:54:52Z
source: RIPE # Filtered
organisation: ORG-IA67-RIPE
org-name: Intelsat Global Sales & Marketing LTD
country: GB
org-type: LIR
address: Building 5, Chiswick Park, Chiswick High Road
address: W4 5YF
address: London
address: UNITED KINGDOM
phone: +44 20-3036-6700
phone: +1 404 381 2900
fax-no: +1 404 381 2596
reg-nr: 04098445
abuse-c: AR17721-RIPE
mnt-ref: AS22351-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: AS22351-MNT
admin-c: RP15107-RIPE
admin-c: SB29124-RIPE
admin-c: IRTC1-RIPE
admin-c: IRA4-RIPE
created: 2004-04-17T12:16:19Z
last-modified: 2026-04-29T05:24:26Z
source: RIPE # Filtered
role: Intelsat Ripe Admin
address: Intelsat Global Service Corporation
address: 7900 Tysons One Place
address: Mclean, VA
address: 22102-5972
address: USA
admin-c: RR13552-RIPE
admin-c: RP15107-RIPE
admin-c: SB29124-RIPE
admin-c: DW5753-RIPE
admin-c: MF20540-RIPE
admin-c: WJ1271-RIPE
abuse-mailbox: ABUSE@INTELSAT.COM
nic-hdl: IRA4-RIPE
mnt-by: AS22351-MNT
remarks:
remarks: *************************************************************
remarks: * *
remarks: * This is a generic ROLE object for an Intelsat Admin *
remarks: * Contact person for RIPE matters. Inquiries about RIPE *
remarks: * issues should be directed to the NOC-DATA@INTELSAT.COM email-box. For *
remarks: * operational issues, send an Email or call *
remarks: * the Intelsat NOC at: *
remarks: * *
remarks: * NOC-DATA@intelsat.com *
remarks: * +1 404 381 2900 *
remarks: * *
remarks: * For issues of network abuse, including spam, please send *
remarks: * email to Intelsat at: *
remarks: * *
remarks: *abuse@intelsat.com *
remarks: * *
remarks: *************************************************************
remarks:
created: 2002-04-25T17:29:20Z
last-modified: 2023-06-19T14:40:02Z
source: RIPE # Filtered
role: Intelsat RIPE Technical Contact
address: Intelsat Global Service Corporation
address: 7900 Tysons One Place
address: Mclean , VA
address: 22102-5972
address: USA
abuse-mailbox: ABUSE@INTELSAT.COM
admin-c: IRA4-RIPE
tech-c: SB29124-RIPE
tech-c: DW5753-RIPE
tech-c: MF20540-RIPE
tech-c: RR13552-RIPE
nic-hdl: IRTC1-RIPE
mnt-by: AS22351-MNT
remarks:
remarks: *************************************************************
remarks: * *
remarks: * This is a generic ROLE object for an Intelsat Technical *
remarks: * Contact person for RIPE matters. Inquiries about RIPE *
remarks: * issues should be directed to NOC-ENG-DATA@INTELSAT.COM.*
remarks: * for operational issues, send an Email or call *
remarks: * the Intelsat NOC at: *
remarks: * *
remarks: * NOC-DATA@intelsat.com *
remarks: * +1 404 381 2828 *
remarks: * *
remarks: * For issues of network abuse, including spam, please send *
remarks: * email to Intelsat at: *
remarks: * *
remarks: * ABUSE@intelsat.com *
remarks: * *
remarks: *************************************************************
remarks:
remarks:
created: 2002-03-07T17:47:02Z
last-modified: 2023-06-19T14:41:52Z
source: RIPE # Filtered
person: Russell Payne
address: 2857 Fork Creek Church Road, , Ellenwood United States
phone: +1-404-381-2714
nic-hdl: RP15107-RIPE
mnt-by: AS22351-MNT
created: 2018-09-17T17:03:27Z
last-modified: 2018-10-31T17:58:47Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.122 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.206.254.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.206.254.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050301 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 11:07:34 CST 2026
;; MSG SIZE rcvd: 107
Host 139.254.206.82.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.254.206.82.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.6.101.234 | attackspambots | firewall-block, port(s): 8080/tcp |
2020-03-08 06:40:58 |
| 180.250.115.121 | attackbotsspam | Mar 7 17:20:29 Tower sshd[38115]: Connection from 180.250.115.121 port 51220 on 192.168.10.220 port 22 rdomain "" Mar 7 17:20:31 Tower sshd[38115]: Invalid user ts3 from 180.250.115.121 port 51220 Mar 7 17:20:31 Tower sshd[38115]: error: Could not get shadow information for NOUSER Mar 7 17:20:31 Tower sshd[38115]: Failed password for invalid user ts3 from 180.250.115.121 port 51220 ssh2 Mar 7 17:20:32 Tower sshd[38115]: Received disconnect from 180.250.115.121 port 51220:11: Bye Bye [preauth] Mar 7 17:20:32 Tower sshd[38115]: Disconnected from invalid user ts3 180.250.115.121 port 51220 [preauth] |
2020-03-08 06:38:24 |
| 212.64.109.175 | attackbotsspam | Mar 7 23:09:44 jane sshd[24300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.109.175 Mar 7 23:09:46 jane sshd[24300]: Failed password for invalid user vnc from 212.64.109.175 port 46356 ssh2 ... |
2020-03-08 06:52:27 |
| 167.114.103.140 | attackspambots | Mar 7 23:03:24 xeon sshd[12210]: Failed password for root from 167.114.103.140 port 37566 ssh2 |
2020-03-08 06:46:08 |
| 2a00:d640:d640:9999::2eeb:2a2c | attackbotsspam | 2a00:d640:d640:9999::2eeb:2a2c - - [08/Mar/2020:01:10:00 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-03-08 06:48:14 |
| 128.199.220.232 | attack | 20 attempts against mh-ssh on cloud |
2020-03-08 06:49:43 |
| 218.92.0.203 | attackspam | 2020-03-07T23:05:29.619191vps751288.ovh.net sshd\[20525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root 2020-03-07T23:05:32.078183vps751288.ovh.net sshd\[20525\]: Failed password for root from 218.92.0.203 port 42222 ssh2 2020-03-07T23:05:33.871847vps751288.ovh.net sshd\[20525\]: Failed password for root from 218.92.0.203 port 42222 ssh2 2020-03-07T23:05:35.610366vps751288.ovh.net sshd\[20525\]: Failed password for root from 218.92.0.203 port 42222 ssh2 2020-03-07T23:10:11.049879vps751288.ovh.net sshd\[20561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root |
2020-03-08 06:41:54 |
| 183.80.230.208 | attackbotsspam | Sat Mar 7 15:10:44 2020 - Child process 400129 handling connection Sat Mar 7 15:10:44 2020 - New connection from: 183.80.230.208:54663 Sat Mar 7 15:10:44 2020 - Sending data to client: [Login: ] Sat Mar 7 15:11:15 2020 - Child aborting Sat Mar 7 15:11:15 2020 - Reporting IP address: 183.80.230.208 - mflag: 0 |
2020-03-08 06:29:51 |
| 185.175.93.25 | attackbotsspam | 03/07/2020-17:10:12.146608 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-08 06:40:28 |
| 119.235.30.89 | attackbots | Lines containing failures of 119.235.30.89 Mar 3 07:02:39 keyhelp sshd[30950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.30.89 user=r.r Mar 3 07:02:41 keyhelp sshd[30950]: Failed password for r.r from 119.235.30.89 port 36448 ssh2 Mar 3 07:02:51 keyhelp sshd[30950]: Received disconnect from 119.235.30.89 port 36448:11: Normal Shutdown [preauth] Mar 3 07:02:51 keyhelp sshd[30950]: Disconnected from authenticating user r.r 119.235.30.89 port 36448 [preauth] Mar 3 07:10:21 keyhelp sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.30.89 user=mysql Mar 3 07:10:23 keyhelp sshd[32596]: Failed password for mysql from 119.235.30.89 port 46650 ssh2 Mar 3 07:10:23 keyhelp sshd[32596]: Received disconnect from 119.235.30.89 port 46650:11: Normal Shutdown [preauth] Mar 3 07:10:23 keyhelp sshd[32596]: Disconnected from authenticating user mysql 119.235.30.89 port ........ ------------------------------ |
2020-03-08 07:03:00 |
| 186.226.160.227 | attackbotsspam | Port probing on unauthorized port 445 |
2020-03-08 06:36:33 |
| 36.227.127.57 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-08 06:45:06 |
| 170.80.240.27 | attackbots | CMS (WordPress or Joomla) login attempt. |
2020-03-08 06:44:45 |
| 139.59.41.154 | attack | $f2bV_matches |
2020-03-08 06:21:15 |
| 60.251.80.76 | attack | firewall-block, port(s): 1433/tcp |
2020-03-08 06:44:23 |