城市(city): Edinburgh
省份(region): Scotland
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '82.43.208.0 - 82.43.223.255'
% Abuse contact for '82.43.208.0 - 82.43.223.255' is 'abuse@virginmediao2.co.uk'
inetnum: 82.43.208.0 - 82.43.223.255
netname: VMCBBUK
descr: SOUTH GYLE
country: GB
admin-c: NNMC1-RIPE
tech-c: NNMC1-RIPE
status: ASSIGNED PA
mnt-by: AS5089-MNT
remarks: Virgin Media Consumer Broadband UK
remarks: Report Abuse via http://www.virginmedia.com/netreport
created: 2023-06-21T15:06:12Z
last-modified: 2023-06-21T15:06:12Z
source: RIPE # Filtered
role: Virgin Media Network Management Centre
org: ORG-CIL2-RIPE
address: Virgin Media
address: 500 Brook Drive Green Park
address: Reading
address: Berkshire
address: RG2 6UU
admin-c: IPAM2-RIPE
tech-c: IPAM2-RIPE
nic-hdl: NNMC1-RIPE
mnt-by: AS5089-MNT
created: 2002-09-13T13:38:42Z
last-modified: 2019-12-19T16:18:20Z
source: RIPE # Filtered
% Information related to '82.43.0.0/16as5089'
route: 82.43.0.0/16
origin: as5089
mnt-by: AS5089-MNT
mnt-by: AS5462-MNT
created: 2023-06-20T13:32:19Z
last-modified: 2023-06-20T13:32:19Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.43.219.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.43.219.254. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040701 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 02:45:17 CST 2026
;; MSG SIZE rcvd: 106
254.219.43.82.in-addr.arpa domain name pointer sgyl-37-b2-v4wan-168053-cust3069.vm6.cable.virginm.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.219.43.82.in-addr.arpa name = sgyl-37-b2-v4wan-168053-cust3069.vm6.cable.virginm.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.236.79.188 | attackspambots | 37215/tcp [2019-06-25]1pkt |
2019-06-26 08:14:32 |
| 181.174.49.130 | attackbots | 37215/tcp [2019-06-25]1pkt |
2019-06-26 08:21:54 |
| 198.108.67.37 | attackspambots | 211/tcp 8084/tcp 8002/tcp... [2019-04-26/06-25]131pkt,125pt.(tcp) |
2019-06-26 08:11:28 |
| 37.189.70.118 | attack | 2019-06-25T21:46:26.858881scmdmz1 sshd\[4008\]: Invalid user nei from 37.189.70.118 port 36382 2019-06-25T21:46:26.861708scmdmz1 sshd\[4008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.189.70.118 2019-06-25T21:46:28.880924scmdmz1 sshd\[4008\]: Failed password for invalid user nei from 37.189.70.118 port 36382 ssh2 ... |
2019-06-26 08:09:52 |
| 104.236.31.227 | attackbotsspam | Invalid user jens from 104.236.31.227 port 59892 |
2019-06-26 08:13:31 |
| 190.114.240.50 | attack | port scan and connect, tcp 5984 (couchdb) |
2019-06-26 08:40:52 |
| 132.232.2.184 | attack | Jun 26 00:12:20 mail sshd\[5735\]: Invalid user filter from 132.232.2.184 Jun 26 00:12:20 mail sshd\[5735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.184 Jun 26 00:12:22 mail sshd\[5735\]: Failed password for invalid user filter from 132.232.2.184 port 13816 ssh2 ... |
2019-06-26 08:37:46 |
| 185.176.27.90 | attackspambots | firewall-block, port(s): 12879/tcp, 27607/tcp |
2019-06-26 08:30:15 |
| 107.170.195.246 | attack | Automatic report - Web App Attack |
2019-06-26 08:42:56 |
| 131.221.80.150 | attack | Invalid user dpi from 131.221.80.150 port 29377 |
2019-06-26 08:22:52 |
| 37.97.242.240 | attack | TCP src-port=39956 dst-port=25 dnsbl-sorbs abuseat-org spamcop (1191) |
2019-06-26 08:07:08 |
| 185.176.27.118 | attackspam | 26.06.2019 00:21:28 Connection to port 1050 blocked by firewall |
2019-06-26 08:38:40 |
| 24.244.157.7 | attackspam | Unauthorized connection attempt from IP address 24.244.157.7 on Port 445(SMB) |
2019-06-26 08:48:16 |
| 190.103.182.158 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-25 17:10:39,843 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.103.182.158) |
2019-06-26 08:36:12 |
| 203.210.244.139 | attackspambots | Unauthorized connection attempt from IP address 203.210.244.139 on Port 445(SMB) |
2019-06-26 08:17:28 |