城市(city): unknown
省份(region): unknown
国家(country): The Netherlands
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '85.10.128.0 - 85.10.159.255'
% Abuse contact for '85.10.128.0 - 85.10.159.255' is 'abuse@transip.nl'
inetnum: 85.10.128.0 - 85.10.159.255
netname: NL-SIGNET-20050222
country: NL
org: ORG-SI6-RIPE
admin-c: IPRO1-RIPE
tech-c: SGNT1-RIPE
abuse-c: TBA24-RIPE
mnt-by: SIGNET-MNT
status: ASSIGNED PA
created: 2021-11-08T18:07:19Z
last-modified: 2021-11-08T18:07:19Z
source: RIPE
organisation: ORG-SI6-RIPE
org-name: Signet B.V.
country: NL
org-type: LIR
address: Achtseweg Zuid 241 B
address: 5651GW
address: Eindhoven
address: NETHERLANDS
phone: +31885999999
admin-c: AR22154-RIPE
admin-c: SNaA1-RIPE
admin-c: JS9938-RIPE
admin-c: RB1994-RIPE
abuse-c: SAD68-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: SIGNET-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SIGNET-MNT
created: 2004-04-17T11:43:17Z
last-modified: 2025-07-07T08:55:39Z
source: RIPE # Filtered
role: TransIP B.V. Admin
address: Vondellaan 47
address: 2332 AA Leiden
address: NL
remarks: -------------------------------------------------------
remarks: Network abuse reports: abuse@transip.nl
remarks: NOC and contact details: https://www.transip.nl/contact/
remarks: -------------------------------------------------------
phone: +31 71 524 1919
abuse-mailbox: abuse@transip.nl
admin-c: SJ7309-RIPE
tech-c: SJ7309-RIPE
nic-hdl: IPRO1-RIPE
mnt-by: TRANSIP-MNT
created: 2003-05-10T09:33:07Z
last-modified: 2023-09-07T09:15:01Z
source: RIPE # Filtered
role: Signet B.V. Technical Role Account
address: Signet B.V.
address: Science Park Eindhoven 5218
address: 5692 EG Son
address: The Netherlands
phone: +31 40 7074907
phone: +31 40 7074909
abuse-mailbox: abuse@signet.nl
admin-c: RB1994-RIPE
admin-c: JS9938-RIPE
tech-c: RB1994-RIPE
tech-c: JS9938-RIPE
remarks: ==========================================
remarks: Please send abuse mail to abuse@signet.nl,
remarks: technical issues to noc@signet.nl and
remarks: peering requests to peering@signet.nl.
remarks: ==========================================
nic-hdl: SGNT1-RIPE
mnt-by: SIGNET-MNT
created: 2014-04-03T08:32:01Z
last-modified: 2025-07-07T08:56:13Z
source: RIPE # Filtered
% Information related to '85.10.128.0/19AS20857'
route: 85.10.128.0/19
descr: TransIP BV
descr: Amsterdam, The Netherlands
origin: AS20857
mnt-by: TRANSIP-MNT
mnt-lower: TRANSIP-MNT
mnt-routes: TRANSIP-MNT
created: 2021-11-08T18:09:17Z
last-modified: 2021-11-08T18:09:17Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.1 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.10.141.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.10.141.72. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 07:29:55 CST 2026
;; MSG SIZE rcvd: 105
72.141.10.85.in-addr.arpa domain name pointer 85-10-141-72.colo.transip.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
72.141.10.85.in-addr.arpa name = 85-10-141-72.colo.transip.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.215.202.11 | attackspam | Sep 17 06:03:10 core sshd[22963]: Invalid user fbase from 186.215.202.11 port 43719 Sep 17 06:03:11 core sshd[22963]: Failed password for invalid user fbase from 186.215.202.11 port 43719 ssh2 ... |
2019-09-17 12:17:18 |
| 132.145.213.82 | attackspam | Sep 16 17:55:34 php1 sshd\[6807\]: Invalid user da from 132.145.213.82 Sep 16 17:55:34 php1 sshd\[6807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.213.82 Sep 16 17:55:37 php1 sshd\[6807\]: Failed password for invalid user da from 132.145.213.82 port 54384 ssh2 Sep 16 18:00:00 php1 sshd\[7223\]: Invalid user guishan from 132.145.213.82 Sep 16 18:00:00 php1 sshd\[7223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.213.82 |
2019-09-17 12:03:20 |
| 223.202.201.138 | attackbots | $f2bV_matches |
2019-09-17 12:07:56 |
| 51.83.77.224 | attackbotsspam | Sep 16 18:09:13 aiointranet sshd\[8985\]: Invalid user zhouh from 51.83.77.224 Sep 16 18:09:13 aiointranet sshd\[8985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=224.ip-51-83-77.eu Sep 16 18:09:15 aiointranet sshd\[8985\]: Failed password for invalid user zhouh from 51.83.77.224 port 54542 ssh2 Sep 16 18:13:23 aiointranet sshd\[9305\]: Invalid user admin from 51.83.77.224 Sep 16 18:13:23 aiointranet sshd\[9305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=224.ip-51-83-77.eu |
2019-09-17 12:17:56 |
| 218.4.239.146 | attack | SASL broute force |
2019-09-17 11:59:37 |
| 150.161.8.120 | attackbots | Automatic report - Banned IP Access |
2019-09-17 11:41:26 |
| 41.43.10.64 | attackbotsspam | Sep 16 22:27:50 fr01 sshd[11746]: Invalid user supervisor from 41.43.10.64 Sep 16 22:27:50 fr01 sshd[11746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.43.10.64 Sep 16 22:27:50 fr01 sshd[11746]: Invalid user supervisor from 41.43.10.64 Sep 16 22:27:51 fr01 sshd[11746]: Failed password for invalid user supervisor from 41.43.10.64 port 42757 ssh2 Sep 16 22:27:50 fr01 sshd[11746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.43.10.64 Sep 16 22:27:50 fr01 sshd[11746]: Invalid user supervisor from 41.43.10.64 Sep 16 22:27:51 fr01 sshd[11746]: Failed password for invalid user supervisor from 41.43.10.64 port 42757 ssh2 Sep 16 22:27:53 fr01 sshd[11746]: Failed password for invalid user supervisor from 41.43.10.64 port 42757 ssh2 ... |
2019-09-17 11:36:47 |
| 190.136.91.149 | attackspam | Sep 16 23:58:56 plusreed sshd[28483]: Invalid user adminuser from 190.136.91.149 ... |
2019-09-17 12:13:22 |
| 190.236.250.182 | attackspam | Brute forcing RDP port 3389 |
2019-09-17 12:19:05 |
| 106.12.83.135 | attackspambots | 2019-09-17T00:41:43.388857mizuno.rwx.ovh sshd[181618]: Connection from 106.12.83.135 port 56788 on 78.46.61.178 port 22 2019-09-17T00:41:44.868458mizuno.rwx.ovh sshd[181618]: Invalid user pao from 106.12.83.135 port 56788 2019-09-17T00:41:44.879959mizuno.rwx.ovh sshd[181618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.135 2019-09-17T00:41:43.388857mizuno.rwx.ovh sshd[181618]: Connection from 106.12.83.135 port 56788 on 78.46.61.178 port 22 2019-09-17T00:41:44.868458mizuno.rwx.ovh sshd[181618]: Invalid user pao from 106.12.83.135 port 56788 2019-09-17T00:41:47.120381mizuno.rwx.ovh sshd[181618]: Failed password for invalid user pao from 106.12.83.135 port 56788 ssh2 ... |
2019-09-17 11:52:35 |
| 106.12.56.143 | attack | Sep 16 17:55:16 aiointranet sshd\[7795\]: Invalid user tom from 106.12.56.143 Sep 16 17:55:16 aiointranet sshd\[7795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143 Sep 16 17:55:18 aiointranet sshd\[7795\]: Failed password for invalid user tom from 106.12.56.143 port 57854 ssh2 Sep 16 17:58:32 aiointranet sshd\[8056\]: Invalid user jwgblog from 106.12.56.143 Sep 16 17:58:32 aiointranet sshd\[8056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143 |
2019-09-17 12:02:21 |
| 54.37.254.57 | attackbots | F2B jail: sshd. Time: 2019-09-17 05:42:01, Reported by: VKReport |
2019-09-17 11:44:14 |
| 213.32.122.83 | attack | Sep 17 05:41:20 host proftpd\[57498\]: 0.0.0.0 \(213.32.122.83\[213.32.122.83\]\) - USER anonymous: no such user found from 213.32.122.83 \[213.32.122.83\] to 62.210.146.38:21 ... |
2019-09-17 12:08:56 |
| 195.69.132.55 | attackbots | Sep 17 05:53:09 markkoudstaal sshd[18678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.132.55 Sep 17 05:53:11 markkoudstaal sshd[18678]: Failed password for invalid user mysql from 195.69.132.55 port 50480 ssh2 Sep 17 05:57:09 markkoudstaal sshd[19134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.132.55 |
2019-09-17 12:03:00 |
| 51.89.62.192 | attackbotsspam | Sep 17 03:43:18 localhost sshd\[128399\]: Invalid user passfeel from 51.89.62.192 port 49324 Sep 17 03:43:18 localhost sshd\[128399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.62.192 Sep 17 03:43:20 localhost sshd\[128399\]: Failed password for invalid user passfeel from 51.89.62.192 port 49324 ssh2 Sep 17 03:46:58 localhost sshd\[128517\]: Invalid user alfresco from 51.89.62.192 port 37206 Sep 17 03:46:58 localhost sshd\[128517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.62.192 ... |
2019-09-17 11:54:59 |