城市(city): Kremenchuk
省份(region): Poltava
国家(country): Ukraine
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '87.244.128.0 - 87.244.159.255'
% Abuse contact for '87.244.128.0 - 87.244.159.255' is 'abuse@satel.net.ua'
inetnum: 87.244.128.0 - 87.244.159.255
netname: SATELLITE-CUSTOMER-NET1
descr: FTTB Network Dynamic IP Range
descr: ISP Satellite
descr: Kremenchug, Poltava region, Ukraine
country: UA
org: ORG-SL209-RIPE
admin-c: SNOC
tech-c: SNOC
status: ASSIGNED PA
mnt-lower: SATELLITE-MNT
mnt-by: SATELLITE-MNT
created: 2009-03-10T12:20:13Z
last-modified: 2017-01-11T14:03:55Z
source: RIPE
organisation: ORG-SL209-RIPE
org-name: Satellite Ltd
country: UA
org-type: LIR
address: Lenina str 8/18
address: 39600
address: Kremenchug
address: UKRAINE
phone: +380675070706
abuse-c: AR17451-RIPE
admin-c: DA2461-RIPE
admin-c: VM737-RIPE
mnt-ref: SATELLITE-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SATELLITE-MNT
created: 2009-02-10T10:46:03Z
last-modified: 2024-09-20T19:24:24Z
source: RIPE # Filtered
role: Satellite Network Operation Center
address: Satellite Ltd
address: Lenina str, 8/18
address: 39600, Kremenchuk, Poltava region, Ukraine
phone: +380 67 5070706
abuse-mailbox: abuse@satel.net.ua
admin-c: VM737-RIPE
admin-c: DA2461-RIPE
tech-c: VM737-RIPE
tech-c: DA2461-RIPE
tech-c: AT17574-RIPE
tech-c: ON1304-RIPE
nic-hdl: SNOC
mnt-by: SATELLITE-MNT
created: 2006-10-24T13:25:22Z
last-modified: 2024-09-20T19:29:53Z
source: RIPE # Filtered
% Information related to '87.244.136.0/21AS21310'
route: 87.244.136.0/21
descr: Satellite Ltd
org: ORG-SL209-RIPE
origin: AS21310
mnt-by: SATELLITE-MNT
created: 2020-02-12T12:05:54Z
last-modified: 2020-02-12T12:05:54Z
source: RIPE
organisation: ORG-SL209-RIPE
org-name: Satellite Ltd
country: UA
org-type: LIR
address: Lenina str 8/18
address: 39600
address: Kremenchug
address: UKRAINE
phone: +380675070706
abuse-c: AR17451-RIPE
admin-c: DA2461-RIPE
admin-c: VM737-RIPE
mnt-ref: SATELLITE-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: SATELLITE-MNT
created: 2009-02-10T10:46:03Z
last-modified: 2024-09-20T19:24:24Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 87.244.136.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;87.244.136.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:35:32 CST 2026
;; MSG SIZE rcvd: 107
Host 131.136.244.87.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 131.136.244.87.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 35.188.194.211 | attack | Aug 26 10:01:05 vps639187 sshd\[20997\]: Invalid user wm from 35.188.194.211 port 42950 Aug 26 10:01:05 vps639187 sshd\[20997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.194.211 Aug 26 10:01:07 vps639187 sshd\[20997\]: Failed password for invalid user wm from 35.188.194.211 port 42950 ssh2 ... |
2020-08-26 16:10:04 |
| 109.195.2.119 | attackbots | Aug 26 04:38:41 shivevps sshd[21243]: Bad protocol version identification '\024' from 109.195.2.119 port 34329 Aug 26 04:42:57 shivevps sshd[28390]: Bad protocol version identification '\024' from 109.195.2.119 port 38755 Aug 26 04:43:35 shivevps sshd[29471]: Bad protocol version identification '\024' from 109.195.2.119 port 39176 Aug 26 04:43:52 shivevps sshd[30092]: Bad protocol version identification '\024' from 109.195.2.119 port 39512 ... |
2020-08-26 16:30:57 |
| 95.30.47.186 | attackbotsspam | Automated report (2020-08-26T14:35:08+08:00). Spambot detected. |
2020-08-26 16:34:04 |
| 78.47.31.163 | attackbots | Return-Path: |
2020-08-26 16:29:41 |
| 121.234.219.249 | attack | Aug 26 04:38:42 shivevps sshd[21284]: Bad protocol version identification '\024' from 121.234.219.249 port 50172 Aug 26 04:38:49 shivevps sshd[21427]: Bad protocol version identification '\024' from 121.234.219.249 port 50342 Aug 26 04:39:21 shivevps sshd[21974]: Bad protocol version identification '\024' from 121.234.219.249 port 50648 Aug 26 04:39:58 shivevps sshd[23441]: Bad protocol version identification '\024' from 121.234.219.249 port 51424 ... |
2020-08-26 16:24:52 |
| 192.42.116.20 | attackbots | $lgm |
2020-08-26 16:00:48 |
| 181.40.122.102 | attackspam | Aug 26 04:37:18 shivevps sshd[18509]: Bad protocol version identification '\024' from 181.40.122.102 port 49240 Aug 26 04:38:56 shivevps sshd[21662]: Bad protocol version identification '\024' from 181.40.122.102 port 39751 Aug 26 04:42:21 shivevps sshd[26661]: Bad protocol version identification '\024' from 181.40.122.102 port 52400 ... |
2020-08-26 16:30:00 |
| 23.129.64.187 | attackspambots | $lgm |
2020-08-26 15:56:38 |
| 103.254.209.201 | attackspam | Aug 23 23:55:37 ms-srv sshd[57650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.209.201 Aug 23 23:55:40 ms-srv sshd[57650]: Failed password for invalid user user from 103.254.209.201 port 39967 ssh2 |
2020-08-26 16:20:00 |
| 163.172.198.72 | attack | Aug 26 04:39:56 shivevps sshd[23372]: Bad protocol version identification '\024' from 163.172.198.72 port 60088 Aug 26 04:41:32 shivevps sshd[25747]: Bad protocol version identification '\024' from 163.172.198.72 port 36093 Aug 26 04:43:06 shivevps sshd[28735]: Bad protocol version identification '\024' from 163.172.198.72 port 38041 Aug 26 04:43:32 shivevps sshd[29288]: Bad protocol version identification '\024' from 163.172.198.72 port 36243 ... |
2020-08-26 16:35:35 |
| 128.199.92.187 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-08-26 16:19:48 |
| 24.172.34.114 | attackspam | Aug 26 04:42:17 shivevps sshd[26335]: Bad protocol version identification '\024' from 24.172.34.114 port 48504 Aug 26 04:42:51 shivevps sshd[28152]: Bad protocol version identification '\024' from 24.172.34.114 port 50153 Aug 26 04:43:48 shivevps sshd[29919]: Bad protocol version identification '\024' from 24.172.34.114 port 51626 ... |
2020-08-26 16:36:10 |
| 207.180.211.156 | attackbots | Aug 26 06:18:54 XXX sshd[52643]: Invalid user imr from 207.180.211.156 port 49484 |
2020-08-26 16:31:51 |
| 104.155.163.244 | attackbots | Aug 24 12:27:57 ns sshd[13346]: Connection from 104.155.163.244 port 44856 on 134.119.36.27 port 22 Aug 24 12:27:58 ns sshd[13346]: Invalid user ubuntu from 104.155.163.244 port 44856 Aug 24 12:27:58 ns sshd[13346]: Failed password for invalid user ubuntu from 104.155.163.244 port 44856 ssh2 Aug 24 12:27:58 ns sshd[13346]: Received disconnect from 104.155.163.244 port 44856:11: Bye Bye [preauth] Aug 24 12:27:58 ns sshd[13346]: Disconnected from 104.155.163.244 port 44856 [preauth] Aug 24 12:41:33 ns sshd[22411]: Connection from 104.155.163.244 port 52220 on 134.119.36.27 port 22 Aug 24 12:41:34 ns sshd[22411]: Invalid user deploy from 104.155.163.244 port 52220 Aug 24 12:41:34 ns sshd[22411]: Failed password for invalid user deploy from 104.155.163.244 port 52220 ssh2 Aug 24 12:41:34 ns sshd[22411]: Received disconnect from 104.155.163.244 port 52220:11: Bye Bye [preauth] Aug 24 12:41:34 ns sshd[22411]: Disconnected from 104.155.163.244 port 52220 [preauth] Aug 24 12:45........ ------------------------------- |
2020-08-26 16:25:43 |
| 200.89.174.216 | attackbots | Aug 26 04:39:02 shivevps sshd[21759]: Bad protocol version identification '\024' from 200.89.174.216 port 53768 Aug 26 04:43:40 shivevps sshd[29340]: Bad protocol version identification '\024' from 200.89.174.216 port 34504 Aug 26 04:44:46 shivevps sshd[31735]: Bad protocol version identification '\024' from 200.89.174.216 port 36984 ... |
2020-08-26 16:02:47 |