城市(city): Frankfurt am Main
省份(region): Hessen
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '89.169.54.0 - 89.169.55.255'
% Abuse contact for '89.169.54.0 - 89.169.55.255' is 'abuse@aeza.ru'
inetnum: 89.169.54.0 - 89.169.55.255
netname: Aeza-Network
mnt-domains: aeza-mnt
mnt-lower: aeza-mnt
mnt-routes: aeza-mnt
country: DE
admin-c: NT5020-RIPE
abuse-c: AR79375-RIPE
tech-c: NT5020-RIPE
org: ORG-AGL50-RIPE
status: ASSIGNED PA
mnt-by: aeza-mnt
mnt-by: lir-ru-aezagroup-1-MNT
mnt-by: webrocket-mnt
created: 2024-11-06T17:06:25Z
last-modified: 2026-03-05T18:22:07Z
source: RIPE
geofeed: https://aeza.net/static/ipv4_f.csv
organisation: ORG-AGL50-RIPE
org-name: AEZA GROUP LLC
country: RU
org-type: LIR
address: Room 1N, Office 603, Hse 15, Building 1, Zolnaya Street, Pravoberezhny
address: 193318
address: Saint Petersburg
address: RUSSIAN FEDERATION
phone: +79650135518
phone: +78002006013
admin-c: NT5020-RIPE
tech-c: NT5020-RIPE
abuse-c: AR79375-RIPE
mnt-ref: lir-ru-aezagroup-1-MNT
mnt-ref: aeza-mnt
mnt-ref: IVC-MNT
mnt-ref: Renets-mnt
mnt-ref: VF1-MNT
mnt-ref: DN-MNT
mnt-ref: WEBROCKET-MNT
mnt-ref: QWARTA-MNT
mnt-ref: ROSNIIROS-MNT
mnt-ref: mnt-ru-am-1
mnt-ref: IROST-MNT
mnt-ref: JD-RIPE-MNT
mnt-ref: AS15509-MNT
mnt-ref: sistemallc-mnt
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-ru-aezagroup-1-MNT
created: 2025-12-29T09:59:14Z
last-modified: 2026-03-06T16:19:59Z
source: RIPE # Filtered
role: NOC team
address: RUSSIAN FEDERATION
address: Saint Petersburg
address: 193318
address: Room 1N, Office 603, Hse 15, Building 1,
Zolnaya Street, Pravoberezhny
phone: +78002006013
nic-hdl: NT5020-RIPE
mnt-by: lir-ru-aezagroup-1-MNT
created: 2025-12-29T09:59:13Z
last-modified: 2025-12-29T09:59:13Z
source: RIPE # Filtered
% Information related to '89.169.54.0/23AS210644'
route: 89.169.54.0/23
origin: AS210644
mnt-by: aeza-mnt
mnt-by: AEZA-NETWORK-MNT
created: 2024-03-21T15:13:46Z
last-modified: 2024-03-21T15:13:46Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.169.55.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.169.55.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 09:00:20 CST 2026
;; MSG SIZE rcvd: 106
117.55.169.89.in-addr.arpa domain name pointer testvpn.ptr.network.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.55.169.89.in-addr.arpa name = testvpn.ptr.network.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.112.164.113 | attackbots | Nov 24 21:12:59 php1 sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113 user=root Nov 24 21:13:01 php1 sshd\[26651\]: Failed password for root from 193.112.164.113 port 41520 ssh2 Nov 24 21:21:30 php1 sshd\[27341\]: Invalid user axel69 from 193.112.164.113 Nov 24 21:21:30 php1 sshd\[27341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113 Nov 24 21:21:32 php1 sshd\[27341\]: Failed password for invalid user axel69 from 193.112.164.113 port 48134 ssh2 |
2019-11-25 15:42:33 |
| 181.14.240.149 | attackspam | Nov 25 04:35:41 firewall sshd[21506]: Invalid user schets from 181.14.240.149 Nov 25 04:35:44 firewall sshd[21506]: Failed password for invalid user schets from 181.14.240.149 port 48663 ssh2 Nov 25 04:43:53 firewall sshd[21677]: Invalid user istclass from 181.14.240.149 ... |
2019-11-25 15:52:24 |
| 176.109.233.23 | attack | " " |
2019-11-25 15:31:18 |
| 168.181.49.66 | attackspambots | $f2bV_matches |
2019-11-25 15:19:43 |
| 37.187.93.105 | attackspam | Automatic report - XMLRPC Attack |
2019-11-25 15:39:01 |
| 178.62.228.122 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-25 15:19:20 |
| 103.89.168.196 | attack | 103.89.168.196 - admin \[24/Nov/2019:22:17:11 -0800\] "GET /rss/order/new HTTP/1.1" 401 25103.89.168.196 - admin \[24/Nov/2019:22:31:39 -0800\] "GET /rss/order/new HTTP/1.1" 401 25103.89.168.196 - admin \[24/Nov/2019:22:31:48 -0800\] "GET /rss/order/new HTTP/1.1" 401 25 ... |
2019-11-25 15:22:31 |
| 63.88.23.139 | attackspambots | 63.88.23.139 was recorded 11 times by 7 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 11, 61, 665 |
2019-11-25 15:25:10 |
| 188.213.49.223 | attack | C2,WP GET /wp-login.php GET /wp-login.php |
2019-11-25 15:30:00 |
| 176.10.250.50 | attackspam | Nov 25 07:30:36 ip-172-31-62-245 sshd\[16606\]: Invalid user ibrahim from 176.10.250.50\ Nov 25 07:30:37 ip-172-31-62-245 sshd\[16606\]: Failed password for invalid user ibrahim from 176.10.250.50 port 44502 ssh2\ Nov 25 07:33:59 ip-172-31-62-245 sshd\[16628\]: Invalid user root000 from 176.10.250.50\ Nov 25 07:34:01 ip-172-31-62-245 sshd\[16628\]: Failed password for invalid user root000 from 176.10.250.50 port 52240 ssh2\ Nov 25 07:37:21 ip-172-31-62-245 sshd\[16652\]: Invalid user shanice from 176.10.250.50\ |
2019-11-25 15:53:17 |
| 202.96.137.99 | attack | Port Scan 1433 |
2019-11-25 15:41:08 |
| 117.119.84.34 | attackbots | Nov 25 09:57:42 microserver sshd[50780]: Invalid user landi4 from 117.119.84.34 port 52877 Nov 25 09:57:42 microserver sshd[50780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34 Nov 25 09:57:43 microserver sshd[50780]: Failed password for invalid user landi4 from 117.119.84.34 port 52877 ssh2 Nov 25 10:07:37 microserver sshd[52097]: Invalid user bergtun from 117.119.84.34 port 40602 Nov 25 10:07:37 microserver sshd[52097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34 Nov 25 10:22:58 microserver sshd[54095]: Invalid user smmsp from 117.119.84.34 port 40584 Nov 25 10:22:58 microserver sshd[54095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34 Nov 25 10:23:00 microserver sshd[54095]: Failed password for invalid user smmsp from 117.119.84.34 port 40584 ssh2 Nov 25 10:30:49 microserver sshd[55280]: Invalid user herouin from 117.119.84.34 port 54692 |
2019-11-25 15:13:54 |
| 60.190.226.188 | attackspambots | SSH-bruteforce attempts |
2019-11-25 15:37:13 |
| 178.62.181.74 | attackspam | Nov 25 08:13:37 mout sshd[22153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.181.74 user=root Nov 25 08:13:39 mout sshd[22153]: Failed password for root from 178.62.181.74 port 37411 ssh2 |
2019-11-25 15:43:46 |
| 180.68.177.15 | attack | Nov 25 14:39:38 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15 Nov 25 14:39:39 webhost01 sshd[21115]: Failed password for invalid user quickert from 180.68.177.15 port 45886 ssh2 ... |
2019-11-25 15:43:18 |