城市(city): Manchester
省份(region): England
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '89.21.25.0 - 89.21.25.127'
% Abuse contact for '89.21.25.0 - 89.21.25.127' is 'smc@equinix.com'
inetnum: 89.21.25.0 - 89.21.25.127
netname: SYNVLAN257
descr: SYN Vlan 257 Customer
country: GB
admin-c: RG3442-RIPE
tech-c: RG3442-RIPE
status: ASSIGNED PA
mnt-by: MNT-UKGRIDRG
mnt-by: EQUINIX-MNT
created: 2020-03-16T09:57:57Z
last-modified: 2020-03-16T09:57:57Z
source: RIPE
person: Rob Garbutt
address: Greenheys Data Centre
address: Manchester Science Park
address: Pencroft Way
address: Manchester
address: M15 6JJ
phone: +44(0)845 260 4743
nic-hdl: RG3442-RIPE
mnt-by: MNT-UKGRIDRG
created: 2006-04-13T22:14:31Z
last-modified: 2009-12-30T16:57:10Z
source: RIPE # Filtered
% Information related to '89.21.0.0/19AS15830'
route: 89.21.0.0/19
descr: ROUTE ORIGINATED BY TELECITY GROUP LTD MANCHESTER
origin: AS15830
mnt-by: TELECITY-MNT
created: 2012-06-18T13:48:36Z
last-modified: 2012-06-18T13:48:36Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.21.25.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.21.25.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050201 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 01:43:09 CST 2026
;; MSG SIZE rcvd: 104
Host 54.25.21.89.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.25.21.89.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.230.73.133 | attackspambots | fail2ban |
2019-10-17 07:47:18 |
| 202.84.45.250 | attack | 5x Failed Password |
2019-10-17 12:25:14 |
| 180.76.100.183 | attack | Oct 16 15:22:16 Tower sshd[5528]: Connection from 180.76.100.183 port 50146 on 192.168.10.220 port 22 Oct 16 15:22:17 Tower sshd[5528]: Failed password for root from 180.76.100.183 port 50146 ssh2 Oct 16 15:22:18 Tower sshd[5528]: Received disconnect from 180.76.100.183 port 50146:11: Bye Bye [preauth] Oct 16 15:22:18 Tower sshd[5528]: Disconnected from authenticating user root 180.76.100.183 port 50146 [preauth] |
2019-10-17 07:47:44 |
| 5.135.181.11 | attack | Oct 17 04:09:51 web8 sshd\[25741\]: Invalid user ccservice from 5.135.181.11 Oct 17 04:09:51 web8 sshd\[25741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11 Oct 17 04:09:54 web8 sshd\[25741\]: Failed password for invalid user ccservice from 5.135.181.11 port 34716 ssh2 Oct 17 04:14:02 web8 sshd\[27704\]: Invalid user vote4me from 5.135.181.11 Oct 17 04:14:02 web8 sshd\[27704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11 |
2019-10-17 12:17:32 |
| 94.191.28.110 | attackspam | Oct 16 23:26:21 MK-Soft-VM7 sshd[22565]: Failed password for root from 94.191.28.110 port 39680 ssh2 Oct 16 23:30:42 MK-Soft-VM7 sshd[22589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.110 ... |
2019-10-17 07:48:01 |
| 104.248.81.112 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-10-17 12:15:15 |
| 204.48.19.178 | attack | Oct 16 18:24:48 xtremcommunity sshd\[588281\]: Invalid user kobayashi from 204.48.19.178 port 46320 Oct 16 18:24:48 xtremcommunity sshd\[588281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 Oct 16 18:24:51 xtremcommunity sshd\[588281\]: Failed password for invalid user kobayashi from 204.48.19.178 port 46320 ssh2 Oct 16 18:28:36 xtremcommunity sshd\[588334\]: Invalid user abbey from 204.48.19.178 port 56596 Oct 16 18:28:36 xtremcommunity sshd\[588334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 ... |
2019-10-17 07:39:37 |
| 132.148.23.100 | attackspam | Automatic report - XMLRPC Attack |
2019-10-17 07:39:12 |
| 43.231.61.146 | attack | Oct 16 17:53:00 php1 sshd\[17727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146 user=root Oct 16 17:53:02 php1 sshd\[17727\]: Failed password for root from 43.231.61.146 port 54108 ssh2 Oct 16 17:57:33 php1 sshd\[18101\]: Invalid user oracle from 43.231.61.146 Oct 16 17:57:33 php1 sshd\[18101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146 Oct 16 17:57:35 php1 sshd\[18101\]: Failed password for invalid user oracle from 43.231.61.146 port 38688 ssh2 |
2019-10-17 12:16:15 |
| 218.92.0.171 | attackbots | Oct 17 03:57:22 game-panel sshd[29861]: Failed password for root from 218.92.0.171 port 7129 ssh2 Oct 17 03:57:25 game-panel sshd[29861]: Failed password for root from 218.92.0.171 port 7129 ssh2 Oct 17 03:57:28 game-panel sshd[29861]: Failed password for root from 218.92.0.171 port 7129 ssh2 Oct 17 03:57:31 game-panel sshd[29861]: Failed password for root from 218.92.0.171 port 7129 ssh2 |
2019-10-17 12:19:05 |
| 80.88.90.86 | attack | Oct 17 06:40:43 server sshd\[22515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 user=root Oct 17 06:40:45 server sshd\[22515\]: Failed password for root from 80.88.90.86 port 34436 ssh2 Oct 17 06:54:09 server sshd\[26099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 user=root Oct 17 06:54:11 server sshd\[26099\]: Failed password for root from 80.88.90.86 port 42150 ssh2 Oct 17 06:57:52 server sshd\[27256\]: Invalid user undernet from 80.88.90.86 Oct 17 06:57:52 server sshd\[27256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 ... |
2019-10-17 12:07:04 |
| 115.226.193.134 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/115.226.193.134/ CN - 1H : (559) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 115.226.193.134 CIDR : 115.226.0.0/15 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 14 3H - 41 6H - 71 12H - 116 24H - 217 DateTime : 2019-10-17 05:57:39 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-17 12:11:27 |
| 197.58.148.24 | attackbots | port scan and connect, tcp 22 (ssh) |
2019-10-17 07:48:50 |
| 148.70.84.130 | attackbotsspam | 2019-10-17T03:58:00.961541abusebot-5.cloudsearch.cf sshd\[31897\]: Invalid user jsr from 148.70.84.130 port 42880 |
2019-10-17 12:03:51 |
| 125.227.236.60 | attackspambots | Oct 17 05:57:48 ArkNodeAT sshd\[13439\]: Invalid user user from 125.227.236.60 Oct 17 05:57:48 ArkNodeAT sshd\[13439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60 Oct 17 05:57:50 ArkNodeAT sshd\[13439\]: Failed password for invalid user user from 125.227.236.60 port 52162 ssh2 |
2019-10-17 12:08:16 |