城市(city): Roubaix
省份(region): Hauts-de-France
国家(country): France
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.196.152.52 | attack | Bad IP |
2025-03-20 22:02:16 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '91.196.152.0 - 91.196.152.255'
% Abuse contact for '91.196.152.0 - 91.196.152.255' is 'abuse@onyphe.io'
inetnum: 91.196.152.0 - 91.196.152.255
geofeed: https://www.onyphe.io/geofeed.csv
descr: -----BEGIN TOKEN-----a98a05ac40ade1d4135ddd523e9353074e373301e28e7d88a7e6349edb03e450ee409b1aaa323d36638426dbd62e6793ac822688db8516dac3225ddbf3e04be5-----END TOKEN-----
remarks: We are conducting Internet-scale network scanning to provide information
remarks: for cyber defense purposes. We scan the full IPv4 address space and part
remarks: of IPv6 address space. We are in no way targeting you specifically, you
remarks: are just part of what is connected on the Internet. Our complete list
remarks: of our IP ranges is available here: https://www.onyphe.io/ip-ranges.txt
remarks: Opt-out by sending your IP ranges at: abuse at onyphe dot io
netname: FR-ONYPHE-20221220
country: FR
org: ORG-OS381-RIPE
admin-c: AA44525-RIPE
tech-c: AA44525-RIPE
status: ALLOCATED PA
mnt-by: lir-fr-onyphe-1-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2025-02-13T11:06:31Z
last-modified: 2025-03-09T09:40:40Z
source: RIPE
organisation: ORG-OS381-RIPE
org-name: ONYPHE SAS
country: FR
reg-nr: 831 540 695 R.C.S Brest
org-type: LIR
address: 5 place Franois Mic
address: 29233
address: Clder
address: FRANCE
phone: +33 (0) 972 66 1884
admin-c: AA44525-RIPE
tech-c: AA44525-RIPE
abuse-c: AR77640-RIPE
mnt-ref: lir-fr-onyphe-1-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-02-05T16:10:26Z
last-modified: 2026-05-13T07:03:09Z
source: RIPE # Filtered
role: Admin
address: FRANCE
address: Clder
address: 29233
address: 5 place Franois Mic
phone: +33 (0) 972 66 1884
nic-hdl: AA44525-RIPE
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-02-05T16:10:25Z
last-modified: 2025-11-26T10:39:42Z
source: RIPE # Filtered
% Information related to '91.196.152.0/24AS213412'
route: 91.196.152.0/24
origin: AS213412
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-02-14T13:01:03Z
last-modified: 2025-02-14T13:01:03Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.196.152.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.196.152.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 08:00:29 CST 2026
;; MSG SIZE rcvd: 107
239.152.196.91.in-addr.arpa domain name pointer whitaker.probe.onyphe.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.152.196.91.in-addr.arpa name = whitaker.probe.onyphe.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.52.217.139 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.52.217.139 to port 143 [J] |
2020-01-13 04:54:05 |
| 112.120.244.69 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.120.244.69 to port 5555 [J] |
2020-01-13 04:28:25 |
| 138.185.5.94 | attackbots | Unauthorized connection attempt detected from IP address 138.185.5.94 to port 8000 [J] |
2020-01-13 04:49:55 |
| 124.156.62.183 | attackbots | Unauthorized connection attempt detected from IP address 124.156.62.183 to port 7 [J] |
2020-01-13 04:51:20 |
| 91.103.97.77 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-13 04:54:53 |
| 188.235.141.107 | attack | Unauthorized connection attempt detected from IP address 188.235.141.107 to port 1433 [J] |
2020-01-13 04:44:03 |
| 130.0.58.224 | attackspambots | Unauthorized connection attempt detected from IP address 130.0.58.224 to port 23 [J] |
2020-01-13 04:50:30 |
| 190.178.102.73 | attack | Unauthorized connection attempt detected from IP address 190.178.102.73 to port 8080 [J] |
2020-01-13 04:17:12 |
| 156.221.190.201 | attack | Unauthorized connection attempt detected from IP address 156.221.190.201 to port 23 [J] |
2020-01-13 04:22:50 |
| 124.88.113.154 | attackbotsspam | Unauthorized connection attempt detected from IP address 124.88.113.154 to port 8082 [J] |
2020-01-13 04:26:46 |
| 106.12.77.212 | attackspambots | Unauthorized connection attempt detected from IP address 106.12.77.212 to port 2220 [J] |
2020-01-13 04:30:40 |
| 2.132.31.9 | attackspambots | Unauthorized connection attempt detected from IP address 2.132.31.9 to port 23 [J] |
2020-01-13 04:39:33 |
| 186.205.26.120 | attackspambots | Unauthorized connection attempt detected from IP address 186.205.26.120 to port 80 [J] |
2020-01-13 04:19:26 |
| 102.152.52.13 | attackbotsspam | Unauthorized connection attempt detected from IP address 102.152.52.13 to port 23 [J] |
2020-01-13 04:54:22 |
| 170.84.15.66 | attackspambots | Unauthorized connection attempt detected from IP address 170.84.15.66 to port 88 [J] |
2020-01-13 04:48:13 |