城市(city): Shenzhen
省份(region): Guangdong
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '94.231.206.0 - 94.231.206.255'
% Abuse contact for '94.231.206.0 - 94.231.206.255' is 'abuse@onyphe.io'
inetnum: 94.231.206.0 - 94.231.206.255
geofeed: https://www.onyphe.io/geofeed.csv
descr: -----BEGIN TOKEN-----a98a05ac40ade1d4135ddd523e9353074e373301e28e7d88a7e6349edb03e450ee409b1aaa323d36638426dbd62e6793ac822688db8516dac3225ddbf3e04be5-----END TOKEN-----
remarks: We are conducting Internet-scale network scanning to provide information
remarks: for cyber defense purposes. We scan the full IPv4 address space and part
remarks: of IPv6 address space. We are in no way targeting you specifically, you
remarks: are just part of what is connected on the Internet. Our complete list
remarks: of our IP ranges is available here: https://www.onyphe.io/ip-ranges.txt
remarks: Opt-out by sending your IP ranges at: abuse at onyphe dot io
netname: FR-ONYPHE-20200128
country: CN
org: ORG-OS381-RIPE
admin-c: AA44525-RIPE
tech-c: AA44525-RIPE
status: ALLOCATED PA
mnt-by: lir-fr-onyphe-1-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2025-11-21T12:08:15Z
last-modified: 2025-11-26T08:29:44Z
source: RIPE
organisation: ORG-OS381-RIPE
org-name: ONYPHE SAS
country: FR
org-type: LIR
address: 5 place Franois Mic
address: 29233
address: Clder
address: FRANCE
phone: +33 (0) 972 66 1884
admin-c: AA44525-RIPE
tech-c: AA44525-RIPE
abuse-c: AR77640-RIPE
mnt-ref: lir-fr-onyphe-1-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-02-05T16:10:26Z
last-modified: 2025-11-13T14:10:50Z
source: RIPE # Filtered
role: Admin
address: FRANCE
address: Clder
address: 29233
address: 5 place Franois Mic
phone: +33 (0) 972 66 1884
nic-hdl: AA44525-RIPE
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-02-05T16:10:25Z
last-modified: 2025-11-26T10:39:42Z
source: RIPE # Filtered
% Information related to '94.231.206.0/24AS213412'
route: 94.231.206.0/24
origin: AS213412
mnt-by: lir-fr-onyphe-1-MNT
created: 2025-11-24T12:50:26Z
last-modified: 2025-11-24T12:50:26Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.231.206.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.231.206.109. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030601 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 04:30:11 CST 2026
;; MSG SIZE rcvd: 107
109.206.231.94.in-addr.arpa domain name pointer oconnor.probe.onyphe.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
109.206.231.94.in-addr.arpa name = oconnor.probe.onyphe.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.169.252.206 | attackbotsspam | 2020-10-04T04:14:41.819401linuxbox-skyline auth[269530]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=amit rhost=193.169.252.206 ... |
2020-10-04 19:21:17 |
| 80.30.30.47 | attackbots | <6 unauthorized SSH connections |
2020-10-04 18:55:36 |
| 2.40.7.42 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-10-04 19:17:56 |
| 116.52.175.150 | attackspambots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-10-04 19:04:20 |
| 183.110.79.173 | attack | RDPBruteCAu |
2020-10-04 19:20:15 |
| 155.4.70.11 | attackspam | SSH_attack |
2020-10-04 18:52:08 |
| 45.164.8.244 | attackspambots | Invalid user postgres from 45.164.8.244 port 48182 |
2020-10-04 19:15:17 |
| 220.181.108.111 | attackbots | Bad bot/spoofed identity |
2020-10-04 18:55:48 |
| 213.136.89.190 | attackspambots | Dovecot Invalid User Login Attempt. |
2020-10-04 19:16:43 |
| 43.251.175.67 | attack | DATE:2020-10-03 22:33:25, IP:43.251.175.67, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-10-04 18:59:56 |
| 220.133.56.242 | attackbotsspam |
|
2020-10-04 19:11:35 |
| 159.203.85.196 | attack |
|
2020-10-04 19:01:51 |
| 52.252.59.235 | attack | 21 attempts against mh-ssh on star |
2020-10-04 19:02:46 |
| 167.114.155.2 | attack | Oct 4 03:28:36 ny01 sshd[14972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.155.2 Oct 4 03:28:37 ny01 sshd[14972]: Failed password for invalid user gabriel from 167.114.155.2 port 35240 ssh2 Oct 4 03:32:45 ny01 sshd[15416]: Failed password for root from 167.114.155.2 port 42712 ssh2 |
2020-10-04 18:54:02 |
| 37.152.165.106 | attackbotsspam |
|
2020-10-04 18:57:49 |