City: Guangzhou
Region: Guangdong
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '81.68.0.0 - 81.71.255.255'
% No abuse contact registered for 81.68.0.0 - 81.71.255.255
inetnum: 81.68.0.0 - 81.71.255.255
netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
descr: IPv4 address block not managed by the RIPE NCC
remarks: ------------------------------------------------------
remarks:
remarks: For registration information,
remarks: you can consult the following sources:
remarks:
remarks: IANA
remarks: http://www.iana.org/assignments/ipv4-address-space
remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
remarks:
remarks: AFRINIC (Africa)
remarks: http://www.afrinic.net/ whois.afrinic.net
remarks:
remarks: APNIC (Asia Pacific)
remarks: http://www.apnic.net/ whois.apnic.net
remarks:
remarks: ARIN (Northern America)
remarks: http://www.arin.net/ whois.arin.net
remarks:
remarks: LACNIC (Latin America and the Carribean)
remarks: http://www.lacnic.net/ whois.lacnic.net
remarks:
remarks: ------------------------------------------------------
country: EU # Country is really world wide
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
status: ALLOCATED UNSPECIFIED
mnt-by: RIPE-NCC-HM-MNT
created: 2019-01-07T10:47:18Z
last-modified: 2019-01-07T10:47:18Z
source: RIPE
role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
nic-hdl: IANA1-RIPE
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: RIPE-NCC-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:31:27Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.71.34.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.71.34.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042202 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 05:00:05 CST 2026
;; MSG SIZE rcvd: 105
Host 249.34.71.81.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.34.71.81.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 88.86.103.175 | attackbotsspam | SSH login attempts. |
2020-07-10 02:53:19 |
| 103.14.210.43 | attack | Postfix RBL failed |
2020-07-10 02:33:52 |
| 216.70.64.121 | attackspam | SSH login attempts. |
2020-07-10 02:52:02 |
| 150.109.52.213 | attack | SSH login attempts. |
2020-07-10 02:52:49 |
| 192.185.21.109 | attackspam | SSH login attempts. |
2020-07-10 02:57:47 |
| 153.122.52.35 | attackspam | SSH login attempts. |
2020-07-10 02:49:12 |
| 31.28.24.112 | attackspam | SSH login attempts. |
2020-07-10 02:28:12 |
| 81.201.125.167 | attack | detected by Fail2Ban |
2020-07-10 02:39:28 |
| 184.106.184.126 | attackbots | SSH login attempts. |
2020-07-10 02:24:51 |
| 222.82.214.218 | attack | ... |
2020-07-10 02:24:15 |
| 47.104.128.186 | attack | SSH Brute-Force reported by Fail2Ban |
2020-07-10 02:23:43 |
| 88.151.101.215 | attackbots | SSH login attempts. |
2020-07-10 02:32:22 |
| 191.34.162.186 | attack | Jul 9 17:20:52 ip-172-31-62-245 sshd\[25132\]: Invalid user Artur from 191.34.162.186\ Jul 9 17:20:54 ip-172-31-62-245 sshd\[25132\]: Failed password for invalid user Artur from 191.34.162.186 port 42661 ssh2\ Jul 9 17:24:30 ip-172-31-62-245 sshd\[25175\]: Invalid user rjf from 191.34.162.186\ Jul 9 17:24:32 ip-172-31-62-245 sshd\[25175\]: Failed password for invalid user rjf from 191.34.162.186 port 45564 ssh2\ Jul 9 17:28:02 ip-172-31-62-245 sshd\[25219\]: Invalid user test from 191.34.162.186\ |
2020-07-10 02:30:21 |
| 37.146.79.179 | attack | Unauthorized connection attempt from IP address 37.146.79.179 on Port 3389(RDP) |
2020-07-10 02:43:28 |
| 106.12.47.108 | attackspam | SSH Brute-Force reported by Fail2Ban |
2020-07-10 02:53:03 |