城市(city): Trbovlje
省份(region): Trbovlje
国家(country): Slovenia
运营商(isp): Telemach
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '84.20.253.0 - 84.20.253.255'
% Abuse contact for '84.20.253.0 - 84.20.253.255' is 'abuse@telemach.si'
inetnum: 84.20.253.0 - 84.20.253.255
netname: Telemach-NET
descr: Broadband Network Services
country: SI
remarks: INFRA-AW
admin-c: TRTB1-RIPE
tech-c: TRTB1-RIPE
status: ASSIGNED PA
mnt-by: TELEMACH-MNT
mnt-lower: TELEMACH-MNT
mnt-routes: TELEMACH-MNT
created: 2008-01-24T10:36:10Z
last-modified: 2018-01-15T14:04:20Z
source: RIPE # Filtered
role: Telemach RIPE Team BBN
address: Telemach d.o.o.
address: Brnciceva ulica 49A
address: SI-1231 Ljubljana-Crnuce
address: Slovenia
phone: +386 591 88600
admin-c: AR1264-RIPE
tech-c: MS10243-RIPE
tech-c: GN1562-RIPE
tech-c: JL12686-RIPE
nic-hdl: TRTB1-RIPE
mnt-by: TELEMACH-MNT
created: 2009-09-25T09:49:27Z
last-modified: 2020-12-03T16:43:17Z
source: RIPE # Filtered
abuse-mailbox: abuse@telemach.si
% Information related to '84.20.224.0/19AS3212'
route: 84.20.224.0/19
descr: TELEMACH, Provider Aggregated Block
remarks: ===========================================================
remarks: TELEMACH - Network Operation Center
remarks:
remarks: mail: noc@telemach.net
remarks: phone: +386 1 51 88 600 or 51 88 630
remarks: fax: +386 1 51 88 601
remarks:
remarks: Please send abuse & spam notification to abuse@telemach.net
remarks: ===========================================================
origin: AS3212
mnt-routes: TELEMACH-MNT
mnt-by: TELEMACH-MNT
created: 2016-03-01T07:14:34Z
last-modified: 2018-01-15T13:41:08Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.20.253.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;84.20.253.231. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 09:38:48 CST 2026
;; MSG SIZE rcvd: 106
231.253.20.84.in-addr.arpa domain name pointer 84-20-253-231.dynamic.telemach.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
231.253.20.84.in-addr.arpa name = 84-20-253-231.dynamic.telemach.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.41.154.208 | attackbots | Invalid user admin from 185.41.154.208 port 38713 |
2020-06-30 01:48:13 |
| 106.12.69.35 | attackbotsspam | Invalid user leo from 106.12.69.35 port 40444 |
2020-06-30 01:34:29 |
| 200.52.80.34 | attack | srv02 SSH BruteForce Attacks 22 .. |
2020-06-30 01:25:49 |
| 192.241.235.11 | attack | 2020-06-29T13:00:35.518786sd-86998 sshd[2493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.235.11 user=postgres 2020-06-29T13:00:37.091615sd-86998 sshd[2493]: Failed password for postgres from 192.241.235.11 port 34880 ssh2 2020-06-29T13:08:14.122535sd-86998 sshd[3548]: Invalid user zhou from 192.241.235.11 port 35172 2020-06-29T13:08:14.128122sd-86998 sshd[3548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.235.11 2020-06-29T13:08:14.122535sd-86998 sshd[3548]: Invalid user zhou from 192.241.235.11 port 35172 2020-06-29T13:08:16.714459sd-86998 sshd[3548]: Failed password for invalid user zhou from 192.241.235.11 port 35172 ssh2 ... |
2020-06-30 01:57:18 |
| 186.192.198.194 | attack | Unauthorized connection attempt detected from IP address 186.192.198.194 to port 23 |
2020-06-30 01:55:18 |
| 78.128.113.109 | attackbotsspam | 2020-06-29 20:19:41 dovecot_plain authenticator failed for \(ip-113-109.4vendeta.com.\) \[78.128.113.109\]: 535 Incorrect authentication data \(set_id=hostmaster@ift.org.ua\)2020-06-29 20:19:56 dovecot_plain authenticator failed for \(ip-113-109.4vendeta.com.\) \[78.128.113.109\]: 535 Incorrect authentication data2020-06-29 20:20:13 dovecot_plain authenticator failed for \(ip-113-109.4vendeta.com.\) \[78.128.113.109\]: 535 Incorrect authentication data ... |
2020-06-30 01:30:37 |
| 123.176.46.50 | attackspambots | 20/6/29@07:08:53: FAIL: Alarm-Network address from=123.176.46.50 ... |
2020-06-30 01:24:36 |
| 182.242.143.38 | attackspambots | Scanned 290 unique addresses for 2 unique TCP ports in 24 hours (ports 2060,31042) |
2020-06-30 01:21:53 |
| 49.69.190.32 | attackspam | prod6 ... |
2020-06-30 01:28:57 |
| 142.93.56.57 | attackbotsspam | 20 attempts against mh-ssh on echoip |
2020-06-30 02:00:36 |
| 82.64.88.144 | attack |
|
2020-06-30 01:55:49 |
| 190.28.124.73 | attack | $f2bV_matches |
2020-06-30 01:27:16 |
| 128.199.244.150 | attackbots | 128.199.244.150 - - [29/Jun/2020:14:08:44 +0200] "POST /wp-login.php HTTP/1.1" 200 5416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.244.150 - - [29/Jun/2020:14:08:48 +0200] "POST /wp-login.php HTTP/1.1" 200 5404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.244.150 - - [29/Jun/2020:14:08:52 +0200] "POST /wp-login.php HTTP/1.1" 200 5403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.244.150 - - [29/Jun/2020:14:08:59 +0200] "POST /wp-login.php HTTP/1.1" 200 5416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.244.150 - - [29/Jun/2020:14:09:03 +0200] "POST /wp-login.php HTTP/1.1" 200 5404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-06-30 01:20:08 |
| 216.244.66.229 | attackspam | 20 attempts against mh-misbehave-ban on pluto |
2020-06-30 02:01:07 |
| 200.76.243.161 | attack | $f2bV_matches |
2020-06-30 01:32:57 |