城市(city): Zagreb
省份(region): Zagreb (city)
国家(country): Croatia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.94.84.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6008
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.94.84.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030302 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 04 11:50:08 CST 2025
;; MSG SIZE rcvd: 104
29.84.94.85.in-addr.arpa domain name pointer static-85-94-84-29.rev-addr.terrakom.hr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.84.94.85.in-addr.arpa name = static-85-94-84-29.rev-addr.terrakom.hr.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 137.74.41.119 | attackbots | Aug 11 20:55:26 itv-usvr-01 sshd[26054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.41.119 user=root Aug 11 20:55:28 itv-usvr-01 sshd[26054]: Failed password for root from 137.74.41.119 port 36340 ssh2 Aug 11 20:59:41 itv-usvr-01 sshd[26218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.41.119 user=root Aug 11 20:59:43 itv-usvr-01 sshd[26218]: Failed password for root from 137.74.41.119 port 46760 ssh2 Aug 11 21:03:41 itv-usvr-01 sshd[26468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.41.119 user=root Aug 11 21:03:43 itv-usvr-01 sshd[26468]: Failed password for root from 137.74.41.119 port 57186 ssh2 |
2020-08-11 22:03:53 |
| 183.250.202.89 | attackspam | Aug 11 12:12:43 *** sshd[22510]: User root from 183.250.202.89 not allowed because not listed in AllowUsers |
2020-08-11 21:57:06 |
| 117.48.227.152 | attack | Fail2Ban |
2020-08-11 22:11:35 |
| 222.186.42.137 | attack | Aug 11 15:51:19 vps639187 sshd\[8911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root Aug 11 15:51:21 vps639187 sshd\[8911\]: Failed password for root from 222.186.42.137 port 27455 ssh2 Aug 11 15:51:24 vps639187 sshd\[8911\]: Failed password for root from 222.186.42.137 port 27455 ssh2 ... |
2020-08-11 22:01:21 |
| 106.13.167.3 | attack | Aug 11 14:32:53 lnxded64 sshd[30398]: Failed password for root from 106.13.167.3 port 45344 ssh2 Aug 11 14:32:53 lnxded64 sshd[30398]: Failed password for root from 106.13.167.3 port 45344 ssh2 |
2020-08-11 22:00:58 |
| 218.92.0.185 | attackbots | Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 |
2020-08-11 22:01:48 |
| 182.61.3.157 | attack | Aug 11 14:00:45 marvibiene sshd[22914]: Failed password for root from 182.61.3.157 port 41048 ssh2 |
2020-08-11 21:36:37 |
| 51.38.225.124 | attackbotsspam | Automatic report - Banned IP Access |
2020-08-11 22:07:37 |
| 41.66.202.114 | attackspambots | TCP Port Scanning |
2020-08-11 21:51:26 |
| 152.136.105.190 | attack | Aug 11 15:09:56 abendstille sshd\[9579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190 user=root Aug 11 15:09:58 abendstille sshd\[9579\]: Failed password for root from 152.136.105.190 port 44800 ssh2 Aug 11 15:14:24 abendstille sshd\[13760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190 user=root Aug 11 15:14:27 abendstille sshd\[13760\]: Failed password for root from 152.136.105.190 port 34518 ssh2 Aug 11 15:18:43 abendstille sshd\[17711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190 user=root ... |
2020-08-11 21:41:11 |
| 173.234.153.122 | attack | 20 attempts against mh-misbehave-ban on pluto |
2020-08-11 21:35:18 |
| 222.186.175.182 | attackspambots | Aug 11 15:38:18 kh-dev-server sshd[24441]: Failed password for root from 222.186.175.182 port 39172 ssh2 ... |
2020-08-11 21:42:12 |
| 218.17.162.119 | attackbots | Aug 11 15:13:14 hosting sshd[11429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.162.119 user=root Aug 11 15:13:16 hosting sshd[11429]: Failed password for root from 218.17.162.119 port 55504 ssh2 ... |
2020-08-11 21:32:15 |
| 80.82.64.210 | attackbots | Aug 11 15:16:59 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=80.82.64.210 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=55845 PROTO=TCP SPT=46722 DPT=39954 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 15:19:10 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=80.82.64.210 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=54044 PROTO=TCP SPT=46722 DPT=39525 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 15:21:34 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=80.82.64.210 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=19467 PROTO=TCP SPT=46722 DPT=39450 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 15:22:00 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=80.82.64.210 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24506 PROTO=TCP SPT=46722 DPT=39049 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 15:22:07 *hid ... |
2020-08-11 21:31:01 |
| 187.141.128.42 | attackbots | Aug 11 09:12:14 NPSTNNYC01T sshd[18414]: Failed password for root from 187.141.128.42 port 36002 ssh2 Aug 11 09:13:20 NPSTNNYC01T sshd[18537]: Failed password for root from 187.141.128.42 port 38684 ssh2 ... |
2020-08-11 21:39:22 |