城市(city): Curepipe
省份(region): Plaines Wilhems
国家(country): Mauritius
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '102.112.0.0 - 102.119.255.255'
% No abuse contact registered for 102.112.0.0 - 102.119.255.255
inetnum: 102.112.0.0 - 102.119.255.255
netname: MauritiusTelecom-v4
descr: Mauritius Telecom Ltd
country: MU
org: ORG-mA21-AFRINIC
admin-c: DR22-AFRINIC
admin-c: NG28-AFRINIC
admin-c: RB26-AFRINIC
admin-c: JL279-AFRINIC
admin-c: IJ7-AFRINIC
tech-c: DR22-AFRINIC
tech-c: NG28-AFRINIC
tech-c: RB26-AFRINIC
tech-c: JL279-AFRINIC
tech-c: IJ7-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: MU-MT-WIS-MNT
mnt-domains: MU-MT-WIS-MNT
source: AFRINIC # Filtered
parent: 102.0.0.0 - 102.255.255.255
organisation: ORG-mA21-AFRINIC
org-name: Mauritius Telecom Ltd
org-type: LIR
country: MU
address: 4th Floor
address: Orange Tower
address: Ebene
address: Ebene
phone: tel:+230-203-7000
phone: tel:+230-404-3118
phone: tel:+230-404-3106
phone: tel:+230-404-3117
fax-no: tel:+230-208-1070
admin-c: DR22-AFRINIC
admin-c: NG28-AFRINIC
admin-c: JL279-AFRINIC
admin-c: RB26-AFRINIC
admin-c: IJ7-AFRINIC
tech-c: DR22-AFRINIC
tech-c: NG28-AFRINIC
tech-c: JL279-AFRINIC
tech-c: RB26-AFRINIC
tech-c: IJ7-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: MU-MT-WIS-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Dheeraj Ramkhelawon
address: 4th Floor
address: Myt Tower
address: Ebene
address: Mauritius
address: Ebene
address: Other
phone: tel:+230-404-3118
nic-hdl: DR22-AFRINIC
mnt-by: GENERATED-POIVPI7O6FPBZXYLX43E4WTGB71754AR-MNT
source: AFRINIC # Filtered
person: Iqbal Janmahomed
address: Level 4 MyT tower
address: Ebene Vybercity
phone: tel:+230-5253-1584
phone: tel:+230-404-3152
nic-hdl: IJ7-AFRINIC
mnt-by: GENERATED-QS3X43N5PTZ0X897WNQX50XIIPKVIN8O-MNT
source: AFRINIC # Filtered
person: Johnny Lim Fook
nic-hdl: JL279-AFRINIC
address: 7th Floor
address: Telecom Tower
address: Edith Cavell Street
address: Port Louis
address: Mauritius
phone: tel:+230-5251-4942
fax-no: tel:+230-212-8290
mnt-by: MU-TELECOMPLUS-MNT
source: AFRINIC # Filtered
person: Norman Ghanty
address: 4th Floor
address: Orange Tower
address: Ebene
address: Mauritius
phone: tel:+230-5251-6701
phone: tel:+230-404-3117
nic-hdl: NG28-AFRINIC
mnt-by: GENERATED-8EHNCP81DKN7HLRANLGNDUTQC8FHPHGV-MNT
source: AFRINIC # Filtered
person: Ranjit Barah
address: 4th Floor
address: Myt Tower
address: Ebene
address: Mauritius
address: Ebene
address: Other
phone: tel:+230-404-3106
nic-hdl: RB26-AFRINIC
mnt-by: GENERATED-AVWWY9FBLGZHHNU5ZBBRDGBSK58ACQ6L-MNT
source: AFRINIC # Filtered
% Information related to '102.112.0.0/13AS23889'
route: 102.112.0.0/13
descr: MauritiusTelecom
origin: AS23889
mnt-by: MU-MT-WIS-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.113.130.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.113.130.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110901 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 09:03:51 CST 2025
;; MSG SIZE rcvd: 108
Host 216.130.113.102.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 216.130.113.102.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.24.131.189 | attack | W 31101,/var/log/nginx/access.log,-,- |
2020-04-03 02:53:03 |
| 222.186.30.35 | attackspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-04-03 02:56:04 |
| 88.99.203.111 | attack | fail2ban |
2020-04-03 03:10:26 |
| 222.186.30.57 | attackspambots | Apr 2 14:35:54 plusreed sshd[11578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Apr 2 14:35:55 plusreed sshd[11578]: Failed password for root from 222.186.30.57 port 54879 ssh2 ... |
2020-04-03 02:42:42 |
| 35.132.220.0 | botsattack | Attempt to duplicate copyrighted data and complete disregard for bandwidth restrictions; over 280,000 requests in 2 hours. |
2020-04-03 03:14:03 |
| 208.100.26.228 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-03 02:49:15 |
| 49.88.112.76 | attack | Apr 3 01:40:09 webhost01 sshd[23422]: Failed password for root from 49.88.112.76 port 19857 ssh2 ... |
2020-04-03 03:09:52 |
| 103.248.211.203 | attack | 2020-04-02T16:12:41.552265abusebot-5.cloudsearch.cf sshd[1125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.211.203 user=root 2020-04-02T16:12:44.275459abusebot-5.cloudsearch.cf sshd[1125]: Failed password for root from 103.248.211.203 port 43338 ssh2 2020-04-02T16:17:26.461235abusebot-5.cloudsearch.cf sshd[1258]: Invalid user vu from 103.248.211.203 port 48296 2020-04-02T16:17:26.469495abusebot-5.cloudsearch.cf sshd[1258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.211.203 2020-04-02T16:17:26.461235abusebot-5.cloudsearch.cf sshd[1258]: Invalid user vu from 103.248.211.203 port 48296 2020-04-02T16:17:28.985802abusebot-5.cloudsearch.cf sshd[1258]: Failed password for invalid user vu from 103.248.211.203 port 48296 ssh2 2020-04-02T16:20:57.012316abusebot-5.cloudsearch.cf sshd[1370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.211.20 ... |
2020-04-03 03:15:05 |
| 207.248.62.98 | attack | 2020-04-02T19:10:05.405199ns386461 sshd\[18774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.248.62.98 user=root 2020-04-02T19:10:06.928668ns386461 sshd\[18774\]: Failed password for root from 207.248.62.98 port 41640 ssh2 2020-04-02T19:21:09.375883ns386461 sshd\[29329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.248.62.98 user=root 2020-04-02T19:21:11.390574ns386461 sshd\[29329\]: Failed password for root from 207.248.62.98 port 43350 ssh2 2020-04-02T19:24:19.358431ns386461 sshd\[32203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.248.62.98 user=root ... |
2020-04-03 03:16:36 |
| 61.79.50.231 | attackbots | $f2bV_matches |
2020-04-03 02:41:18 |
| 58.221.7.174 | attackbotsspam | 2020-04-02T18:35:52.647845v22018076590370373 sshd[29290]: Invalid user cadmin from 58.221.7.174 port 35352 2020-04-02T18:35:52.653609v22018076590370373 sshd[29290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.7.174 2020-04-02T18:35:52.647845v22018076590370373 sshd[29290]: Invalid user cadmin from 58.221.7.174 port 35352 2020-04-02T18:35:54.668931v22018076590370373 sshd[29290]: Failed password for invalid user cadmin from 58.221.7.174 port 35352 ssh2 2020-04-02T18:39:49.160400v22018076590370373 sshd[31779]: Invalid user richards from 58.221.7.174 port 58882 ... |
2020-04-03 03:05:52 |
| 45.14.150.52 | attackbotsspam | Apr 2 20:23:27 vps647732 sshd[9238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.52 Apr 2 20:23:29 vps647732 sshd[9238]: Failed password for invalid user ssq from 45.14.150.52 port 54950 ssh2 ... |
2020-04-03 03:06:55 |
| 112.85.42.172 | attackspambots | Apr 2 21:03:39 minden010 sshd[22552]: Failed password for root from 112.85.42.172 port 2284 ssh2 Apr 2 21:03:42 minden010 sshd[22552]: Failed password for root from 112.85.42.172 port 2284 ssh2 Apr 2 21:03:45 minden010 sshd[22552]: Failed password for root from 112.85.42.172 port 2284 ssh2 Apr 2 21:03:48 minden010 sshd[22552]: Failed password for root from 112.85.42.172 port 2284 ssh2 ... |
2020-04-03 03:12:10 |
| 223.74.154.215 | attackbots | Brute Force |
2020-04-03 02:51:35 |
| 114.67.66.199 | attack | Apr 2 18:45:55 gw1 sshd[27226]: Failed password for root from 114.67.66.199 port 41112 ssh2 ... |
2020-04-03 02:40:39 |