城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '102.129.128.0 - 102.129.255.255'
% Abuse contact for '102.129.128.0 - 102.129.255.255' is 'report@abuseradar.com'
inetnum: 102.129.128.0 - 102.129.255.255
netname: Internet-Utilities-Africa-PTY-LTD-v4-3
descr: DET Africa (Pty) LTD
country: ZA
org: ORG-DAL1-AFRINIC
admin-c: PZ8-AFRINIC
admin-c: VG4-AFRINIC
admin-c: PU9-AFRINIC
admin-c: ER12-AFRINIC
admin-c: GM62-AFRINIC
tech-c: PZ8-AFRINIC
tech-c: VN17-AFRINIC
tech-c: RK62-AFRINIC
tech-c: PU9-AFRINIC
tech-c: ER12-AFRINIC
tech-c: GM62-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: netutils-mnt
mnt-domains: netutils-mnt
mnt-irt: IRT-NETUTILS
source: AFRINIC # Filtered
parent: 102.0.0.0 - 102.255.255.255
organisation: ORG-DAL1-AFRINIC
org-name: Internet Utilities Africa (PTY) LTD
org-type: LIR
country: ZA
address: 300 Acacia Road
address: Gauteng (2194)
phone: tel:+27-10-595-1279
phone: tel:+44-151-528-5820
phone: tel:+44-37069908833
phone: tel:+370-699-08833
admin-c: PU9-AFRINIC
admin-c: ER12-AFRINIC
admin-c: GM62-AFRINIC
admin-c: VG4-AFRINIC
admin-c: PZ8-AFRINIC
tech-c: PU9-AFRINIC
tech-c: ER12-AFRINIC
tech-c: GM62-AFRINIC
tech-c: RK62-AFRINIC
tech-c: VN17-AFRINIC
tech-c: PZ8-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: DAL1-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Edvinas Rackauskas
nic-hdl: ER12-AFRINIC
address: Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address: United Kingdom
address: London
address: Other
abuse-mailbox: report@abuseradar.com
phone: tel:+44-330-808-0975
mnt-by: IPXO-MNT
source: AFRINIC # Filtered
person: Gintare Mikolaviciute
address: Ground Floor, 4 Victoria Square, St Albans, address: Hertfordshire
address: London
address: United Kingdom
phone: tel:+370-699-08833
nic-hdl: GM62-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-QNNY6JPVCAHRHXWCMZTWCGYBYPSNHWKW-MNT
person: Paulius Urbonas
address: Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address: London
address: United Kingdom
phone: tel:+370-699-08833
nic-hdl: PU9-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-ZYI6LN9JYTSFUIZ1PE5MAU8U58WFHQHK-MNT
person: Paulius Zaura
address: Ground Floor, 4 Victoria Square, St Albans, address: Hertfordshire
address: London
address: United Kingdom
phone: tel:+370-699-08833
nic-hdl: PZ8-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-PYEUHBXKJ43AUEHY1FEFVRTC0W65OTPE-MNT
person: Rugile Katiliute
address: Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address: London
address: United Kingdom
phone: tel:+370-658-96325
nic-hdl: RK62-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-P1UMN3XW6HENYKFOKUXPMEQSLOTWLEL5-MNT
person: Vincentas Grinius
nic-hdl: VG4-AFRINIC
address: 300 Acacia Road
address: Darrenwood
address: Randburg
address: Gauteng 2194
address: South Africa
address: Randburg
address: Other
phone: tel:+27-10-595-1279
mnt-by: IPXO-MNT
source: AFRINIC # Filtered
person: Vladislav Novickas
address: Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address: London
address: United Kingdom
phone: tel:+44-37069908833
nic-hdl: VN17-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-RBL5LVAWDNMCLANKL7SLLCJBDGLLKRBL-MNT
% Information related to '102.129.165.0/24AS329184'
route: 102.129.165.0/24
origin: AS329184
descr: IPXO
mnt-by: DAL1-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.129.165.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1005
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.129.165.86. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 22:54:52 CST 2025
;; MSG SIZE rcvd: 107
Host 86.165.129.102.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 86.165.129.102.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.84.179.214 | attackbotsspam | Unauthorized connection attempt from IP address 115.84.179.214 on Port 445(SMB) |
2020-05-09 21:21:32 |
| 51.75.140.153 | attack | SSH-BruteForce |
2020-05-09 20:59:10 |
| 216.244.66.227 | attackspam | 20 attempts against mh-misbehave-ban on plane |
2020-05-09 20:56:25 |
| 183.63.87.236 | attack | $f2bV_matches |
2020-05-09 21:23:40 |
| 101.91.205.181 | attack | Unauthorized connection attempt detected from IP address 101.91.205.181 to port 6380 [T] |
2020-05-09 21:15:29 |
| 185.143.75.157 | attackspam | May 9 04:58:22 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 9 04:59:02 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 9 04:59:45 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-09 21:11:55 |
| 183.88.38.16 | attack | 1585235485 - 03/26/2020 16:11:25 Host: 183.88.38.16/183.88.38.16 Port: 445 TCP Blocked |
2020-05-09 21:00:12 |
| 54.39.22.191 | attackbotsspam | odoo8 ... |
2020-05-09 21:38:28 |
| 177.125.164.225 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-05-09 21:40:20 |
| 159.89.177.46 | attackspambots | May 9 02:18:12 xeon sshd[19726]: Failed password for invalid user computer from 159.89.177.46 port 49546 ssh2 |
2020-05-09 21:24:14 |
| 222.186.180.130 | attackbots | May 9 04:54:26 santamaria sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root May 9 04:54:28 santamaria sshd\[14323\]: Failed password for root from 222.186.180.130 port 20656 ssh2 May 9 04:54:30 santamaria sshd\[14323\]: Failed password for root from 222.186.180.130 port 20656 ssh2 ... |
2020-05-09 21:26:01 |
| 58.87.120.53 | attackbots | 2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252 2020-05-09T00:42:38.185882abusebot-5.cloudsearch.cf sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53 2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252 2020-05-09T00:42:40.092278abusebot-5.cloudsearch.cf sshd[25979]: Failed password for invalid user xqf from 58.87.120.53 port 47252 ssh2 2020-05-09T00:46:45.379022abusebot-5.cloudsearch.cf sshd[25982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53 user=root 2020-05-09T00:46:47.195057abusebot-5.cloudsearch.cf sshd[25982]: Failed password for root from 58.87.120.53 port 45858 ssh2 2020-05-09T00:50:38.742572abusebot-5.cloudsearch.cf sshd[25988]: Invalid user pk from 58.87.120.53 port 44376 ... |
2020-05-09 20:47:23 |
| 159.89.171.121 | attack | May 9 04:31:10 host sshd[55957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.letsthankyou.com user=root May 9 04:31:12 host sshd[55957]: Failed password for root from 159.89.171.121 port 39460 ssh2 ... |
2020-05-09 21:19:38 |
| 222.186.180.41 | attack | May 9 04:58:32 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2 May 9 04:58:35 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2 May 9 04:58:38 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2 May 9 04:58:41 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2 ... |
2020-05-09 21:20:39 |
| 94.102.52.57 | attackbots | Fail2Ban Ban Triggered |
2020-05-09 21:25:22 |