城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '154.12.0.0 - 154.12.255.255'
% No abuse contact registered for 154.12.0.0 - 154.12.255.255
inetnum: 154.12.0.0 - 154.12.255.255
netname: NET-154-12-0-0
descr: __________________________
descr: This block is allocated to an organization in the ARIN
descr: region. Please query whois.arin.net for more
descr: information on the registrant.
descr: __________________________
country: MU
org: ORG-AFNC1-AFRINIC
admin-c: TEAM-AFRINIC
tech-c: TEAM-AFRINIC
status: ALLOCATED UNSPECIFIED
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
parent: 154.0.0.0 - 154.255.255.255
organisation: ORG-AFNC1-AFRINIC
org-name: African Network Information Center - (AfriNIC) Ltd
org-type: RIR
country: MU
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène
phone: tel:+230-466-6758
phone: tel:+230-403-5100
admin-c: CA15-AFRINIC
tech-c: IT7-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-IT-MNT
mnt-ref: AFRINIC-DB-MNT
mnt-by: AFRINIC-HM-MNT
remarks: =======================================
remarks: For more information on AFRINIC assigned blocks,
remarks: querry whois.afrinic.net port 43, or the web based
remarks: query at http://whois.afrinic.net or www.afrinic.net
remarks: website: www.afrinic.net
remarks: Other Contacts:
remarks: ===============
remarks: hostmaster@afrinic.net - for IP resources
remarks: new-member@afrinic.net - for new members and other
remarks: inquiries.
source: AFRINIC # Filtered
role: AfriNIC TEAM
address: Raffles Tower - 11th Floor
address: Cybercity
address: Mauritius
phone: tel:+230-403-5100
fax-no: tel:+230-466-6758
admin-c: CA15-AFRINIC
tech-c: CA15-AFRINIC
nic-hdl: TEAM-AFRINIC
mnt-by: AFRINIC-DB-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.12.59.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.12.59.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040200 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 18:43:21 CST 2026
;; MSG SIZE rcvd: 106
Host 162.59.12.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 162.59.12.154.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.52.247.198 | attackbots | Exploited Host. |
2020-07-26 01:22:44 |
| 185.129.169.136 | attackbotsspam | Port Scan ... |
2020-07-26 01:32:03 |
| 106.53.117.10 | attackbots | Jul 25 18:59:27 fhem-rasp sshd[15505]: Invalid user zhanglei from 106.53.117.10 port 38124 ... |
2020-07-26 01:18:17 |
| 14.55.229.63 | attackbots | Exploited Host. |
2020-07-26 01:13:49 |
| 192.34.63.128 | attack | $f2bV_matches |
2020-07-26 01:14:12 |
| 139.219.0.102 | attackspambots | Jul 25 17:27:33 vmd36147 sshd[9571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 Jul 25 17:27:35 vmd36147 sshd[9571]: Failed password for invalid user sona from 139.219.0.102 port 25978 ssh2 Jul 25 17:31:30 vmd36147 sshd[18209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 ... |
2020-07-26 01:15:49 |
| 94.112.234.161 | attack | Automatic report - XMLRPC Attack |
2020-07-26 01:17:32 |
| 82.14.14.121 | attack | Honeypot attack, port: 5555, PTR: cpc147278-walt27-2-0-cust120.13-2.cable.virginm.net. |
2020-07-26 01:25:02 |
| 109.65.67.8 | attackbotsspam | Automatic report - Port Scan Attack |
2020-07-26 01:22:17 |
| 218.92.0.221 | attack | Jul 25 19:05:07 abendstille sshd\[14741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221 user=root Jul 25 19:05:09 abendstille sshd\[14741\]: Failed password for root from 218.92.0.221 port 54206 ssh2 Jul 25 19:05:16 abendstille sshd\[14830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221 user=root Jul 25 19:05:18 abendstille sshd\[14830\]: Failed password for root from 218.92.0.221 port 24904 ssh2 Jul 25 19:05:20 abendstille sshd\[14830\]: Failed password for root from 218.92.0.221 port 24904 ssh2 ... |
2020-07-26 01:07:09 |
| 64.20.52.114 | attackbots | Port probe and connect to SMTP:25 x 2. Auth intiated but dropped. |
2020-07-26 01:09:14 |
| 14.160.41.70 | attack | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-07-26 01:33:48 |
| 111.231.190.106 | attackspambots | Invalid user cyn from 111.231.190.106 port 52406 |
2020-07-26 01:03:40 |
| 218.241.202.58 | attackspambots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-25T15:14:08Z and 2020-07-25T15:21:29Z |
2020-07-26 01:02:55 |
| 14.44.100.170 | attackbotsspam | Exploited Host. |
2020-07-26 01:34:30 |