必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Richards Bay

省份(region): KwaZulu-Natal

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.21.80.0 - 196.21.87.255'

% Abuse contact for '196.21.80.0 - 196.21.87.255' is 'abuse@tenet.ac.za'

inetnum:        196.21.80.0 - 196.21.87.255
netname:        UZULU-196-21-80-0
descr:          University of Zululand
descr:          KwaDlangezwa
descr:          3886
country:        ZA
admin-c:        YCA-AFRINIC
tech-c:         SAA2-AFRINIC
status:         ASSIGNED PA
mnt-by:         TF-196-21-MNT
mnt-lower:      TF-196-21-MNT
source:         AFRINIC # Filtered
parent:         196.21.0.0 - 196.21.255.255

person:         Soren Aalto
address:        KwaDlangezwa
address:        kwaDlangezwa
address:        3886
address:        ZA
phone:          tel:+1-073-162-0548
phone:          tel:+27-35-902-6800
fax-no:         tel:+1-035-902-6028
nic-hdl:        SAA2-AFRINIC
mnt-by:         GENERATED-LW6QYFJFOTT55TWBUPMAN1L5HKTLUCGB-MNT
source:         AFRINIC # Filtered

person:         Yvette Canham
address:        KwaDlangezwa
address:        kwaDlangezwa
address:        3886
address:        ZA
phone:          tel:+1-083-779-9391
phone:          tel:+27-35-902-6802
fax-no:         tel:+1-035-902-6028
nic-hdl:        YCA-AFRINIC
mnt-by:         GENERATED-KJVSFFLRCV17TVUD2TSD7ATRNFLUJVCV-MNT
source:         AFRINIC # Filtered

% Information related to '196.21.0.0/16AS2018'

route:          196.21.0.0/16
descr:          MAINTAINED BY TENET
origin:         AS2018
mnt-by:         TNET-MNT01
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.21.82.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.21.82.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:50:10 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 154.82.21.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.82.21.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.236.227 attackspam
Jun  3 17:42:35 gw1 sshd[19375]: Failed password for root from 140.143.236.227 port 57652 ssh2
...
2020-06-04 02:26:08
148.223.120.122 attackbots
2020-06-03T18:54:10.153664tekno.at sshd[7122]: Failed password for root from 148.223.120.122 port 60333 ssh2
2020-06-03T18:57:52.882238tekno.at sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.223.120.122  user=root
2020-06-03T18:57:55.123782tekno.at sshd[7567]: Failed password for root from 148.223.120.122 port 58691 ssh2
...
2020-06-04 01:57:06
59.126.106.70 attack
Port probing on unauthorized port 2323
2020-06-04 02:16:11
14.160.52.58 attackspam
...
2020-06-04 01:56:32
162.144.128.178 attackspam
162.144.128.178 - - [03/Jun/2020:20:27:26 +0200] "GET /wp-login.php HTTP/1.1" 200 6106 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.144.128.178 - - [03/Jun/2020:20:27:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6390 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.144.128.178 - - [03/Jun/2020:20:27:32 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-04 02:32:15
172.245.52.30 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-04 01:55:47
89.252.232.82 attack
Jun  3 21:15:25 debian kernel: [110689.511143] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=89.252.232.82 DST=89.252.131.35 LEN=44 TOS=0x00 PREC=0x00 TTL=237 ID=2587 DF PROTO=TCP SPT=1089 DPT=8291 WINDOW=14600 RES=0x00 SYN URGP=0
2020-06-04 02:36:33
119.4.225.31 attackbots
Jun  3 13:48:34 ArkNodeAT sshd\[9099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31  user=root
Jun  3 13:48:36 ArkNodeAT sshd\[9099\]: Failed password for root from 119.4.225.31 port 51413 ssh2
Jun  3 13:49:17 ArkNodeAT sshd\[9111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31  user=root
2020-06-04 02:20:48
210.74.13.5 attackspambots
Jun  3 11:44:42 124388 sshd[2166]: Failed password for root from 210.74.13.5 port 42540 ssh2
Jun  3 11:46:55 124388 sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.13.5  user=root
Jun  3 11:46:57 124388 sshd[2180]: Failed password for root from 210.74.13.5 port 43102 ssh2
Jun  3 11:49:16 124388 sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.13.5  user=root
Jun  3 11:49:18 124388 sshd[2305]: Failed password for root from 210.74.13.5 port 43668 ssh2
2020-06-04 02:20:33
46.101.201.69 attackbotsspam
 TCP (SYN) 46.101.201.69:59684 -> port 20166, len 44
2020-06-04 01:52:25
37.11.163.29 attackbotsspam
Hits on port : 445
2020-06-04 02:33:09
111.229.102.53 attack
Jun  3 04:38:25 pixelmemory sshd[3966402]: Failed password for root from 111.229.102.53 port 38566 ssh2
Jun  3 04:43:42 pixelmemory sshd[3972037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.102.53  user=root
Jun  3 04:43:44 pixelmemory sshd[3972037]: Failed password for root from 111.229.102.53 port 37661 ssh2
Jun  3 04:49:03 pixelmemory sshd[3977931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.102.53  user=root
Jun  3 04:49:05 pixelmemory sshd[3977931]: Failed password for root from 111.229.102.53 port 36764 ssh2
...
2020-06-04 02:29:57
128.68.148.225 attack
20/6/3@07:49:35: FAIL: Alarm-Intrusion address from=128.68.148.225
...
2020-06-04 02:10:21
187.162.193.14 attack
Automatic report - Banned IP Access
2020-06-04 01:53:43
185.153.199.102 attackbots
DATE:2020-06-03 13:49:27, IP:185.153.199.102, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-06-04 02:13:07

最近上报的IP列表

216.167.81.18 205.70.134.42 10.20.9.104 97.65.67.161
34.26.247.78 218.57.69.114 10.232.10.72 202.2.87.223
61.64.146.18 13.179.139.26 169.254.110.75 190.157.85.3
2606:4700:10::ac43:1778 2606:4700:10::6814:6639 2606:4700:10::ac43:2364 2606:4700:10::ac43:824
2606:4700:10::6816:709 2606:4700:10::ac43:1016 2606:4700:10::6814:9726 2606:4700:10::6814:5865