城市(city): Casablanca
省份(region): Casablanca-Settat
国家(country): Morocco
运营商(isp): IAM
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '196.64.0.0 - 196.95.255.255'
% No abuse contact registered for 196.64.0.0 - 196.95.255.255
inetnum: 196.64.0.0 - 196.95.255.255
netname: ADSL-4G-SERVICES
descr: Maroc Telecom
country: MA
org: ORG-ONdP1-AFRINIC
admin-c: SM13-AFRINIC
admin-c: KA89-AFRINIC
tech-c: SM13-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: ONPT-MNT
source: AFRINIC # Filtered
parent: 196.0.0.0 - 196.255.255.255
organisation: ORG-ONdP1-AFRINIC
org-name: Office National des Postes et Telecommunications ONPT (Maroc Telecom) / IAM
org-type: LIR
country: MA
address: Division Exploitation et maintenance des PFS
address: MAROC TELECOM
address: Avenue Hay annakhil immeuble Riad 2
address: Rabat
address: Morocoo
phone: tel:+212-5372-84314
phone: tel:+212-37203022
admin-c: SM13-AFRINIC
admin-c: KA89-AFRINIC
tech-c: SM13-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: ONPT-MNT
mnt-by: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered
person: Kaddouhi Abdelaziz
address: Avenue Annakhil Maroc Telecom Rabat
address: RABAT
address: Morocco
phone: tel:+212-5372-85549
nic-hdl: KA89-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-P6SZUCS7GAJHPELP6WVSRCFIOV8WGIGB-MNT
person: Sektaoui Marouane
nic-hdl: SM13-AFRINIC
address: Maroc Telecom
address: Rabat
address: Morocco
phone: tel:+212-5376-86318
remarks: Ingenieur Reseaux
remarks: Service Exploitation des Plates-formes
remarks: de Services/Division Exploitation et
remarks: Maintenance des Plates-formes de
remarks: Services
mnt-by: GENERATED-KPHLBILBATGCQACTMADSBE8WVX35UDAG-MNT
source: AFRINIC # Filtered
% Information related to '196.64.0.0/11AS36903'
route: 196.64.0.0/11
descr: route object
origin: AS36903
mnt-by: ONPT-MNT
source: AFRINIC # Filtered
% Information related to '196.64.0.0/11AS6713'
route: 196.64.0.0/11
descr: route object
origin: AS6713
mnt-by: ONPT-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.92.7.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.92.7.187. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 08:37:07 CST 2026
;; MSG SIZE rcvd: 105
Host 187.7.92.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 187.7.92.196.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 171.248.69.146 | attackbotsspam | Unauthorized connection attempt detected from IP address 171.248.69.146 to port 8088 |
2020-06-29 03:30:48 |
| 202.83.161.119 | attackspam | Jun 28 14:08:59 host sshd[15037]: Invalid user inssserver from 202.83.161.119 port 37656 ... |
2020-06-29 03:25:50 |
| 49.51.9.134 | attack | Unauthorized connection attempt detected from IP address 49.51.9.134 to port 8889 |
2020-06-29 03:07:58 |
| 103.75.208.53 | attack | Jun 28 14:08:01 onepixel sshd[1100678]: Invalid user user4 from 103.75.208.53 port 44028 Jun 28 14:08:01 onepixel sshd[1100678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.208.53 Jun 28 14:08:01 onepixel sshd[1100678]: Invalid user user4 from 103.75.208.53 port 44028 Jun 28 14:08:03 onepixel sshd[1100678]: Failed password for invalid user user4 from 103.75.208.53 port 44028 ssh2 Jun 28 14:10:30 onepixel sshd[1102090]: Invalid user babu from 103.75.208.53 port 50358 |
2020-06-29 03:18:01 |
| 115.209.86.178 | attack | Unauthorized connection attempt detected from IP address 115.209.86.178 to port 23 |
2020-06-29 03:35:20 |
| 183.109.138.33 | attack | Unauthorized connection attempt detected from IP address 183.109.138.33 to port 81 |
2020-06-29 03:13:26 |
| 51.178.52.56 | attackbotsspam | 2020-06-27T03:40:25.459633hostname sshd[50769]: Failed password for invalid user postgres from 51.178.52.56 port 43672 ssh2 ... |
2020-06-29 03:41:42 |
| 66.50.20.160 | attackspam | Unauthorized connection attempt detected from IP address 66.50.20.160 to port 23 |
2020-06-29 03:40:14 |
| 189.102.141.160 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-06-29 03:26:23 |
| 36.37.126.98 | attack | Unauthorized connection attempt detected from IP address 36.37.126.98 to port 445 |
2020-06-29 03:09:09 |
| 114.233.34.162 | attack | Unauthorized connection attempt detected from IP address 114.233.34.162 to port 23 |
2020-06-29 03:17:24 |
| 186.250.12.248 | attack | Unauthorized connection attempt detected from IP address 186.250.12.248 to port 23 |
2020-06-29 03:27:10 |
| 117.50.2.38 | attackbotsspam | Unauthorized connection attempt detected from IP address 117.50.2.38 to port 3622 |
2020-06-29 03:34:25 |
| 95.7.102.31 | attackbotsspam | Unauthorized connection attempt detected from IP address 95.7.102.31 to port 23 |
2020-06-29 03:37:42 |
| 197.119.216.12 | attackbots | Unauthorized connection attempt detected from IP address 197.119.216.12 to port 445 |
2020-06-29 03:26:08 |