城市(city): unknown
省份(region): unknown
国家(country): Rwanda
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '197.234.244.0 - 197.234.247.255'
% No abuse contact registered for 197.234.244.0 - 197.234.247.255
inetnum: 197.234.244.0 - 197.234.247.255
netname: ISPA
descr: ISPA Ltd
country: RW
org: ORG-IL25-AFRINIC
admin-c: Sk20-AFRINIC
tech-c: YK10-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: ISPA-MNT
mnt-domains: ISPA-MNT
source: AFRINIC # Filtered
parent: 197.0.0.0 - 197.255.255.255
organisation: ORG-IL25-AFRINIC
org-name: ISPA Ltd
org-type: LIR
country: RW
address: 360 Boulevard Umuganda
address: Kigali 360
phone: tel:+250-788-303-181
phone: tel:+250-788-303-181
admin-c: Sk20-AFRINIC
tech-c: YK10-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: ISPA-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Serguei Kisselev
address: Kigali 360
address: RW
phone: tel:+250-788-563-046
nic-hdl: SK20-AFRINIC
mnt-by: GENERATED-FKZXJW2FQGJSVZDKR5OMININP2S3QAPT-MNT
source: AFRINIC # Filtered
person: Yvon Kaningu
address: 360 Airport Road, Kigali
phone: tel:+250-788-303-181
nic-hdl: YK10-AFRINIC
mnt-by: GENERATED-BMKBENEUOVE2XRE5MME5PD1PLNYDSGI0-MNT
source: AFRINIC # Filtered
% Information related to '197.234.244.0/22AS37547'
route: 197.234.244.0/22
descr: ISPA-Rwanda
origin: AS37547
mnt-by: ISPA-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.234.245.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.234.245.250. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032501 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 03:47:44 CST 2026
;; MSG SIZE rcvd: 108
Host 250.245.234.197.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 250.245.234.197.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 3.130.31.31 | attackbotsspam | Aug 14 04:09:33 XXX sshd[41460]: Invalid user sn0wcat from 3.130.31.31 port 47494 |
2019-08-14 14:52:40 |
| 147.135.95.253 | attack | HTTP/80/443 Probe, BF, WP, Hack - |
2019-08-14 14:52:59 |
| 46.254.241.205 | attackspam | Unauthorized connection attempt from IP address 46.254.241.205 on Port 445(SMB) |
2019-08-14 14:45:06 |
| 103.60.126.65 | attack | Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: Invalid user meng from 103.60.126.65 port 18635 Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65 Aug 14 07:03:31 v22018076622670303 sshd\[12257\]: Failed password for invalid user meng from 103.60.126.65 port 18635 ssh2 ... |
2019-08-14 14:00:53 |
| 103.55.215.49 | attackspambots | Unauthorized connection attempt from IP address 103.55.215.49 on Port 445(SMB) |
2019-08-14 14:25:27 |
| 190.226.43.250 | attackspam | Unauthorized connection attempt from IP address 190.226.43.250 on Port 445(SMB) |
2019-08-14 14:41:31 |
| 14.177.239.123 | attackbotsspam | Unauthorized connection attempt from IP address 14.177.239.123 on Port 445(SMB) |
2019-08-14 14:04:05 |
| 40.86.231.125 | attackbotsspam | Aug 14 07:47:26 mail sshd\[12444\]: Invalid user ronald from 40.86.231.125 Aug 14 07:47:26 mail sshd\[12444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.86.231.125 Aug 14 07:47:28 mail sshd\[12444\]: Failed password for invalid user ronald from 40.86.231.125 port 1152 ssh2 ... |
2019-08-14 14:27:27 |
| 209.242.223.133 | attackspam | Automatic report - Banned IP Access |
2019-08-14 14:29:54 |
| 167.71.229.187 | attackspambots | : |
2019-08-14 14:40:16 |
| 157.230.178.211 | attack | Aug 14 08:42:02 yabzik sshd[26360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.211 Aug 14 08:42:04 yabzik sshd[26360]: Failed password for invalid user memuser from 157.230.178.211 port 51010 ssh2 Aug 14 08:46:52 yabzik sshd[27986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.211 Aug 14 08:46:54 yabzik sshd[27986]: Failed password for invalid user admin from 157.230.178.211 port 43582 ssh2 |
2019-08-14 14:13:05 |
| 51.38.186.47 | attack | Aug 14 07:17:55 SilenceServices sshd[16290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47 Aug 14 07:17:57 SilenceServices sshd[16290]: Failed password for invalid user bash from 51.38.186.47 port 58266 ssh2 Aug 14 07:22:32 SilenceServices sshd[19470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47 |
2019-08-14 14:32:08 |
| 103.24.75.162 | attack | Unauthorized connection attempt from IP address 103.24.75.162 on Port 445(SMB) |
2019-08-14 14:46:36 |
| 211.252.19.254 | attack | Invalid user cinema from 211.252.19.254 port 40952 |
2019-08-14 14:16:55 |
| 82.221.131.71 | attack | (sshd) Failed SSH login from 82.221.131.71 (-): 5 in the last 3600 secs |
2019-08-14 14:12:21 |