必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '197.80.0.0 - 197.87.255.255'

% Abuse contact for '197.80.0.0 - 197.87.255.255' is 'abuse@optinet.net'

inetnum:        197.80.0.0 - 197.87.255.255
netname:        OPTINET-17-20110601
descr:          Dimension Data
country:        ZA
org:            ORG-DD1-AFRINIC
admin-c:        EK43-AFRINIC
admin-c:        DA25-AFRINIC
admin-c:        JA50-AFRINIC
admin-c:        SM144-AFRINIC
admin-c:        MDP1-AFRINIC
admin-c:        FH9-AFRINIC
admin-c:        PD19-AFRINIC
admin-c:        ZM11-AFRINIC
admin-c:        NK18-AFRINIC
admin-c:        ZT12-AFRINIC
admin-c:        RS62-AFRINIC
tech-c:         EK43-AFRINIC
tech-c:         DA25-AFRINIC
tech-c:         JA50-AFRINIC
tech-c:         SM144-AFRINIC
tech-c:         FH9-AFRINIC
tech-c:         PD19-AFRINIC
tech-c:         ZM11-AFRINIC
tech-c:         NK18-AFRINIC
tech-c:         ZT12-AFRINIC
tech-c:         RS62-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      IS-OPTINET-MNT
mnt-domains:    IS-OPTINET-MNT
mnt-irt:        IRT-OPTINET-ABUSE
source:         AFRINIC # Filtered
parent:         197.0.0.0 - 197.255.255.255

organisation:   ORG-DD1-AFRINIC
org-name:       Dimension Data
org-type:       LIR
country:        ZA
address:        The Campus,
address:        57 Sloane St,
address:        Bryanston
address:        Johannesburg 2021
phone:          tel:+27-72-614-3611
phone:          tel:+27-11-575-0325
phone:          tel:+27-11-575-0969
admin-c:        JA50-AFRINIC
admin-c:        DA25-AFRINIC
admin-c:        EK43-AFRINIC
admin-c:        MDP1-AFRINIC
admin-c:        SM144-AFRINIC
admin-c:        NK18-AFRINIC
admin-c:        ZM11-AFRINIC
admin-c:        PD19-AFRINIC
admin-c:        FH9-AFRINIC
admin-c:        ZT12-AFRINIC
admin-c:        RS62-AFRINIC
tech-c:         JA50-AFRINIC
tech-c:         DA25-AFRINIC
tech-c:         EK43-AFRINIC
tech-c:         MDP1-AFRINIC
tech-c:         SM144-AFRINIC
tech-c:         NK18-AFRINIC
tech-c:         ZM11-AFRINIC
tech-c:         PD19-AFRINIC
tech-c:         FH9-AFRINIC
tech-c:         ZT12-AFRINIC
tech-c:         RS62-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        TF-168-209-0-0-168-210-255-255-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         DNS Administration
address:        PO BOX 3234
address:        Parklands, Gauteng 2121
address:        ZA
phone:          tel:+27-11-447-5566
fax-no:         tel:+27-11-447-5567
nic-hdl:        DA25-AFRINIC
mnt-by:         GENERATED-5DRIE83KKFOSLY1J26BA6OERWG7UT3KG-MNT
source:         AFRINIC # Filtered

person:         Elne Kramer
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
phone:          tel:+27-11-575-7845
nic-hdl:        EK43-AFRINIC
mnt-by:         GENERATED-MH5BHHWXXJNMX1MQLYAJHIY9HED5QGHA-MNT
source:         AFRINIC # Filtered

person:         Faiz Hartley
nic-hdl:        FH9-AFRINIC
address:        100 Fairway Close
address:        Cape Town 7500
address:        South Africa
address:        Cape Town
address:        Other
phone:          tel:+27-21-596-4700
mnt-by:         GENERATED-SRDU2OPM7ENJQXAL2K51PPF7CBCIQAGH-MNT
source:         AFRINIC # Filtered

person:         Jehad Arnold
address:        100 Fairway Close
address:        Cape Town 7500
address:        South Africa
phone:          +0215964700
nic-hdl:        JA50-AFRINIC
mnt-by:         GENERATED-TVETECITNYRHD1CINUQQA0H9U7STCYUA-MNT
source:         AFRINIC # Filtered

person:         Marcel Di Perna
nic-hdl:        MDP1-AFRINIC
address:        Mweb Building
address:        100 Fairway Close
address:        Parow
address:        Cape Town 7500
address:        South Africa
phone:          tel:+27-21-596-4755
org:            ORG-MA20-AFRINIC
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Niel Kruger
nic-hdl:        NK18-AFRINIC
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
address:        JHB
address:        South Africa
phone:          tel:+27-87-354-0207
mnt-by:         GENERATED-ACXHGWHAPVIDGKL5YZMHPRHOLBXUU0GO-MNT
source:         AFRINIC # Filtered

person:         Pawel Dabrowski
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
address:        Johannesburg
address:        South Africa
phone:          tel:+27-83-554-1177
phone:          tel:+27-11-575-0044
nic-hdl:        PD19-AFRINIC
mnt-by:         GENERATED-ZWDYJ2VCIBPGR9R7QJRROAVSGRMM4TCU-MNT
source:         AFRINIC # Filtered

person:         Ruan Snyman
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        Africa
phone:          tel:+27-11-575-7845
nic-hdl:        RS62-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-W1JB6VTGPJZZJPXCKIRMBRMY57SMLJK3-MNT

person:         Sandeep Makan
nic-hdl:        SM144-AFRINIC
address:        57 Sloane street
address:        The Campus
address:        Bryanston 2021
address:        South Africa
address:        Johannesburg
address:        South Africa
phone:          tel:+27-11-575-0969
mnt-by:         GENERATED-NLOHSH0UN9GCE7Y5YXJQLLCRDOFTMOAE-MNT
source:         AFRINIC # Filtered

person:         Ziyaad Munshi
nic-hdl:        ZM11-AFRINIC
address:        The Campus, 57 Sloane Street
address:        Bryanston
address:        Gauteng
address:        Johannesburg 2021
address:        Johannesburg
address:        Other
phone:          tel:+27-11-575-0211
mnt-by:         GENERATED-CSQQAVAMDFYEN4RG8RLAQ3T44NPRWWIG-MNT
source:         AFRINIC # Filtered

person:         IS Hostmaster
nic-hdl:        ZT12-AFRINIC
address:        The Internet Solution
address:        The Campus, 57 Sloane Street
address:        Bryanston
address:        Gauteng
address:        Johannesburg 2021
address:        South Africa
phone:          tel:+27-11-575-1000
org:            ORG-TIS1-AFRINIC
mnt-by:         GENERATED-4THKYWBYLLP54MAK15NBL6CWUURHVN1A-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.82.86.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.82.86.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 10:44:20 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 43.86.82.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.86.82.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.89.3.117 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-06 18:13:17
175.207.13.200 attack
Nov  5 20:58:46 web9 sshd\[7397\]: Invalid user sds33322 from 175.207.13.200
Nov  5 20:58:46 web9 sshd\[7397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
Nov  5 20:58:48 web9 sshd\[7397\]: Failed password for invalid user sds33322 from 175.207.13.200 port 37420 ssh2
Nov  5 21:03:52 web9 sshd\[8068\]: Invalid user apaajaboleh from 175.207.13.200
Nov  5 21:03:52 web9 sshd\[8068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
2019-11-06 17:44:36
159.224.194.240 attackspambots
Nov  6 04:05:58 ws19vmsma01 sshd[245108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.194.240
Nov  6 04:06:01 ws19vmsma01 sshd[245108]: Failed password for invalid user usuario from 159.224.194.240 port 35454 ssh2
...
2019-11-06 17:53:22
152.136.86.234 attack
Automatic report - Banned IP Access
2019-11-06 17:57:42
198.50.183.49 attack
(From projobnetwork1@outlook.com) I came across your website and just wanted to reach
out to see if you're hiring? 

If so, I'd like to extend an offer to post to top job sites like
ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost
for two weeks. 

Here are some of the key benefits: 

-- Post to top job sites with one click 
-- Manage all candidates in one place 
-- No cost for two weeks 

You can post your job openings now by going to our website below: 

>> TryProJob [dot] com 

* Please use offer code 987FREE -- Expires Soon * 

Thanks for your time, 
Ryan C. 

Pro Job Network 
10451 Twin Rivers Rd #279 
Columbia, MD 21044 

To OPT OUT, please email ryanc [at] pjnmail [dot] com
with "REMOVE southernctchiro.com" in the subject line.
2019-11-06 18:01:57
195.210.138.206 attackspambots
Fail2Ban Ban Triggered
2019-11-06 17:46:59
118.26.22.50 attackspambots
Nov  5 19:51:47 srv3 sshd\[7053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 19:51:49 srv3 sshd\[7053\]: Failed password for root from 118.26.22.50 port 19791 ssh2
Nov  5 19:59:24 srv3 sshd\[7176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 20:12:12 srv3 sshd\[7422\]: Invalid user owncloud from 118.26.22.50
Nov  5 20:12:12 srv3 sshd\[7422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50
Nov  5 20:12:14 srv3 sshd\[7422\]: Failed password for invalid user owncloud from 118.26.22.50 port 43440 ssh2
Nov  5 20:24:19 srv3 sshd\[7664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 20:24:21 srv3 sshd\[7664\]: Failed password for root from 118.26.22.50 port 30793 ssh2
Nov  5 20:28:18 srv3 sshd\[7701\]: In
...
2019-11-06 17:37:01
103.44.61.242 attackspam
Nov  5 19:35:31 srv3 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:35:34 srv3 sshd\[6763\]: Failed password for root from 103.44.61.242 port 50644 ssh2
Nov  5 19:42:10 srv3 sshd\[6899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:55:58 srv3 sshd\[7124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:56:00 srv3 sshd\[7124\]: Failed password for root from 103.44.61.242 port 52218 ssh2
Nov  5 20:02:48 srv3 sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
...
2019-11-06 17:45:49
176.125.63.31 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-06 18:11:55
194.228.3.191 attack
Nov  6 09:58:51 cvbnet sshd[12175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191 
Nov  6 09:58:54 cvbnet sshd[12175]: Failed password for invalid user nguy from 194.228.3.191 port 42895 ssh2
...
2019-11-06 18:00:08
134.73.51.234 attackbotsspam
Lines containing failures of 134.73.51.234
Nov  6 06:52:16 shared04 postfix/smtpd[31904]: connect from level.imphostnamesol.com[134.73.51.234]
Nov  6 06:52:16 shared04 policyd-spf[32691]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=134.73.51.234; helo=level.armaghanbasir.co; envelope-from=x@x
Nov x@x
Nov  6 06:52:16 shared04 postfix/smtpd[31904]: disconnect from level.imphostnamesol.com[134.73.51.234] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov  6 06:52:27 shared04 postfix/smtpd[25104]: connect from level.imphostnamesol.com[134.73.51.234]
Nov  6 06:52:27 shared04 policyd-spf[30980]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=134.73.51.234; helo=level.armaghanbasir.co; envelope-from=x@x
Nov x@x
Nov  6 06:52:27 shared04 postfix/smtpd[25104]: disconnect from level.imphostnamesol.com[134.73.51.234] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov  6 06:53:08 shared04 postfix/smtpd[31904........
------------------------------
2019-11-06 17:42:44
212.129.24.77 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: 212-129-24-77.rev.poneytelecom.eu.
2019-11-06 18:09:37
49.234.233.164 attackbotsspam
2019-11-06T07:27:20.447674abusebot-8.cloudsearch.cf sshd\[28348\]: Invalid user net from 49.234.233.164 port 37690
2019-11-06T07:27:20.452245abusebot-8.cloudsearch.cf sshd\[28348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164
2019-11-06 18:07:31
70.71.148.228 attack
Nov  6 01:56:04 ny01 sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.71.148.228
Nov  6 01:56:06 ny01 sshd[5855]: Failed password for invalid user tinashe from 70.71.148.228 port 46909 ssh2
Nov  6 01:59:59 ny01 sshd[6415]: Failed password for root from 70.71.148.228 port 38046 ssh2
2019-11-06 18:15:39
41.65.36.168 attackbotsspam
Automatic report - Port Scan Attack
2019-11-06 17:47:49

最近上报的IP列表

183.7.16.81 218.203.193.138 59.82.83.234 59.82.83.189
59.82.83.182 59.82.83.177 59.82.83.148 59.82.83.120
59.82.83.11 59.82.83.107 59.82.135.218 106.36.192.162
104.249.173.98 59.82.83.183 59.82.83.154 59.82.135.14
59.82.135.101 60.187.0.224 59.82.83.22 59.82.135.205