城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '197.80.0.0 - 197.87.255.255'
% Abuse contact for '197.80.0.0 - 197.87.255.255' is 'abuse@optinet.net'
inetnum: 197.80.0.0 - 197.87.255.255
netname: OPTINET-17-20110601
descr: Dimension Data
country: ZA
org: ORG-DD1-AFRINIC
admin-c: EK43-AFRINIC
admin-c: DA25-AFRINIC
admin-c: JA50-AFRINIC
admin-c: SM144-AFRINIC
admin-c: MDP1-AFRINIC
admin-c: FH9-AFRINIC
admin-c: PD19-AFRINIC
admin-c: ZM11-AFRINIC
admin-c: NK18-AFRINIC
admin-c: ZT12-AFRINIC
admin-c: RS62-AFRINIC
tech-c: EK43-AFRINIC
tech-c: DA25-AFRINIC
tech-c: JA50-AFRINIC
tech-c: SM144-AFRINIC
tech-c: FH9-AFRINIC
tech-c: PD19-AFRINIC
tech-c: ZM11-AFRINIC
tech-c: NK18-AFRINIC
tech-c: ZT12-AFRINIC
tech-c: RS62-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: IS-OPTINET-MNT
mnt-domains: IS-OPTINET-MNT
mnt-irt: IRT-OPTINET-ABUSE
source: AFRINIC # Filtered
parent: 197.0.0.0 - 197.255.255.255
organisation: ORG-DD1-AFRINIC
org-name: Dimension Data
org-type: LIR
country: ZA
address: The Campus,
address: 57 Sloane St,
address: Bryanston
address: Johannesburg 2021
phone: tel:+27-72-614-3611
phone: tel:+27-11-575-0325
phone: tel:+27-11-575-0969
admin-c: JA50-AFRINIC
admin-c: DA25-AFRINIC
admin-c: EK43-AFRINIC
admin-c: MDP1-AFRINIC
admin-c: SM144-AFRINIC
admin-c: NK18-AFRINIC
admin-c: ZM11-AFRINIC
admin-c: PD19-AFRINIC
admin-c: FH9-AFRINIC
admin-c: ZT12-AFRINIC
admin-c: RS62-AFRINIC
tech-c: JA50-AFRINIC
tech-c: DA25-AFRINIC
tech-c: EK43-AFRINIC
tech-c: MDP1-AFRINIC
tech-c: SM144-AFRINIC
tech-c: NK18-AFRINIC
tech-c: ZM11-AFRINIC
tech-c: PD19-AFRINIC
tech-c: FH9-AFRINIC
tech-c: ZT12-AFRINIC
tech-c: RS62-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: TF-168-209-0-0-168-210-255-255-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: DNS Administration
address: PO BOX 3234
address: Parklands, Gauteng 2121
address: ZA
phone: tel:+27-11-447-5566
fax-no: tel:+27-11-447-5567
nic-hdl: DA25-AFRINIC
mnt-by: GENERATED-5DRIE83KKFOSLY1J26BA6OERWG7UT3KG-MNT
source: AFRINIC # Filtered
person: Elne Kramer
address: The Campus, 57 Sloane Street
address: Bryanston, Gauteng
address: Johannesburg 2021
address: South Africa
phone: tel:+27-11-575-7845
nic-hdl: EK43-AFRINIC
mnt-by: GENERATED-MH5BHHWXXJNMX1MQLYAJHIY9HED5QGHA-MNT
source: AFRINIC # Filtered
person: Faiz Hartley
nic-hdl: FH9-AFRINIC
address: 100 Fairway Close
address: Cape Town 7500
address: South Africa
address: Cape Town
address: Other
phone: tel:+27-21-596-4700
mnt-by: GENERATED-SRDU2OPM7ENJQXAL2K51PPF7CBCIQAGH-MNT
source: AFRINIC # Filtered
person: Jehad Arnold
address: 100 Fairway Close
address: Cape Town 7500
address: South Africa
phone: +0215964700
nic-hdl: JA50-AFRINIC
mnt-by: GENERATED-TVETECITNYRHD1CINUQQA0H9U7STCYUA-MNT
source: AFRINIC # Filtered
person: Marcel Di Perna
nic-hdl: MDP1-AFRINIC
address: Mweb Building
address: 100 Fairway Close
address: Parow
address: Cape Town 7500
address: South Africa
phone: tel:+27-21-596-4755
org: ORG-MA20-AFRINIC
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Niel Kruger
nic-hdl: NK18-AFRINIC
address: The Campus, 57 Sloane Street
address: Bryanston, Gauteng
address: Johannesburg 2021
address: South Africa
address: JHB
address: South Africa
phone: tel:+27-87-354-0207
mnt-by: GENERATED-ACXHGWHAPVIDGKL5YZMHPRHOLBXUU0GO-MNT
source: AFRINIC # Filtered
person: Pawel Dabrowski
address: The Campus, 57 Sloane Street
address: Bryanston, Gauteng
address: Johannesburg 2021
address: South Africa
address: Johannesburg
address: South Africa
phone: tel:+27-83-554-1177
phone: tel:+27-11-575-0044
nic-hdl: PD19-AFRINIC
mnt-by: GENERATED-ZWDYJ2VCIBPGR9R7QJRROAVSGRMM4TCU-MNT
source: AFRINIC # Filtered
person: Ruan Snyman
address: The Campus, 57 Sloane Street
address: Bryanston, Gauteng
address: Johannesburg 2021
address: Africa
phone: tel:+27-11-575-7845
nic-hdl: RS62-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-W1JB6VTGPJZZJPXCKIRMBRMY57SMLJK3-MNT
person: Sandeep Makan
nic-hdl: SM144-AFRINIC
address: 57 Sloane street
address: The Campus
address: Bryanston 2021
address: South Africa
address: Johannesburg
address: South Africa
phone: tel:+27-11-575-0969
mnt-by: GENERATED-NLOHSH0UN9GCE7Y5YXJQLLCRDOFTMOAE-MNT
source: AFRINIC # Filtered
person: Ziyaad Munshi
nic-hdl: ZM11-AFRINIC
address: The Campus, 57 Sloane Street
address: Bryanston
address: Gauteng
address: Johannesburg 2021
address: Johannesburg
address: Other
phone: tel:+27-11-575-0211
mnt-by: GENERATED-CSQQAVAMDFYEN4RG8RLAQ3T44NPRWWIG-MNT
source: AFRINIC # Filtered
person: IS Hostmaster
nic-hdl: ZT12-AFRINIC
address: The Internet Solution
address: The Campus, 57 Sloane Street
address: Bryanston
address: Gauteng
address: Johannesburg 2021
address: South Africa
phone: tel:+27-11-575-1000
org: ORG-TIS1-AFRINIC
mnt-by: GENERATED-4THKYWBYLLP54MAK15NBL6CWUURHVN1A-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.82.86.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.82.86.43. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 10:44:20 CST 2025
;; MSG SIZE rcvd: 105
Host 43.86.82.197.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 43.86.82.197.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.89.3.117 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-06 18:13:17 |
| 175.207.13.200 | attack | Nov 5 20:58:46 web9 sshd\[7397\]: Invalid user sds33322 from 175.207.13.200 Nov 5 20:58:46 web9 sshd\[7397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 Nov 5 20:58:48 web9 sshd\[7397\]: Failed password for invalid user sds33322 from 175.207.13.200 port 37420 ssh2 Nov 5 21:03:52 web9 sshd\[8068\]: Invalid user apaajaboleh from 175.207.13.200 Nov 5 21:03:52 web9 sshd\[8068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 |
2019-11-06 17:44:36 |
| 159.224.194.240 | attackspambots | Nov 6 04:05:58 ws19vmsma01 sshd[245108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.194.240 Nov 6 04:06:01 ws19vmsma01 sshd[245108]: Failed password for invalid user usuario from 159.224.194.240 port 35454 ssh2 ... |
2019-11-06 17:53:22 |
| 152.136.86.234 | attack | Automatic report - Banned IP Access |
2019-11-06 17:57:42 |
| 198.50.183.49 | attack | (From projobnetwork1@outlook.com) I came across your website and just wanted to reach out to see if you're hiring? If so, I'd like to extend an offer to post to top job sites like ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost for two weeks. Here are some of the key benefits: -- Post to top job sites with one click -- Manage all candidates in one place -- No cost for two weeks You can post your job openings now by going to our website below: >> TryProJob [dot] com * Please use offer code 987FREE -- Expires Soon * Thanks for your time, Ryan C. Pro Job Network 10451 Twin Rivers Rd #279 Columbia, MD 21044 To OPT OUT, please email ryanc [at] pjnmail [dot] com with "REMOVE southernctchiro.com" in the subject line. |
2019-11-06 18:01:57 |
| 195.210.138.206 | attackspambots | Fail2Ban Ban Triggered |
2019-11-06 17:46:59 |
| 118.26.22.50 | attackspambots | Nov 5 19:51:47 srv3 sshd\[7053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50 user=root Nov 5 19:51:49 srv3 sshd\[7053\]: Failed password for root from 118.26.22.50 port 19791 ssh2 Nov 5 19:59:24 srv3 sshd\[7176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50 user=root Nov 5 20:12:12 srv3 sshd\[7422\]: Invalid user owncloud from 118.26.22.50 Nov 5 20:12:12 srv3 sshd\[7422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50 Nov 5 20:12:14 srv3 sshd\[7422\]: Failed password for invalid user owncloud from 118.26.22.50 port 43440 ssh2 Nov 5 20:24:19 srv3 sshd\[7664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50 user=root Nov 5 20:24:21 srv3 sshd\[7664\]: Failed password for root from 118.26.22.50 port 30793 ssh2 Nov 5 20:28:18 srv3 sshd\[7701\]: In ... |
2019-11-06 17:37:01 |
| 103.44.61.242 | attackspam | Nov 5 19:35:31 srv3 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242 user=root Nov 5 19:35:34 srv3 sshd\[6763\]: Failed password for root from 103.44.61.242 port 50644 ssh2 Nov 5 19:42:10 srv3 sshd\[6899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242 user=root Nov 5 19:55:58 srv3 sshd\[7124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242 user=root Nov 5 19:56:00 srv3 sshd\[7124\]: Failed password for root from 103.44.61.242 port 52218 ssh2 Nov 5 20:02:48 srv3 sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242 user=root ... |
2019-11-06 17:45:49 |
| 176.125.63.31 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-11-06 18:11:55 |
| 194.228.3.191 | attack | Nov 6 09:58:51 cvbnet sshd[12175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191 Nov 6 09:58:54 cvbnet sshd[12175]: Failed password for invalid user nguy from 194.228.3.191 port 42895 ssh2 ... |
2019-11-06 18:00:08 |
| 134.73.51.234 | attackbotsspam | Lines containing failures of 134.73.51.234 Nov 6 06:52:16 shared04 postfix/smtpd[31904]: connect from level.imphostnamesol.com[134.73.51.234] Nov 6 06:52:16 shared04 policyd-spf[32691]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=134.73.51.234; helo=level.armaghanbasir.co; envelope-from=x@x Nov x@x Nov 6 06:52:16 shared04 postfix/smtpd[31904]: disconnect from level.imphostnamesol.com[134.73.51.234] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Nov 6 06:52:27 shared04 postfix/smtpd[25104]: connect from level.imphostnamesol.com[134.73.51.234] Nov 6 06:52:27 shared04 policyd-spf[30980]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=134.73.51.234; helo=level.armaghanbasir.co; envelope-from=x@x Nov x@x Nov 6 06:52:27 shared04 postfix/smtpd[25104]: disconnect from level.imphostnamesol.com[134.73.51.234] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Nov 6 06:53:08 shared04 postfix/smtpd[31904........ ------------------------------ |
2019-11-06 17:42:44 |
| 212.129.24.77 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: 212-129-24-77.rev.poneytelecom.eu. |
2019-11-06 18:09:37 |
| 49.234.233.164 | attackbotsspam | 2019-11-06T07:27:20.447674abusebot-8.cloudsearch.cf sshd\[28348\]: Invalid user net from 49.234.233.164 port 37690 2019-11-06T07:27:20.452245abusebot-8.cloudsearch.cf sshd\[28348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164 |
2019-11-06 18:07:31 |
| 70.71.148.228 | attack | Nov 6 01:56:04 ny01 sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.71.148.228 Nov 6 01:56:06 ny01 sshd[5855]: Failed password for invalid user tinashe from 70.71.148.228 port 46909 ssh2 Nov 6 01:59:59 ny01 sshd[6415]: Failed password for root from 70.71.148.228 port 38046 ssh2 |
2019-11-06 18:15:39 |
| 41.65.36.168 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-06 17:47:49 |