城市(city): Cape Town
省份(region): Western Cape
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.164.0.0 - 41.165.255.255'
% No abuse contact registered for 41.164.0.0 - 41.165.255.255
inetnum: 41.164.0.0 - 41.165.255.255
netname: Neotel_WCape
descr: Neotel_WCape _Assignment
country: ZA
org: ORG-LTOL1-AFRINIC
admin-c: AS116-AFRINIC
admin-c: CM53-AFRINIC
admin-c: RD10-AFRINIC
admin-c: DH19-AFRINIC
tech-c: AS116-AFRINIC
tech-c: DV5-AFRINIC
tech-c: CM53-AFRINIC
tech-c: AA110-AFRINIC
tech-c: KR12-AFRINIC
tech-c: DH19-AFRINIC
status: ASSIGNED PA
mnt-by: LIQUID-TOL-MNT
mnt-lower: LIQUID-TOL-MNT
mnt-domains: LIQUID-TOL-MNT
source: AFRINIC # Filtered
parent: 41.160.0.0 - 41.175.255.255
organisation: ORG-LTOL1-AFRINIC
org-name: Liquid Telecommunications Operations Limited
org-type: LIR
country: MU
address: 10th Floor,
address: Raffles Tower,
address: 19 Cybercity
address: Ebene
phone: tel:+254-733-222204
phone: tel:+230-466-7620
phone: tel:+263-8677-033306
phone: tel:+254-731-033754
admin-c: RD10-AFRINIC
admin-c: CM53-AFRINIC
admin-c: MC69-AFRINIC
admin-c: AS116-AFRINIC
tech-c: PS44-AFRINIC
tech-c: CM53-AFRINIC
tech-c: DV5-AFRINIC
tech-c: MC69-AFRINIC
tech-c: AS116-AFRINIC
tech-c: MK122-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: LIQUID-TOL-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Andrew Alston
address: Block A, Sameer Business Park,
address: Mombasa Road,
address: Nairobi
address: Kenya
phone: tel:+254-20-5000000
nic-hdl: AA110-AFRINIC
mnt-by: AA110-MNTR
source: AFRINIC # Filtered
person: Anthony Somerset
nic-hdl: AS116-AFRINIC
address: 401 Old Pretoria Main Road
address: Midrand 1685
address: South Africa
phone: tel:+27-11-774-1220
phone: tel:+44-20-7101-6280
mnt-by: GENERATED-DB3XY0TSHJSHK8INFM8CE2CBOLXRIPLB-MNT
source: AFRINIC # Filtered
person: Christopher Mwangi
nic-hdl: CM53-AFRINIC
address: Block A,
address: Sameer Office Business Park, address: Mombasa Road,
address: Nairobi
address: Kenya
address: Nairobi 00200
address: Kenya
phone: tel:+254-20-5000000
phone: tel:+254-731-033754
mnt-by: GENERATED-GLVPMCUSF8ULWB1RP1HOUAFIHRDTZM7C-MNT
source: AFRINIC # Filtered
person: Daniam Henriques
address: 401 Old Pretoria Rd, Midrand, 1685, Johannesburg
phone: tel:+27-11-585-0000
nic-hdl: DH19-AFRINIC
mnt-by: GENERATED-443VOOYYHDDCWRGJKQUOZ7GSUONIRP0O-MNT
source: AFRINIC # Filtered
person: Damian Vermeulen
address: 408 Old Pretoria Main Road
address: Midrand
address: Postal Code 1685
address: South Africa
phone: tel:+27-10-120-0471
nic-hdl: DV5-AFRINIC
mnt-by: GENERATED-PYQ649OOF2EJAA6CRQKT8VTPFEDCSU9I-MNT
source: AFRINIC # Filtered
person: Keith Rose
address: Liquid Telecom Zimbabwe
address: Sam Levy Office Park
address: Borrowdale
address: Postal Code 263
address: Harare
address: Zimbabwe
phone: tel:+263-8677-033501
nic-hdl: KR12-AFRINIC
mnt-by: GENERATED-S3BT6PUQHKPPIUYTXK5FFIAHEISW9HVT-MNT
source: AFRINIC # Filtered
person: Rob Davelaar
address: Ebene
address: MU
phone: tel:+230-466-7620
nic-hdl: RD10-AFRINIC
mnt-by: GENERATED-CCFCCEXBPZYR7IUANY1SUKTIVIPPULTV-MNT
source: AFRINIC # Filtered
% Information related to '41.164.98.0/24AS36937'
route: 41.164.98.0/24
descr: AS36937 Route Object
origin: AS36937
source: AFRINIC # Filtered
mnt-by: LIQUID-TOL-MNT
mnt-lower: LIQUID-TOL-MNT
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.164.98.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.164.98.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 18:58:10 CST 2026
;; MSG SIZE rcvd: 105
Host 50.98.164.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.98.164.41.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.2.151.226 | attackspambots | 1577171674 - 12/24/2019 08:14:34 Host: 61.2.151.226/61.2.151.226 Port: 445 TCP Blocked |
2019-12-24 21:29:57 |
| 222.186.175.161 | attackspam | --- report --- Dec 24 10:16:59 sshd: Connection from 222.186.175.161 port 59678 Dec 24 10:17:09 sshd: Received disconnect from 222.186.175.161: 11: [preauth] |
2019-12-24 21:32:28 |
| 52.36.131.219 | attackspambots | 12/24/2019-14:30:19.834719 52.36.131.219 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-24 21:43:29 |
| 189.212.9.123 | attackbots | Dec 24 10:01:56 server sshd\[27705\]: Invalid user applmgr from 189.212.9.123 Dec 24 10:01:56 server sshd\[27705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-212-9-123.static.axtel.net Dec 24 10:01:59 server sshd\[27705\]: Failed password for invalid user applmgr from 189.212.9.123 port 58036 ssh2 Dec 24 10:14:00 server sshd\[30643\]: Invalid user sitre from 189.212.9.123 Dec 24 10:14:00 server sshd\[30643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-212-9-123.static.axtel.net ... |
2019-12-24 21:47:39 |
| 198.108.67.61 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-12-24 21:31:04 |
| 117.102.121.19 | attackspambots | 19/12/24@02:14:07: FAIL: Alarm-Intrusion address from=117.102.121.19 ... |
2019-12-24 21:41:30 |
| 184.105.247.215 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2019-12-24 21:46:29 |
| 193.34.161.137 | attackspambots | SPAM Delivery Attempt |
2019-12-24 21:32:40 |
| 104.248.205.67 | attack | 2019-12-24T11:01:34.439003abusebot-5.cloudsearch.cf sshd[17892]: Invalid user aaron from 104.248.205.67 port 54512 2019-12-24T11:01:34.445356abusebot-5.cloudsearch.cf sshd[17892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67 2019-12-24T11:01:34.439003abusebot-5.cloudsearch.cf sshd[17892]: Invalid user aaron from 104.248.205.67 port 54512 2019-12-24T11:01:36.327821abusebot-5.cloudsearch.cf sshd[17892]: Failed password for invalid user aaron from 104.248.205.67 port 54512 ssh2 2019-12-24T11:09:30.748300abusebot-5.cloudsearch.cf sshd[17943]: Invalid user web from 104.248.205.67 port 45136 2019-12-24T11:09:30.758943abusebot-5.cloudsearch.cf sshd[17943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67 2019-12-24T11:09:30.748300abusebot-5.cloudsearch.cf sshd[17943]: Invalid user web from 104.248.205.67 port 45136 2019-12-24T11:09:32.987516abusebot-5.cloudsearch.cf sshd[17943]: Fai ... |
2019-12-24 21:24:30 |
| 60.250.139.180 | attack | 12/24/2019-02:14:59.093460 60.250.139.180 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-12-24 21:15:43 |
| 45.55.191.211 | attackspambots | Invalid user ehrhardt from 45.55.191.211 port 48378 |
2019-12-24 21:16:31 |
| 202.163.66.201 | attack | 1577171700 - 12/24/2019 08:15:00 Host: 202.163.66.201/202.163.66.201 Port: 445 TCP Blocked |
2019-12-24 21:13:09 |
| 5.89.10.81 | attackspam | ssh brute force |
2019-12-24 21:38:20 |
| 103.113.158.176 | attackspambots | Dec 24 13:40:12 mail1 sshd\[21450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.158.176 user=dovecot Dec 24 13:40:14 mail1 sshd\[21450\]: Failed password for dovecot from 103.113.158.176 port 2406 ssh2 Dec 24 13:43:54 mail1 sshd\[23086\]: Invalid user ssh from 103.113.158.176 port 41392 Dec 24 13:43:54 mail1 sshd\[23086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.158.176 Dec 24 13:43:56 mail1 sshd\[23086\]: Failed password for invalid user ssh from 103.113.158.176 port 41392 ssh2 ... |
2019-12-24 21:33:18 |
| 119.188.210.100 | attackspambots | Dec 24 08:24:58 vpn01 sshd[29277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.188.210.100 Dec 24 08:25:01 vpn01 sshd[29277]: Failed password for invalid user 139.59.136.251 from 119.188.210.100 port 54792 ssh2 ... |
2019-12-24 21:12:18 |