城市(city): Harare
省份(region): Harare (city)
国家(country): Zimbabwe
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.85.216.0 - 41.85.219.255'
% No abuse contact registered for 41.85.216.0 - 41.85.219.255
inetnum: 41.85.216.0 - 41.85.219.255
netname: Brooke
descr: Regional POP
country: ZW
admin-c: DK44-AFRINIC
admin-c: SM131-AFRINIC
tech-c: CM89-AFRINIC
tech-c: SM131-AFRINIC
status: ASSIGNED PA
mnt-by: TF-196-29-32-0-196-29-39-255-MNT
source: AFRINIC # Filtered
parent: 41.85.192.0 - 41.85.223.255
person: Charles Mashamba
address: 1112 sunningdale3, Harare
address: Harare 263
address: Zimbabwe
phone: tel:+263-77-264-9961
nic-hdl: CM89-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-E4RSKHVYJSC5GC64GGXTUMRC0YTFZXHZ-MNT
person: Daylight Katengwe
address: 52-54 Samora Machel Ave
address: Harare 0000
address: Zimbabwe
phone: tel:+263-77-264-9961
nic-hdl: DK44-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-QTQXOYWEBWMRBFNOLJK1GL35KZAWV1CT-MNT
person: Shingirai Matare
address: 54-56 Pegasus house, Samora Machael, 263 Harare Zimbabwe
phone: tel:+263-242707533
nic-hdl: SM131-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-WYYBSJ14HPNVOATNH9K0EUGCI8WMDYNE-MNT
% Information related to '41.85.217.0/24AS37183'
route: 41.85.217.0/24
origin: AS37183
descr: Utande
mnt-by: TF-196-29-32-0-196-29-39-255-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.85.217.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.85.217.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:35:59 CST 2026
;; MSG SIZE rcvd: 106
Host 172.217.85.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 172.217.85.41.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.65.18 | attackspam | Nov 27 07:13:37 icinga sshd[18895]: Failed password for mysql from 106.13.65.18 port 57244 ssh2 Nov 27 07:20:58 icinga sshd[19604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.65.18 ... |
2019-11-27 21:31:12 |
| 140.249.35.66 | attackspam | SSH invalid-user multiple login attempts |
2019-11-27 20:49:05 |
| 152.234.145.1 | attack | Automatic report - Port Scan Attack |
2019-11-27 20:48:33 |
| 104.245.144.59 | attackbots | (From evan.marko@yahoo.com) Do you want to submit your ad on 1000's of Advertising sites every month? Pay one flat rate and get virtually unlimited traffic to your site forever! For more information just visit: http://www.postingmoreads.xyz |
2019-11-27 20:51:06 |
| 86.98.157.101 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-11-27 21:02:02 |
| 186.4.123.139 | attack | Nov 27 08:21:55 MK-Soft-VM3 sshd[4775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.123.139 Nov 27 08:21:57 MK-Soft-VM3 sshd[4775]: Failed password for invalid user winther from 186.4.123.139 port 49268 ssh2 ... |
2019-11-27 20:48:06 |
| 121.243.17.152 | attack | Nov 27 11:15:03 hosting sshd[3443]: Invalid user server from 121.243.17.152 port 60982 ... |
2019-11-27 21:02:50 |
| 186.139.228.18 | attackbotsspam | 23/tcp [2019-11-27]1pkt |
2019-11-27 21:21:41 |
| 207.154.247.249 | attackspambots | 11/27/2019-13:18:37.378053 207.154.247.249 Protocol: 6 ET POLICY Cleartext WordPress Login |
2019-11-27 20:55:18 |
| 107.170.227.141 | attack | Nov 27 07:43:39 vmd26974 sshd[7787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141 Nov 27 07:43:41 vmd26974 sshd[7787]: Failed password for invalid user teong from 107.170.227.141 port 40998 ssh2 ... |
2019-11-27 20:55:47 |
| 60.222.233.208 | attack | Nov 27 02:33:10 auw2 sshd\[32480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.222.233.208 user=daemon Nov 27 02:33:12 auw2 sshd\[32480\]: Failed password for daemon from 60.222.233.208 port 4902 ssh2 Nov 27 02:37:27 auw2 sshd\[376\]: Invalid user aarsheim from 60.222.233.208 Nov 27 02:37:27 auw2 sshd\[376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.222.233.208 Nov 27 02:37:29 auw2 sshd\[376\]: Failed password for invalid user aarsheim from 60.222.233.208 port 31143 ssh2 |
2019-11-27 21:20:09 |
| 116.96.145.213 | attackbotsspam | Unauthorised access (Nov 27) SRC=116.96.145.213 LEN=52 TTL=108 ID=30274 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-27 21:32:56 |
| 218.76.140.201 | attack | Nov 27 08:30:28 cavern sshd[7933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.140.201 |
2019-11-27 20:56:06 |
| 138.118.100.220 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-27 20:54:28 |
| 42.237.233.222 | attack | Honeypot attack, port: 5555, PTR: hn.kd.ny.adsl. |
2019-11-27 21:22:38 |