City: Annaba
Region: Annaba
Country: Algeria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '154.249.0.0 - 154.249.255.255'
% No abuse contact registered for 154.249.0.0 - 154.249.255.255
inetnum: 154.249.0.0 - 154.249.255.255
netname: XDSL-FTTX
descr: POOL xDSL et FTTx
country: DZ
admin-c: SD6-AFRINIC
tech-c: SD6-AFRINIC
status: ASSIGNED PA
mnt-by: DJAWEB-MNT
source: AFRINIC # Filtered
parent: 154.240.0.0 - 154.255.255.255
person: Security Departement
address: Alger
phone: tel:+213-21-91-12-24
fax-no: tel:+213-21-91-12-08
nic-hdl: SD6-AFRINIC
mnt-by: GENERATED-IRIXFFLWUREDGEB9HMRODGUJH3OJCIPE-MNT
source: AFRINIC # Filtered
% Information related to '154.240.0.0/12AS36947'
route: 154.240.0.0/12
descr: route for new pool
origin: AS36947
mnt-by: DJAWEB-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.249.3.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.249.3.215. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101001 1800 900 604800 86400
;; Query time: 287 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 11 04:25:17 CST 2025
;; MSG SIZE rcvd: 106
Host 215.3.249.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 215.3.249.154.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
213.6.139.110 | attack | spam |
2020-04-06 13:03:31 |
220.133.209.32 | attackbots | spam |
2020-04-06 13:02:56 |
177.87.36.218 | attackbotsspam | spam |
2020-04-06 13:10:14 |
200.105.209.170 | attack | spam |
2020-04-06 13:04:36 |
109.237.92.138 | attack | spam |
2020-04-06 13:29:18 |
181.143.69.27 | attack | spam |
2020-04-06 13:09:16 |
1.203.115.140 | attack | Apr 6 05:50:00 pve sshd[31917]: Failed password for root from 1.203.115.140 port 51502 ssh2 Apr 6 05:51:53 pve sshd[32211]: Failed password for root from 1.203.115.140 port 60581 ssh2 |
2020-04-06 13:34:49 |
82.117.212.114 | attack | spam |
2020-04-06 13:00:18 |
41.169.79.166 | attackbots | Apr 6 02:44:42 tux postfix/smtpd[18087]: connect from unknown[41.169.79.166] Apr x@x Apr 6 02:44:44 tux postfix/smtpd[18087]: lost connection after RCPT from unknown[41.169.79.166] Apr 6 02:44:44 tux postfix/smtpd[18087]: disconnect from unknown[41.169.79.166] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=41.169.79.166 |
2020-04-06 13:33:15 |
201.16.228.170 | attackbots | spam |
2020-04-06 13:36:53 |
200.6.175.10 | attack | email spam |
2020-04-06 13:38:11 |
103.214.41.98 | attack | spam |
2020-04-06 13:14:40 |
95.170.118.79 | attackspambots | spam |
2020-04-06 13:15:13 |
200.146.236.217 | attack | spam |
2020-04-06 13:24:40 |
186.193.2.22 | attackbotsspam | spam |
2020-04-06 13:07:51 |