City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '154.29.0.0 - 154.29.255.255'
% No abuse contact registered for 154.29.0.0 - 154.29.255.255
inetnum: 154.29.0.0 - 154.29.255.255
netname: NET-154-29-0-0
descr: __________________________
descr: This block is allocated to an organization in the ARIN
descr: region. Please query whois.arin.net for more
descr: information on the registrant.
descr: __________________________
country: MU
org: ORG-AFNC1-AFRINIC
admin-c: TEAM-AFRINIC
tech-c: TEAM-AFRINIC
status: ALLOCATED UNSPECIFIED
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
parent: 154.0.0.0 - 154.255.255.255
organisation: ORG-AFNC1-AFRINIC
org-name: African Network Information Center - (AfriNIC) Ltd
org-type: RIR
country: MU
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène
phone: tel:+230-466-6758
phone: tel:+230-403-5100
admin-c: CA15-AFRINIC
tech-c: IT7-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-IT-MNT
mnt-ref: AFRINIC-DB-MNT
mnt-by: AFRINIC-HM-MNT
remarks: =======================================
remarks: For more information on AFRINIC assigned blocks,
remarks: querry whois.afrinic.net port 43, or the web based
remarks: query at http://whois.afrinic.net or www.afrinic.net
remarks: website: www.afrinic.net
remarks: Other Contacts:
remarks: ===============
remarks: hostmaster@afrinic.net - for IP resources
remarks: new-member@afrinic.net - for new members and other
remarks: inquiries.
source: AFRINIC # Filtered
role: AfriNIC TEAM
address: Raffles Tower - 11th Floor
address: Cybercity
address: Mauritius
phone: tel:+230-403-5100
fax-no: tel:+230-466-6758
admin-c: CA15-AFRINIC
tech-c: CA15-AFRINIC
nic-hdl: TEAM-AFRINIC
mnt-by: AFRINIC-DB-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.29.155.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.29.155.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031500 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 15:26:28 CST 2026
;; MSG SIZE rcvd: 106
Host 31.155.29.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 31.155.29.154.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.34.203.92 | attackspambots | Jun 29 22:00:55 srv-4 sshd\[28715\]: Invalid user student from 114.34.203.92 Jun 29 22:00:55 srv-4 sshd\[28715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.203.92 Jun 29 22:00:57 srv-4 sshd\[28715\]: Failed password for invalid user student from 114.34.203.92 port 42466 ssh2 ... |
2019-06-30 05:35:01 |
| 153.254.113.26 | attackbots | Jun 29 20:56:00 XXX sshd[5887]: Invalid user django from 153.254.113.26 port 48770 |
2019-06-30 05:44:24 |
| 27.8.96.136 | attackbots | firewall-block, port(s): 5060/udp |
2019-06-30 05:40:59 |
| 128.199.165.124 | attackspambots | Attempted to connect 3 times to port 8545 TCP |
2019-06-30 05:43:02 |
| 159.65.150.212 | attackspam | Invalid user fake from 159.65.150.212 port 37940 |
2019-06-30 05:45:57 |
| 118.89.28.160 | attack | Port scan on 8 port(s): 1433 6379 6380 7001 7002 8080 8088 9200 |
2019-06-30 05:23:51 |
| 106.12.28.36 | attackbotsspam | Jun 29 23:39:33 host sshd\[27683\]: Invalid user defunts from 106.12.28.36 port 41812 Jun 29 23:39:33 host sshd\[27683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.36 ... |
2019-06-30 06:02:07 |
| 94.102.51.30 | attackspam | 19/6/29@15:01:22: FAIL: Alarm-Intrusion address from=94.102.51.30 ... |
2019-06-30 05:26:19 |
| 217.182.71.7 | attack | (sshd) Failed SSH login from 217.182.71.7 (7.ip-217-182-71.eu): 5 in the last 3600 secs |
2019-06-30 06:04:33 |
| 95.77.227.74 | attackbotsspam | 2019-06-29T21:27:22.547464abusebot-6.cloudsearch.cf sshd\[17144\]: Invalid user www from 95.77.227.74 port 59630 |
2019-06-30 05:47:25 |
| 167.99.143.90 | attackbots | Jun 29 21:20:54 localhost sshd\[20758\]: Invalid user guest2 from 167.99.143.90 port 47184 Jun 29 21:20:54 localhost sshd\[20758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.143.90 Jun 29 21:20:56 localhost sshd\[20758\]: Failed password for invalid user guest2 from 167.99.143.90 port 47184 ssh2 |
2019-06-30 06:07:31 |
| 5.88.155.130 | attackspambots | Jun 29 20:01:16 debian sshd\[23055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.155.130 user=root Jun 29 20:01:17 debian sshd\[23055\]: Failed password for root from 5.88.155.130 port 55786 ssh2 ... |
2019-06-30 05:31:33 |
| 68.183.136.244 | attack | Jun 29 21:24:19 giegler sshd[6739]: Invalid user neng from 68.183.136.244 port 53794 Jun 29 21:24:21 giegler sshd[6739]: Failed password for invalid user neng from 68.183.136.244 port 53794 ssh2 Jun 29 21:24:19 giegler sshd[6739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.136.244 Jun 29 21:24:19 giegler sshd[6739]: Invalid user neng from 68.183.136.244 port 53794 Jun 29 21:24:21 giegler sshd[6739]: Failed password for invalid user neng from 68.183.136.244 port 53794 ssh2 |
2019-06-30 05:28:34 |
| 139.59.44.60 | attackspam | Invalid user fake from 139.59.44.60 port 39500 |
2019-06-30 05:41:25 |
| 103.101.162.218 | attackspambots | Automatic report - Web App Attack |
2019-06-30 05:36:37 |