City: Whistler
Region: British Columbia
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '154.5.0.0 - 154.5.255.255'
% No abuse contact registered for 154.5.0.0 - 154.5.255.255
inetnum: 154.5.0.0 - 154.5.255.255
netname: NET-154-5-0-0
descr: __________________________
descr: This block is allocated to an organization in the ARIN
descr: region. Please query whois.arin.net for more
descr: information on the registrant.
descr: __________________________
country: MU
org: ORG-AFNC1-AFRINIC
admin-c: TEAM-AFRINIC
tech-c: TEAM-AFRINIC
status: ALLOCATED UNSPECIFIED
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
parent: 154.0.0.0 - 154.255.255.255
organisation: ORG-AFNC1-AFRINIC
org-name: African Network Information Center - (AfriNIC) Ltd
org-type: RIR
country: MU
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène
phone: tel:+230-466-6758
phone: tel:+230-403-5100
admin-c: CA15-AFRINIC
tech-c: IT7-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-IT-MNT
mnt-ref: AFRINIC-DB-MNT
mnt-by: AFRINIC-HM-MNT
remarks: =======================================
remarks: For more information on AFRINIC assigned blocks,
remarks: querry whois.afrinic.net port 43, or the web based
remarks: query at http://whois.afrinic.net or www.afrinic.net
remarks: website: www.afrinic.net
remarks: Other Contacts:
remarks: ===============
remarks: hostmaster@afrinic.net - for IP resources
remarks: new-member@afrinic.net - for new members and other
remarks: inquiries.
source: AFRINIC # Filtered
role: AfriNIC TEAM
address: Raffles Tower - 11th Floor
address: Cybercity
address: Mauritius
phone: tel:+230-403-5100
fax-no: tel:+230-466-6758
admin-c: CA15-AFRINIC
tech-c: CA15-AFRINIC
nic-hdl: TEAM-AFRINIC
mnt-by: AFRINIC-DB-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.5.151.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.5.151.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 20:30:22 CST 2026
;; MSG SIZE rcvd: 106
143.151.5.154.in-addr.arpa domain name pointer d154-5-151-143.bchsia.telus.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
143.151.5.154.in-addr.arpa name = d154-5-151-143.bchsia.telus.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 179.42.200.138 | attack | Sep 13 03:03:53 dev sshd\[19700\]: Invalid user admin from 179.42.200.138 port 58155 Sep 13 03:03:53 dev sshd\[19700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.42.200.138 Sep 13 03:03:55 dev sshd\[19700\]: Failed password for invalid user admin from 179.42.200.138 port 58155 ssh2 |
2019-09-13 16:57:56 |
| 121.7.194.71 | attackspam | Sep 13 09:08:01 XXX sshd[15930]: Invalid user ofsaa from 121.7.194.71 port 39038 |
2019-09-13 17:28:26 |
| 175.150.16.253 | attackbotsspam | 23/tcp 23/tcp 23/tcp... [2019-09-13]6pkt,1pt.(tcp) |
2019-09-13 17:40:44 |
| 185.234.217.223 | attackspambots | (cpanel) Failed cPanel login from 185.234.217.223 (IE/Ireland/-): 5 in the last 3600 secs |
2019-09-13 17:10:47 |
| 103.207.11.10 | attackspambots | 2019-09-08 08:29:00,247 fail2ban.actions \[1859\]: NOTICE \[ssh\] Ban 103.207.11.10 2019-09-08 08:46:59,565 fail2ban.actions \[1859\]: NOTICE \[ssh\] Ban 103.207.11.10 2019-09-08 09:05:10,951 fail2ban.actions \[1859\]: NOTICE \[ssh\] Ban 103.207.11.10 2019-09-08 09:23:16,281 fail2ban.actions \[1859\]: NOTICE \[ssh\] Ban 103.207.11.10 2019-09-08 09:41:31,200 fail2ban.actions \[1859\]: NOTICE \[ssh\] Ban 103.207.11.10 ... |
2019-09-13 17:05:49 |
| 188.202.77.254 | attackspambots | Automatic report - Banned IP Access |
2019-09-13 17:42:01 |
| 14.198.6.164 | attackspambots | 2019-08-23 13:00:10,204 fail2ban.actions [878]: NOTICE [sshd] Ban 14.198.6.164 2019-08-23 16:07:17,767 fail2ban.actions [878]: NOTICE [sshd] Ban 14.198.6.164 2019-08-23 19:15:03,813 fail2ban.actions [878]: NOTICE [sshd] Ban 14.198.6.164 ... |
2019-09-13 17:04:15 |
| 220.101.103.31 | attackbots | Unauthorized connection attempt from IP address 220.101.103.31 on Port 445(SMB) |
2019-09-13 17:57:47 |
| 187.111.23.14 | attack | 2019-09-13T09:12:18.983608abusebot-6.cloudsearch.cf sshd\[25965\]: Invalid user teamspeak123 from 187.111.23.14 port 57702 |
2019-09-13 17:51:04 |
| 201.244.94.189 | attackbots | Sep 9 09:54:38 itv-usvr-01 sshd[10626]: Invalid user testing from 201.244.94.189 Sep 9 09:54:38 itv-usvr-01 sshd[10626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.244.94.189 Sep 9 09:54:38 itv-usvr-01 sshd[10626]: Invalid user testing from 201.244.94.189 Sep 9 09:54:40 itv-usvr-01 sshd[10626]: Failed password for invalid user testing from 201.244.94.189 port 14643 ssh2 Sep 9 10:01:19 itv-usvr-01 sshd[10917]: Invalid user devel from 201.244.94.189 |
2019-09-13 17:43:08 |
| 62.234.9.150 | attack | Sep 13 05:48:19 vps691689 sshd[7132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150 Sep 13 05:48:21 vps691689 sshd[7132]: Failed password for invalid user ts3server from 62.234.9.150 port 54524 ssh2 Sep 13 05:53:42 vps691689 sshd[7182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150 ... |
2019-09-13 17:19:25 |
| 23.94.16.72 | attackbotsspam | Sep 12 22:47:39 wbs sshd\[21812\]: Invalid user webadmin from 23.94.16.72 Sep 12 22:47:39 wbs sshd\[21812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.16.72 Sep 12 22:47:42 wbs sshd\[21812\]: Failed password for invalid user webadmin from 23.94.16.72 port 55228 ssh2 Sep 12 22:52:13 wbs sshd\[22229\]: Invalid user deploy from 23.94.16.72 Sep 12 22:52:13 wbs sshd\[22229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.16.72 |
2019-09-13 16:58:40 |
| 125.130.142.12 | attack | Sep 13 05:07:07 ns41 sshd[9050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.142.12 |
2019-09-13 17:05:19 |
| 200.103.75.107 | attack | Automatic report - Port Scan Attack |
2019-09-13 17:27:39 |
| 167.99.131.219 | attack | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-09-13 17:06:23 |