Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Richards Bay

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.21.80.0 - 196.21.87.255'

% Abuse contact for '196.21.80.0 - 196.21.87.255' is 'abuse@tenet.ac.za'

inetnum:        196.21.80.0 - 196.21.87.255
netname:        UZULU-196-21-80-0
descr:          University of Zululand
descr:          KwaDlangezwa
descr:          3886
country:        ZA
admin-c:        YCA-AFRINIC
tech-c:         SAA2-AFRINIC
status:         ASSIGNED PA
mnt-by:         TF-196-21-MNT
mnt-lower:      TF-196-21-MNT
source:         AFRINIC # Filtered
parent:         196.21.0.0 - 196.21.255.255

person:         Soren Aalto
address:        KwaDlangezwa
address:        kwaDlangezwa
address:        3886
address:        ZA
phone:          tel:+1-073-162-0548
phone:          tel:+27-35-902-6800
fax-no:         tel:+1-035-902-6028
nic-hdl:        SAA2-AFRINIC
mnt-by:         GENERATED-LW6QYFJFOTT55TWBUPMAN1L5HKTLUCGB-MNT
source:         AFRINIC # Filtered

person:         Yvette Canham
address:        KwaDlangezwa
address:        kwaDlangezwa
address:        3886
address:        ZA
phone:          tel:+1-083-779-9391
phone:          tel:+27-35-902-6802
fax-no:         tel:+1-035-902-6028
nic-hdl:        YCA-AFRINIC
mnt-by:         GENERATED-KJVSFFLRCV17TVUD2TSD7ATRNFLUJVCV-MNT
source:         AFRINIC # Filtered

% Information related to '196.21.0.0/16AS2018'

route:          196.21.0.0/16
descr:          MAINTAINED BY TENET
origin:         AS2018
mnt-by:         TNET-MNT01
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.21.82.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.21.82.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:50:10 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 154.82.21.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.82.21.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.202.144 attack
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-27 07:32:35
106.12.10.8 attack
$f2bV_matches
2020-08-27 07:34:37
120.132.99.101 attack
Aug 26 16:46:09 Host-KLAX-C sshd[32192]: User root from 120.132.99.101 not allowed because not listed in AllowUsers
...
2020-08-27 07:20:05
122.152.208.242 attackbots
(sshd) Failed SSH login from 122.152.208.242 (CN/China/-): 5 in the last 3600 secs
2020-08-27 07:46:24
103.89.252.123 attack
SSH Invalid Login
2020-08-27 07:44:03
118.24.116.78 attackspambots
Invalid user admin from 118.24.116.78 port 34628
2020-08-27 07:38:12
212.67.69.27 attackbotsspam
SSH break in attempt
...
2020-08-27 07:33:09
114.170.116.71 attack
Port scan on 18 Aug 20.
2020-08-27 07:41:07
23.129.64.215 attackspam
Aug 26 22:51:43 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2 Aug 26 22:51:46 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2 Aug 26 22:51:50 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2
2020-08-27 07:15:49
5.188.84.119 attack
0,31-01/02 [bc01/m11] PostRequest-Spammer scoring: harare01_holz
2020-08-27 07:39:36
212.70.149.4 attackbots
Aug 27 01:23:11 relay postfix/smtpd\[11622\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 01:26:28 relay postfix/smtpd\[11554\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 01:29:46 relay postfix/smtpd\[13149\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 01:33:07 relay postfix/smtpd\[14979\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 01:36:27 relay postfix/smtpd\[16492\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-27 07:36:48
218.59.193.14 attackbots
Brute Force
2020-08-27 07:40:42
201.150.34.28 attackbots
Invalid user sudo1 from 201.150.34.28 port 33730
2020-08-27 07:24:28
85.135.95.218 attackbots
Brute Force
2020-08-27 07:21:56
140.207.81.233 attackbotsspam
Aug 26 23:48:51 h2779839 sshd[17690]: Invalid user ruud from 140.207.81.233 port 31785
Aug 26 23:48:51 h2779839 sshd[17690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233
Aug 26 23:48:51 h2779839 sshd[17690]: Invalid user ruud from 140.207.81.233 port 31785
Aug 26 23:48:52 h2779839 sshd[17690]: Failed password for invalid user ruud from 140.207.81.233 port 31785 ssh2
Aug 26 23:50:47 h2779839 sshd[17708]: Invalid user usu from 140.207.81.233 port 43701
Aug 26 23:50:47 h2779839 sshd[17708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233
Aug 26 23:50:47 h2779839 sshd[17708]: Invalid user usu from 140.207.81.233 port 43701
Aug 26 23:50:48 h2779839 sshd[17708]: Failed password for invalid user usu from 140.207.81.233 port 43701 ssh2
Aug 26 23:52:38 h2779839 sshd[17721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233  user=ro
...
2020-08-27 07:21:45

Recently Reported IPs

216.167.81.18 205.70.134.42 10.20.9.104 97.65.67.161
34.26.247.78 218.57.69.114 10.232.10.72 202.2.87.223
61.64.146.18 13.179.139.26 169.254.110.75 190.157.85.3
2606:4700:10::ac43:1778 2606:4700:10::6814:6639 2606:4700:10::ac43:2364 2606:4700:10::ac43:824
2606:4700:10::6816:709 2606:4700:10::ac43:1016 2606:4700:10::6814:9726 2606:4700:10::6814:5865