City: Richards Bay
Region: KwaZulu-Natal
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '196.21.80.0 - 196.21.87.255'
% Abuse contact for '196.21.80.0 - 196.21.87.255' is 'abuse@tenet.ac.za'
inetnum: 196.21.80.0 - 196.21.87.255
netname: UZULU-196-21-80-0
descr: University of Zululand
descr: KwaDlangezwa
descr: 3886
country: ZA
admin-c: YCA-AFRINIC
tech-c: SAA2-AFRINIC
status: ASSIGNED PA
mnt-by: TF-196-21-MNT
mnt-lower: TF-196-21-MNT
source: AFRINIC # Filtered
parent: 196.21.0.0 - 196.21.255.255
person: Soren Aalto
address: KwaDlangezwa
address: kwaDlangezwa
address: 3886
address: ZA
phone: tel:+1-073-162-0548
phone: tel:+27-35-902-6800
fax-no: tel:+1-035-902-6028
nic-hdl: SAA2-AFRINIC
mnt-by: GENERATED-LW6QYFJFOTT55TWBUPMAN1L5HKTLUCGB-MNT
source: AFRINIC # Filtered
person: Yvette Canham
address: KwaDlangezwa
address: kwaDlangezwa
address: 3886
address: ZA
phone: tel:+1-083-779-9391
phone: tel:+27-35-902-6802
fax-no: tel:+1-035-902-6028
nic-hdl: YCA-AFRINIC
mnt-by: GENERATED-KJVSFFLRCV17TVUD2TSD7ATRNFLUJVCV-MNT
source: AFRINIC # Filtered
% Information related to '196.21.0.0/16AS2018'
route: 196.21.0.0/16
descr: MAINTAINED BY TENET
origin: AS2018
mnt-by: TNET-MNT01
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.21.82.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.21.82.154. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:50:10 CST 2026
;; MSG SIZE rcvd: 106
Host 154.82.21.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 154.82.21.196.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.241.202.144 | attack | [N10.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-08-27 07:32:35 |
| 106.12.10.8 | attack | $f2bV_matches |
2020-08-27 07:34:37 |
| 120.132.99.101 | attack | Aug 26 16:46:09 Host-KLAX-C sshd[32192]: User root from 120.132.99.101 not allowed because not listed in AllowUsers ... |
2020-08-27 07:20:05 |
| 122.152.208.242 | attackbots | (sshd) Failed SSH login from 122.152.208.242 (CN/China/-): 5 in the last 3600 secs |
2020-08-27 07:46:24 |
| 103.89.252.123 | attack | SSH Invalid Login |
2020-08-27 07:44:03 |
| 118.24.116.78 | attackspambots | Invalid user admin from 118.24.116.78 port 34628 |
2020-08-27 07:38:12 |
| 212.67.69.27 | attackbotsspam | SSH break in attempt ... |
2020-08-27 07:33:09 |
| 114.170.116.71 | attack | Port scan on 18 Aug 20. |
2020-08-27 07:41:07 |
| 23.129.64.215 | attackspam | Aug 26 22:51:43 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2 Aug 26 22:51:46 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2 Aug 26 22:51:50 *hidden* sshd[21512]: Failed password for *hidden* from 23.129.64.215 port 48250 ssh2 |
2020-08-27 07:15:49 |
| 5.188.84.119 | attack | 0,31-01/02 [bc01/m11] PostRequest-Spammer scoring: harare01_holz |
2020-08-27 07:39:36 |
| 212.70.149.4 | attackbots | Aug 27 01:23:11 relay postfix/smtpd\[11622\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 27 01:26:28 relay postfix/smtpd\[11554\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 27 01:29:46 relay postfix/smtpd\[13149\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 27 01:33:07 relay postfix/smtpd\[14979\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 27 01:36:27 relay postfix/smtpd\[16492\]: warning: unknown\[212.70.149.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-27 07:36:48 |
| 218.59.193.14 | attackbots | Brute Force |
2020-08-27 07:40:42 |
| 201.150.34.28 | attackbots | Invalid user sudo1 from 201.150.34.28 port 33730 |
2020-08-27 07:24:28 |
| 85.135.95.218 | attackbots | Brute Force |
2020-08-27 07:21:56 |
| 140.207.81.233 | attackbotsspam | Aug 26 23:48:51 h2779839 sshd[17690]: Invalid user ruud from 140.207.81.233 port 31785 Aug 26 23:48:51 h2779839 sshd[17690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233 Aug 26 23:48:51 h2779839 sshd[17690]: Invalid user ruud from 140.207.81.233 port 31785 Aug 26 23:48:52 h2779839 sshd[17690]: Failed password for invalid user ruud from 140.207.81.233 port 31785 ssh2 Aug 26 23:50:47 h2779839 sshd[17708]: Invalid user usu from 140.207.81.233 port 43701 Aug 26 23:50:47 h2779839 sshd[17708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233 Aug 26 23:50:47 h2779839 sshd[17708]: Invalid user usu from 140.207.81.233 port 43701 Aug 26 23:50:48 h2779839 sshd[17708]: Failed password for invalid user usu from 140.207.81.233 port 43701 ssh2 Aug 26 23:52:38 h2779839 sshd[17721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.81.233 user=ro ... |
2020-08-27 07:21:45 |