Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '197.80.0.0 - 197.87.255.255'

% Abuse contact for '197.80.0.0 - 197.87.255.255' is 'abuse@optinet.net'

inetnum:        197.80.0.0 - 197.87.255.255
netname:        OPTINET-17-20110601
descr:          Dimension Data
country:        ZA
org:            ORG-DD1-AFRINIC
admin-c:        EK43-AFRINIC
admin-c:        DA25-AFRINIC
admin-c:        JA50-AFRINIC
admin-c:        SM144-AFRINIC
admin-c:        MDP1-AFRINIC
admin-c:        FH9-AFRINIC
admin-c:        PD19-AFRINIC
admin-c:        ZM11-AFRINIC
admin-c:        NK18-AFRINIC
admin-c:        ZT12-AFRINIC
admin-c:        RS62-AFRINIC
tech-c:         EK43-AFRINIC
tech-c:         DA25-AFRINIC
tech-c:         JA50-AFRINIC
tech-c:         SM144-AFRINIC
tech-c:         FH9-AFRINIC
tech-c:         PD19-AFRINIC
tech-c:         ZM11-AFRINIC
tech-c:         NK18-AFRINIC
tech-c:         ZT12-AFRINIC
tech-c:         RS62-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      IS-OPTINET-MNT
mnt-domains:    IS-OPTINET-MNT
mnt-irt:        IRT-OPTINET-ABUSE
source:         AFRINIC # Filtered
parent:         197.0.0.0 - 197.255.255.255

organisation:   ORG-DD1-AFRINIC
org-name:       Dimension Data
org-type:       LIR
country:        ZA
address:        The Campus,
address:        57 Sloane St,
address:        Bryanston
address:        Johannesburg 2021
phone:          tel:+27-72-614-3611
phone:          tel:+27-11-575-0325
phone:          tel:+27-11-575-0969
admin-c:        JA50-AFRINIC
admin-c:        DA25-AFRINIC
admin-c:        EK43-AFRINIC
admin-c:        MDP1-AFRINIC
admin-c:        SM144-AFRINIC
admin-c:        NK18-AFRINIC
admin-c:        ZM11-AFRINIC
admin-c:        PD19-AFRINIC
admin-c:        FH9-AFRINIC
admin-c:        ZT12-AFRINIC
admin-c:        RS62-AFRINIC
tech-c:         JA50-AFRINIC
tech-c:         DA25-AFRINIC
tech-c:         EK43-AFRINIC
tech-c:         MDP1-AFRINIC
tech-c:         SM144-AFRINIC
tech-c:         NK18-AFRINIC
tech-c:         ZM11-AFRINIC
tech-c:         PD19-AFRINIC
tech-c:         FH9-AFRINIC
tech-c:         ZT12-AFRINIC
tech-c:         RS62-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        TF-168-209-0-0-168-210-255-255-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         DNS Administration
address:        PO BOX 3234
address:        Parklands, Gauteng 2121
address:        ZA
phone:          tel:+27-11-447-5566
fax-no:         tel:+27-11-447-5567
nic-hdl:        DA25-AFRINIC
mnt-by:         GENERATED-5DRIE83KKFOSLY1J26BA6OERWG7UT3KG-MNT
source:         AFRINIC # Filtered

person:         Elne Kramer
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
phone:          tel:+27-11-575-7845
nic-hdl:        EK43-AFRINIC
mnt-by:         GENERATED-MH5BHHWXXJNMX1MQLYAJHIY9HED5QGHA-MNT
source:         AFRINIC # Filtered

person:         Faiz Hartley
nic-hdl:        FH9-AFRINIC
address:        100 Fairway Close
address:        Cape Town 7500
address:        South Africa
address:        Cape Town
address:        Other
phone:          tel:+27-21-596-4700
mnt-by:         GENERATED-SRDU2OPM7ENJQXAL2K51PPF7CBCIQAGH-MNT
source:         AFRINIC # Filtered

person:         Jehad Arnold
address:        100 Fairway Close
address:        Cape Town 7500
address:        South Africa
phone:          +0215964700
nic-hdl:        JA50-AFRINIC
mnt-by:         GENERATED-TVETECITNYRHD1CINUQQA0H9U7STCYUA-MNT
source:         AFRINIC # Filtered

person:         Marcel Di Perna
nic-hdl:        MDP1-AFRINIC
address:        Mweb Building
address:        100 Fairway Close
address:        Parow
address:        Cape Town 7500
address:        South Africa
phone:          tel:+27-21-596-4755
org:            ORG-MA20-AFRINIC
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Niel Kruger
nic-hdl:        NK18-AFRINIC
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
address:        JHB
address:        South Africa
phone:          tel:+27-87-354-0207
mnt-by:         GENERATED-ACXHGWHAPVIDGKL5YZMHPRHOLBXUU0GO-MNT
source:         AFRINIC # Filtered

person:         Pawel Dabrowski
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        South Africa
address:        Johannesburg
address:        South Africa
phone:          tel:+27-83-554-1177
phone:          tel:+27-11-575-0044
nic-hdl:        PD19-AFRINIC
mnt-by:         GENERATED-ZWDYJ2VCIBPGR9R7QJRROAVSGRMM4TCU-MNT
source:         AFRINIC # Filtered

person:         Ruan Snyman
address:        The Campus, 57 Sloane Street
address:        Bryanston, Gauteng
address:        Johannesburg 2021
address:        Africa
phone:          tel:+27-11-575-7845
nic-hdl:        RS62-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-W1JB6VTGPJZZJPXCKIRMBRMY57SMLJK3-MNT

person:         Sandeep Makan
nic-hdl:        SM144-AFRINIC
address:        57 Sloane street
address:        The Campus
address:        Bryanston 2021
address:        South Africa
address:        Johannesburg
address:        South Africa
phone:          tel:+27-11-575-0969
mnt-by:         GENERATED-NLOHSH0UN9GCE7Y5YXJQLLCRDOFTMOAE-MNT
source:         AFRINIC # Filtered

person:         Ziyaad Munshi
nic-hdl:        ZM11-AFRINIC
address:        The Campus, 57 Sloane Street
address:        Bryanston
address:        Gauteng
address:        Johannesburg 2021
address:        Johannesburg
address:        Other
phone:          tel:+27-11-575-0211
mnt-by:         GENERATED-CSQQAVAMDFYEN4RG8RLAQ3T44NPRWWIG-MNT
source:         AFRINIC # Filtered

person:         IS Hostmaster
nic-hdl:        ZT12-AFRINIC
address:        The Internet Solution
address:        The Campus, 57 Sloane Street
address:        Bryanston
address:        Gauteng
address:        Johannesburg 2021
address:        South Africa
phone:          tel:+27-11-575-1000
org:            ORG-TIS1-AFRINIC
mnt-by:         GENERATED-4THKYWBYLLP54MAK15NBL6CWUURHVN1A-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.82.86.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.82.86.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 10:44:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 43.86.82.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.86.82.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.94.56.225 attackspambots
Aug 12 03:38:54 marvibiene sshd[30672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.56.225  user=root
Aug 12 03:38:56 marvibiene sshd[30672]: Failed password for root from 13.94.56.225 port 49226 ssh2
Aug 12 03:54:53 marvibiene sshd[30944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.56.225  user=root
Aug 12 03:54:55 marvibiene sshd[30944]: Failed password for root from 13.94.56.225 port 39860 ssh2
2020-08-12 12:29:27
185.176.27.102 attackbotsspam
Aug 12 05:24:26 [host] kernel: [2869661.666549] [U
Aug 12 05:37:15 [host] kernel: [2870430.029711] [U
Aug 12 05:38:12 [host] kernel: [2870487.211574] [U
Aug 12 05:50:49 [host] kernel: [2871244.156557] [U
Aug 12 05:51:28 [host] kernel: [2871283.036160] [U
Aug 12 05:54:20 [host] kernel: [2871455.396885] [U
2020-08-12 12:54:41
101.89.110.204 attackspam
prod11
...
2020-08-12 12:23:09
114.7.164.170 attackspambots
$f2bV_matches
2020-08-12 12:22:47
47.245.35.63 attack
(sshd) Failed SSH login from 47.245.35.63 (US/United States/-): 5 in the last 3600 secs
2020-08-12 12:36:56
124.132.114.22 attackspam
Aug 12 06:45:41 journals sshd\[26728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.132.114.22  user=root
Aug 12 06:45:44 journals sshd\[26728\]: Failed password for root from 124.132.114.22 port 30056 ssh2
Aug 12 06:50:16 journals sshd\[27245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.132.114.22  user=root
Aug 12 06:50:18 journals sshd\[27245\]: Failed password for root from 124.132.114.22 port 14290 ssh2
Aug 12 06:54:47 journals sshd\[27579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.132.114.22  user=root
...
2020-08-12 12:33:50
47.17.177.110 attackspambots
*Port Scan* detected from 47.17.177.110 (US/United States/New York/New York/ool-2f11b16e.dyn.optonline.net). 4 hits in the last 120 seconds
2020-08-12 12:20:23
222.186.180.41 attackbots
Aug 12 06:53:11 melroy-server sshd[6896]: Failed password for root from 222.186.180.41 port 48718 ssh2
Aug 12 06:53:15 melroy-server sshd[6896]: Failed password for root from 222.186.180.41 port 48718 ssh2
...
2020-08-12 12:55:43
142.93.247.221 attack
*Port Scan* detected from 142.93.247.221 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 30 seconds
2020-08-12 12:21:43
167.99.131.243 attackspambots
Aug 12 06:06:00 srv-ubuntu-dev3 sshd[100421]: Invalid user 1q2w_123 from 167.99.131.243
Aug 12 06:06:00 srv-ubuntu-dev3 sshd[100421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.131.243
Aug 12 06:06:00 srv-ubuntu-dev3 sshd[100421]: Invalid user 1q2w_123 from 167.99.131.243
Aug 12 06:06:02 srv-ubuntu-dev3 sshd[100421]: Failed password for invalid user 1q2w_123 from 167.99.131.243 port 47528 ssh2
Aug 12 06:09:41 srv-ubuntu-dev3 sshd[101019]: Invalid user qianyi861003!@# from 167.99.131.243
Aug 12 06:09:41 srv-ubuntu-dev3 sshd[101019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.131.243
Aug 12 06:09:41 srv-ubuntu-dev3 sshd[101019]: Invalid user qianyi861003!@# from 167.99.131.243
Aug 12 06:09:43 srv-ubuntu-dev3 sshd[101019]: Failed password for invalid user qianyi861003!@# from 167.99.131.243 port 57106 ssh2
Aug 12 06:13:32 srv-ubuntu-dev3 sshd[101471]: Invalid user sa.2014 from 167.99.13
...
2020-08-12 12:22:21
79.8.196.108 attackbots
Aug 12 04:26:54 localhost sshd[15469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-79-8-196-108.business.telecomitalia.it  user=root
Aug 12 04:26:56 localhost sshd[15469]: Failed password for root from 79.8.196.108 port 54058 ssh2
Aug 12 04:31:13 localhost sshd[15937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-79-8-196-108.business.telecomitalia.it  user=root
Aug 12 04:31:15 localhost sshd[15937]: Failed password for root from 79.8.196.108 port 58755 ssh2
Aug 12 04:35:42 localhost sshd[16422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-79-8-196-108.business.telecomitalia.it  user=root
Aug 12 04:35:44 localhost sshd[16422]: Failed password for root from 79.8.196.108 port 50375 ssh2
...
2020-08-12 13:01:29
218.92.0.249 attackbots
Aug 12 06:51:18 ip40 sshd[27769]: Failed password for root from 218.92.0.249 port 38908 ssh2
Aug 12 06:51:23 ip40 sshd[27769]: Failed password for root from 218.92.0.249 port 38908 ssh2
...
2020-08-12 12:52:23
159.89.166.91 attack
Failed password for root from 159.89.166.91 port 47332 ssh2
2020-08-12 12:55:25
80.82.70.118 attackbots
2020-08-11 01:34:07 Unauthorized connection attempt to IMAP/POP
2020-08-12 12:59:39
95.216.223.47 attackspam
95.216.223.47 - - \[12/Aug/2020:05:53:45 +0200\] "POST /wp-login.php HTTP/1.0" 200 6382 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
95.216.223.47 - - \[12/Aug/2020:05:54:18 +0200\] "POST /wp-login.php HTTP/1.0" 200 6518 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
95.216.223.47 - - \[12/Aug/2020:05:54:25 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 767 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-12 12:51:26

Recently Reported IPs

183.7.16.81 218.203.193.138 59.82.83.234 59.82.83.189
59.82.83.182 59.82.83.177 59.82.83.148 59.82.83.120
59.82.83.11 59.82.83.107 59.82.135.218 106.36.192.162
104.249.173.98 59.82.83.183 59.82.83.154 59.82.135.14
59.82.135.101 60.187.0.224 59.82.83.22 59.82.135.205