City: Kiserian
Region: Kajiado
Country: Kenya
Internet Service Provider: Airtel
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '105.230.0.0 - 105.230.255.255'
% No abuse contact registered for 105.230.0.0 - 105.230.255.255
inetnum: 105.230.0.0 - 105.230.255.255
netname: AirtelBroadband
descr: Airtel Broadband
country: KE
admin-c: PM14-AFRINIC
tech-c: PM14-AFRINIC
status: ASSIGNED PA
mnt-by: Henry-Owiti
source: AFRINIC # Filtered
parent: 105.230.0.0 - 105.231.255.255
person: Patrick Muiruri
address: P. O. Box 73146, 00200
address: Parkside Towers, Mombasa Road
address: NAIROBI, KENYA
phone: tel:+254-733-332172
phone: tel:+254-734-110044
nic-hdl: PM14-AFRINIC
mnt-by: GENERATED-HEVJSMGQFVLP9VYX5ENQHVXKELSSM7QW-MNT
source: AFRINIC # Filtered
% Information related to '105.230.192.0/18AS36926'
route: 105.230.192.0/18
descr: Airtel KE Mobile & Fixed Internet
origin: AS36926
mnt-by: AIRTEL-KE
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.230.204.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.230.204.252. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 14:55:32 CST 2026
;; MSG SIZE rcvd: 108
b'252.204.230.105.in-addr.arpa domain name pointer 252-204-230-105.r.airtelkenya.com.
'
b'252.204.230.105.in-addr.arpa name = 252-204-230-105.r.airtelkenya.com.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 84.39.33.198 | attack | <6 unauthorized SSH connections |
2019-07-13 15:04:55 |
| 200.207.63.165 | attackspam | Invalid user helena from 200.207.63.165 port 50525 |
2019-07-13 15:18:28 |
| 220.163.107.130 | attackspambots | Invalid user build from 220.163.107.130 port 9702 |
2019-07-13 15:15:53 |
| 220.247.175.58 | attack | Jul 13 08:57:34 jane sshd\[1637\]: Invalid user flower from 220.247.175.58 port 58679 Jul 13 08:57:34 jane sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.175.58 Jul 13 08:57:37 jane sshd\[1637\]: Failed password for invalid user flower from 220.247.175.58 port 58679 ssh2 ... |
2019-07-13 15:15:22 |
| 223.83.155.77 | attackspambots | Invalid user oracle from 223.83.155.77 port 41512 |
2019-07-13 15:15:03 |
| 46.101.72.145 | attackbots | Invalid user roberto from 46.101.72.145 port 42418 |
2019-07-13 15:11:00 |
| 89.133.62.227 | attackspam | Invalid user v from 89.133.62.227 port 44216 |
2019-07-13 15:04:34 |
| 45.55.145.31 | attackspambots | Invalid user gk from 45.55.145.31 port 54765 |
2019-07-13 15:11:29 |
| 190.119.190.122 | attackspam | SSH Brute Force |
2019-07-13 15:18:59 |
| 79.2.138.202 | attack | Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: Invalid user user from 79.2.138.202 port 65001 Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.2.138.202 Jul 13 08:54:02 MK-Soft-Root1 sshd\[19134\]: Failed password for invalid user user from 79.2.138.202 port 65001 ssh2 ... |
2019-07-13 15:05:52 |
| 103.133.108.21 | attackbotsspam | Invalid user alerm from 103.133.108.21 port 62155 |
2019-07-13 15:35:05 |
| 178.32.105.63 | attackbots | Invalid user publish from 178.32.105.63 port 33046 |
2019-07-13 14:47:04 |
| 159.65.54.221 | attackbotsspam | Invalid user lukasz from 159.65.54.221 port 51942 |
2019-07-13 15:27:12 |
| 142.93.47.125 | attackspam | Invalid user scan from 142.93.47.125 port 37862 |
2019-07-13 14:51:34 |
| 175.203.95.49 | attackspambots | Jul 13 09:10:58 vps691689 sshd[28867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.95.49 Jul 13 09:11:01 vps691689 sshd[28867]: Failed password for invalid user webmaster from 175.203.95.49 port 43580 ssh2 ... |
2019-07-13 15:23:47 |