Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kiserian

Region: Kajiado

Country: Kenya

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.230.0.0 - 105.230.255.255'

% No abuse contact registered for 105.230.0.0 - 105.230.255.255

inetnum:        105.230.0.0 - 105.230.255.255
netname:        AirtelBroadband
descr:          Airtel Broadband
country:        KE
admin-c:        PM14-AFRINIC
tech-c:         PM14-AFRINIC
status:         ASSIGNED PA
mnt-by:         Henry-Owiti
source:         AFRINIC # Filtered
parent:         105.230.0.0 - 105.231.255.255

person:         Patrick Muiruri
address:        P. O. Box 73146, 00200
address:        Parkside Towers, Mombasa Road
address:        NAIROBI,  KENYA
phone:          tel:+254-733-332172
phone:          tel:+254-734-110044
nic-hdl:        PM14-AFRINIC
mnt-by:         GENERATED-HEVJSMGQFVLP9VYX5ENQHVXKELSSM7QW-MNT
source:         AFRINIC # Filtered

% Information related to '105.230.192.0/18AS36926'

route:          105.230.192.0/18
descr:          Airtel KE Mobile & Fixed Internet
origin:         AS36926
mnt-by:         AIRTEL-KE
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.230.204.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.230.204.252.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 14:55:32 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'252.204.230.105.in-addr.arpa domain name pointer 252-204-230-105.r.airtelkenya.com.
'
Nslookup info:
b'252.204.230.105.in-addr.arpa	name = 252-204-230-105.r.airtelkenya.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
84.39.33.198 attack
<6 unauthorized SSH connections
2019-07-13 15:04:55
200.207.63.165 attackspam
Invalid user helena from 200.207.63.165 port 50525
2019-07-13 15:18:28
220.163.107.130 attackspambots
Invalid user build from 220.163.107.130 port 9702
2019-07-13 15:15:53
220.247.175.58 attack
Jul 13 08:57:34 jane sshd\[1637\]: Invalid user flower from 220.247.175.58 port 58679
Jul 13 08:57:34 jane sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.175.58
Jul 13 08:57:37 jane sshd\[1637\]: Failed password for invalid user flower from 220.247.175.58 port 58679 ssh2
...
2019-07-13 15:15:22
223.83.155.77 attackspambots
Invalid user oracle from 223.83.155.77 port 41512
2019-07-13 15:15:03
46.101.72.145 attackbots
Invalid user roberto from 46.101.72.145 port 42418
2019-07-13 15:11:00
89.133.62.227 attackspam
Invalid user v from 89.133.62.227 port 44216
2019-07-13 15:04:34
45.55.145.31 attackspambots
Invalid user gk from 45.55.145.31 port 54765
2019-07-13 15:11:29
190.119.190.122 attackspam
SSH Brute Force
2019-07-13 15:18:59
79.2.138.202 attack
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: Invalid user user from 79.2.138.202 port 65001
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.2.138.202
Jul 13 08:54:02 MK-Soft-Root1 sshd\[19134\]: Failed password for invalid user user from 79.2.138.202 port 65001 ssh2
...
2019-07-13 15:05:52
103.133.108.21 attackbotsspam
Invalid user alerm from 103.133.108.21 port 62155
2019-07-13 15:35:05
178.32.105.63 attackbots
Invalid user publish from 178.32.105.63 port 33046
2019-07-13 14:47:04
159.65.54.221 attackbotsspam
Invalid user lukasz from 159.65.54.221 port 51942
2019-07-13 15:27:12
142.93.47.125 attackspam
Invalid user scan from 142.93.47.125 port 37862
2019-07-13 14:51:34
175.203.95.49 attackspambots
Jul 13 09:10:58 vps691689 sshd[28867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.95.49
Jul 13 09:11:01 vps691689 sshd[28867]: Failed password for invalid user webmaster from 175.203.95.49 port 43580 ssh2
...
2019-07-13 15:23:47

Recently Reported IPs

247.99.211.132 134.244.207.148 110.77.248.38 2606:4700:10::6816:432
2606:4700:10::6814:4621 2606:4700:10::6814:8162 2606:4700:10::6814:9733 2606:4700:10::6814:9289
2606:4700:10::6816:2672 2606:4700:10::6814:5720 2606:4700:10::6814:5634 2606:4700:10::6816:3426
74.234.248.60 39.185.222.19 112.111.13.163 223.199.189.4
1.83.125.78 1.83.125.176 122.96.28.156 118.212.120.51