City: unknown
Region: unknown
Country: Kenya
Internet Service Provider: Safaricom
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '196.96.0.0 - 196.111.255.255'
% No abuse contact registered for 196.96.0.0 - 196.111.255.255
inetnum: 196.96.0.0 - 196.111.255.255
netname: SAFARICOM-2015
descr: Safaricom Limited
country: KE
org: ORG-SL70-AFRINIC
admin-c: VK24-AFRINIC
admin-c: JM27-AFRINIC
admin-c: CM107-AFRINIC
admin-c: VE6-AFRINIC
admin-c: GK40-AFRINIC
admin-c: TR18-AFRINIC
admin-c: EA99-AFRINIC
admin-c: SNN3-AFRINIC
tech-c: VK24-AFRINIC
tech-c: JM27-AFRINIC
tech-c: BS56-AFRINIC
tech-c: VE6-AFRINIC
tech-c: GK40-AFRINIC
tech-c: TR18-AFRINIC
tech-c: EA99-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: MNT-SAF2004
mnt-routes: MNT-SAF2004
source: AFRINIC # Filtered
parent: 196.0.0.0 - 196.255.255.255
organisation: ORG-SL70-AFRINIC
org-name: Safaricom Limited
org-type: LIR
country: KE
address: WAIYAKI WAY
address: PO BOX 66827 - 00800
address: NAIROBI
phone: tel:+254-722-727615
phone: tel:+254-772-004048
phone: tel:+254-722-002222
phone: tel:+254-725-347648
admin-c: GK40-AFRINIC
admin-c: TR18-AFRINIC
admin-c: VE6-AFRINIC
admin-c: EA99-AFRINIC
admin-c: CM107-AFRINIC
admin-c: JM27-AFRINIC
admin-c: VK24-AFRINIC
admin-c: SNN3-AFRINIC
tech-c: GK40-AFRINIC
tech-c: BS56-AFRINIC
tech-c: TR18-AFRINIC
tech-c: VE6-AFRINIC
tech-c: EA99-AFRINIC
tech-c: JM27-AFRINIC
tech-c: VK24-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: MNT-SAF2004
mnt-by: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered
person: Business Support
address: Nairobi Kenya
phone: tel:+254-722-003272
nic-hdl: BS56-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-ODYJJSDU1ISTV8DHNNCHVVTDTWOEWBS4-MNT
person: Castrol Mutinda
nic-hdl: CM107-AFRINIC
address: Nairobi
address: Kenya
address: Nairobi
address: Kenya
phone: tel:+254-711-319283
mnt-by: GENERATED-QV9VXJB6GA2BM7EIYJI2DMO6VX2CB2UG-MNT
source: AFRINIC # Filtered
person: Eric Angwenyi
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-726-949826
nic-hdl: EA99-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-MJPB85WVRW5SBBVKUJ8ANCZD9YY7JPBZ-MNT
person: Geoffry Kipchumba
address: Safaricom House
address: Nairobi
address: Kenya
phone: tel:+254-722-000000
nic-hdl: GK40-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-OJTXMNIFRMGL5NPUINICY6IGMUBMHHIJ-MNT
person: John Muita
address: P.O Box 66827, 00800
address: Nairobi
address: Kenya
address: Nairobi
address: Kenya
phone: tel:+254-722-002829
fax-no: tel:+254-722-003272
nic-hdl: JM27-afrinic
mnt-by: GENERATED-UNS1E7EXFG6F7TJILQ9DMMHDN4Y0VRSV-MNT
source: AFRINIC # Filtered
person: Stephen Njoroge Njuguna
address: Waiyaki Way
address: Nairobi 00800
address: Kenya
phone: tel:+254-727-371910
nic-hdl: SNN3-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-D8DIT7NFHZPSEVHLFDWP1CEUREU385WW-MNT
person: Timothy Rutto
nic-hdl: TR18-AFRINIC
address: PO BOX 66827 - 00800
address: Nairobi 00800
address: Kenya
phone: tel:+254-723-712399
mnt-by: GENERATED-GLFOMABXKHSQLZA8QNEAQSNSMQ8BNQIV-MNT
source: AFRINIC # Filtered
person: Vincent Etemesi
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-722-358432
nic-hdl: VE6-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-M261FOUJCRTAQ2N8CLDQ9JO1ZJ6VIVCB-MNT
person: Victor Kilei
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-725-403192
nic-hdl: VK24-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-JEAT1NSPVKKYP1NKGIDU6HLGNLM0U2LK-MNT
% Information related to '196.96.0.0/12AS33771'
route: 196.96.0.0/12
descr: Safaricom Limited
origin: AS33771
mnt-by: MNT-SAF2004
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.106.101.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.106.101.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:03:37 CST 2026
;; MSG SIZE rcvd: 107
Host 75.101.106.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 75.101.106.196.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.196.166.144 | attackspambots | Jun 10 07:56:11 lukav-desktop sshd\[29388\]: Invalid user user from 112.196.166.144 Jun 10 07:56:11 lukav-desktop sshd\[29388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.166.144 Jun 10 07:56:13 lukav-desktop sshd\[29388\]: Failed password for invalid user user from 112.196.166.144 port 48206 ssh2 Jun 10 07:58:58 lukav-desktop sshd\[29475\]: Invalid user soyle_app from 112.196.166.144 Jun 10 07:58:58 lukav-desktop sshd\[29475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.166.144 |
2020-06-10 13:03:38 |
| 149.56.132.202 | attackbots | (sshd) Failed SSH login from 149.56.132.202 (CA/Canada/202.ip-149-56-132.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 10 06:01:31 ubnt-55d23 sshd[29115]: Invalid user romano from 149.56.132.202 port 34966 Jun 10 06:01:33 ubnt-55d23 sshd[29115]: Failed password for invalid user romano from 149.56.132.202 port 34966 ssh2 |
2020-06-10 13:02:05 |
| 51.75.23.62 | attackspam | Jun 10 07:11:21 pkdns2 sshd\[64961\]: Invalid user jboss from 51.75.23.62Jun 10 07:11:23 pkdns2 sshd\[64961\]: Failed password for invalid user jboss from 51.75.23.62 port 47280 ssh2Jun 10 07:14:35 pkdns2 sshd\[65109\]: Failed password for root from 51.75.23.62 port 53392 ssh2Jun 10 07:17:50 pkdns2 sshd\[65284\]: Invalid user Waschlappen from 51.75.23.62Jun 10 07:17:53 pkdns2 sshd\[65284\]: Failed password for invalid user Waschlappen from 51.75.23.62 port 59530 ssh2Jun 10 07:21:08 pkdns2 sshd\[65463\]: Failed password for root from 51.75.23.62 port 37536 ssh2 ... |
2020-06-10 12:45:32 |
| 123.125.71.84 | attackbots | Automatic report - Banned IP Access |
2020-06-10 12:53:12 |
| 51.91.250.197 | attackbots | 2020-06-09T23:32:40.4807731495-001 sshd[35938]: Invalid user su from 51.91.250.197 port 50380 2020-06-09T23:32:42.8338941495-001 sshd[35938]: Failed password for invalid user su from 51.91.250.197 port 50380 ssh2 2020-06-09T23:35:55.0239381495-001 sshd[36076]: Invalid user ef from 51.91.250.197 port 52218 2020-06-09T23:35:55.0286311495-001 sshd[36076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.ip-51-91-250.eu 2020-06-09T23:35:55.0239381495-001 sshd[36076]: Invalid user ef from 51.91.250.197 port 52218 2020-06-09T23:35:56.5850251495-001 sshd[36076]: Failed password for invalid user ef from 51.91.250.197 port 52218 ssh2 ... |
2020-06-10 12:49:13 |
| 113.166.246.234 | attackspam | Automatic report - Port Scan Attack |
2020-06-10 12:27:42 |
| 112.161.78.70 | attackspambots | Jun 10 06:38:13 vps sshd[461819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.78.70 Jun 10 06:38:14 vps sshd[461819]: Failed password for invalid user monitor from 112.161.78.70 port 15042 ssh2 Jun 10 06:42:04 vps sshd[481362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.78.70 user=root Jun 10 06:42:06 vps sshd[481362]: Failed password for root from 112.161.78.70 port 17807 ssh2 Jun 10 06:45:49 vps sshd[500066]: Invalid user pisica from 112.161.78.70 port 20574 ... |
2020-06-10 13:02:25 |
| 222.186.180.147 | attackbotsspam | Jun 10 07:04:12 pve1 sshd[1364]: Failed password for root from 222.186.180.147 port 37850 ssh2 Jun 10 07:04:16 pve1 sshd[1364]: Failed password for root from 222.186.180.147 port 37850 ssh2 ... |
2020-06-10 13:07:03 |
| 113.161.160.93 | attackbots | Helo |
2020-06-10 12:58:30 |
| 182.162.104.153 | attackbots | 2020-06-10T04:35:15.696309shield sshd\[24710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.104.153 user=root 2020-06-10T04:35:18.210348shield sshd\[24710\]: Failed password for root from 182.162.104.153 port 35824 ssh2 2020-06-10T04:39:08.125290shield sshd\[26535\]: Invalid user betrieb from 182.162.104.153 port 36799 2020-06-10T04:39:08.129471shield sshd\[26535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.104.153 2020-06-10T04:39:09.961228shield sshd\[26535\]: Failed password for invalid user betrieb from 182.162.104.153 port 36799 ssh2 |
2020-06-10 12:46:55 |
| 222.186.30.112 | attackbots | 2020-06-10T07:46:06.830215lavrinenko.info sshd[26048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root 2020-06-10T07:46:08.712299lavrinenko.info sshd[26048]: Failed password for root from 222.186.30.112 port 28403 ssh2 2020-06-10T07:46:06.830215lavrinenko.info sshd[26048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root 2020-06-10T07:46:08.712299lavrinenko.info sshd[26048]: Failed password for root from 222.186.30.112 port 28403 ssh2 2020-06-10T07:46:12.635588lavrinenko.info sshd[26048]: Failed password for root from 222.186.30.112 port 28403 ssh2 ... |
2020-06-10 12:46:37 |
| 112.85.42.178 | attackspambots | Jun 10 06:13:05 eventyay sshd[27342]: Failed password for root from 112.85.42.178 port 64754 ssh2 Jun 10 06:13:17 eventyay sshd[27342]: error: maximum authentication attempts exceeded for root from 112.85.42.178 port 64754 ssh2 [preauth] Jun 10 06:13:24 eventyay sshd[27350]: Failed password for root from 112.85.42.178 port 27375 ssh2 ... |
2020-06-10 12:38:38 |
| 141.144.61.39 | attack | Jun 10 05:46:34 piServer sshd[21205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.61.39 Jun 10 05:46:36 piServer sshd[21205]: Failed password for invalid user calenda from 141.144.61.39 port 18850 ssh2 Jun 10 05:54:25 piServer sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.144.61.39 ... |
2020-06-10 13:07:25 |
| 159.65.41.104 | attackbots | Jun 10 05:57:34 inter-technics sshd[15638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104 user=root Jun 10 05:57:37 inter-technics sshd[15638]: Failed password for root from 159.65.41.104 port 54050 ssh2 Jun 10 05:59:55 inter-technics sshd[15793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104 user=root Jun 10 05:59:57 inter-technics sshd[15793]: Failed password for root from 159.65.41.104 port 37974 ssh2 Jun 10 06:02:10 inter-technics sshd[15992]: Invalid user zhaoliu from 159.65.41.104 port 49052 ... |
2020-06-10 12:38:03 |
| 106.12.218.171 | attack | 2020-06-10T04:27:44.476084shield sshd\[20842\]: Invalid user admin from 106.12.218.171 port 48468 2020-06-10T04:27:44.479592shield sshd\[20842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.218.171 2020-06-10T04:27:46.075717shield sshd\[20842\]: Failed password for invalid user admin from 106.12.218.171 port 48468 ssh2 2020-06-10T04:36:33.639685shield sshd\[25323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.218.171 user=root 2020-06-10T04:36:36.196970shield sshd\[25323\]: Failed password for root from 106.12.218.171 port 56516 ssh2 |
2020-06-10 13:00:52 |