Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: JAMBONET

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.202.195.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5978
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.202.195.213.		IN	A

;; AUTHORITY SECTION:
.			2289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033100 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Mar 31 14:31:36 +08 2019
;; MSG SIZE  rcvd: 119

Host info
213.195.202.196.in-addr.arpa domain name pointer kifaru.telkom.co.ke.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
213.195.202.196.in-addr.arpa	name = kifaru.telkom.co.ke.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
46.101.112.205 attackspambots
fail2ban honeypot
2020-01-03 18:19:44
82.208.162.115 attackbotsspam
Unauthorized SSH login attempts
2020-01-03 18:43:42
114.67.66.199 attackbotsspam
Invalid user matschke from 114.67.66.199 port 34255
2020-01-03 18:40:28
189.92.173.30 attackbots
Unauthorized connection attempt from IP address 189.92.173.30 on Port 445(SMB)
2020-01-03 18:51:00
183.80.89.104 attackbotsspam
Unauthorized connection attempt detected from IP address 183.80.89.104 to port 23
2020-01-03 18:33:31
113.175.235.119 attackspam
1578026793 - 01/03/2020 05:46:33 Host: 113.175.235.119/113.175.235.119 Port: 445 TCP Blocked
2020-01-03 18:27:21
154.8.185.122 attack
Repeated failed SSH attempt
2020-01-03 18:46:29
222.186.175.215 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Failed password for root from 222.186.175.215 port 52066 ssh2
Failed password for root from 222.186.175.215 port 52066 ssh2
Failed password for root from 222.186.175.215 port 52066 ssh2
Failed password for root from 222.186.175.215 port 52066 ssh2
2020-01-03 18:50:03
185.162.235.107 attackspam
Jan  3 06:59:03 srv01 postfix/smtpd[21429]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: authentication failure
Jan  3 06:59:03 srv01 postfix/smtpd[21519]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: authentication failure
Jan  3 07:01:47 srv01 postfix/smtpd[21429]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: authentication failure
...
2020-01-03 18:22:27
111.229.103.67 attackbotsspam
$f2bV_matches
2020-01-03 18:25:32
121.168.115.36 attack
"Fail2Ban detected SSH brute force attempt"
2020-01-03 18:48:06
123.30.76.140 attackspambots
Invalid user glasco from 123.30.76.140 port 46056
2020-01-03 18:31:56
158.69.23.145 attackspambots
3389BruteforceStormFW23
2020-01-03 18:31:25
185.216.34.230 attackbotsspam
SQL Injection attack
2020-01-03 18:55:18
213.135.101.202 attack
Unauthorized connection attempt from IP address 213.135.101.202 on Port 445(SMB)
2020-01-03 18:51:26

Recently Reported IPs

197.217.66.163 195.209.48.51 195.158.91.236 195.116.237.65
193.254.37.110 191.102.120.85 191.102.120.24 190.115.255.119
190.90.135.167 190.90.43.24 190.13.86.99 190.13.86.36
188.243.68.4 186.10.74.162 185.19.214.62 185.11.224.221
181.57.58.112 178.64.252.75 175.110.2.254 168.167.50.131