City: unknown
Region: unknown
Country: Nigeria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '196.222.0.0 - 196.222.255.255'
% No abuse contact registered for 196.222.0.0 - 196.222.255.255
inetnum: 196.222.0.0 - 196.222.255.255
netname: UNI-N-NSUKKA
descr: UNIVERSITY OF NIGERIA
country: NG
org: ORG-UoN1-AFRINIC
admin-c: JN7-AFRINIC
admin-c: PO13-AFRINIC
tech-c: JN7-AFRINIC
status: ASSIGNED PI
mnt-by: AFRINIC-HM-MNT
mnt-lower: UNIV-NG-MNT
source: AFRINIC # Filtered
parent: 196.0.0.0 - 196.255.255.255
organisation: ORG-UoN1-AFRINIC
org-name: University of Nigeria
org-type: EU-PI
country: NG
address: University of Nigeria, Nsukka
address: Enugu State
address: Nsukka 410001
phone: tel:+234-803-734-3211
phone: tel:+234-803-734-3211
phone: tel:+234-803-572-3901
phone: tel:+234-803-572-3901
admin-c: PO13-AFRINIC
admin-c: JN7-AFRINIC
tech-c: JN7-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: UNIV-NG-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: John Ngwoke
address: Information and Communication Technologies (ICT) Centre
address: University of Nigeria, Nsukka
address: Nigeria
address: Nsukka
address: Nigeria
phone: tel:+234-803-572-3901
nic-hdl: JN7-AFRINIC
mnt-by: GENERATED-DDSO4AUX94OHOGG6UE7S3EJCJP76FV36-MNT
source: AFRINIC # Filtered
person: Paul Oranu
address: Management Information Systems (MIS) Unit
address: University of Nigeria
address: Nsukka, Enugu State
address: Nigeria
address: Nsukka 410001
address: Nigeria
phone: tel:+234-803-734-3211
phone: tel:+234-803-572-3901
nic-hdl: PO13-AFRINIC
mnt-by: GENERATED-1LLHJP5ZB5YDJDM542VXZBZ9WQ24VXPE-MNT
source: AFRINIC # Filtered
% Information related to '196.222.0.0/16AS37405'
route: 196.222.0.0/16
descr: University of Nigeria Prefixes
origin: AS37405
remarks: ****************************
remarks: To view the original object, please query the AFRINIC Database at:
remarks: * http://www.afrinic.net/services/whois-query
remarks: ****************************
mnt-by: UNIV-NG-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.222.206.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.222.206.33. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 11:26:47 CST 2026
;; MSG SIZE rcvd: 107
Host 33.206.222.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 33.206.222.196.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.121.235.228 | attack | Automatic report - Port Scan Attack |
2019-10-04 20:55:50 |
| 148.72.212.161 | attackbots | Oct 4 14:24:30 icinga sshd[26843]: Failed password for root from 148.72.212.161 port 33080 ssh2 ... |
2019-10-04 21:00:20 |
| 193.112.27.92 | attackbots | Oct 4 14:42:49 meumeu sshd[22557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92 Oct 4 14:42:52 meumeu sshd[22557]: Failed password for invalid user Santos1@3 from 193.112.27.92 port 42320 ssh2 Oct 4 14:47:41 meumeu sshd[23480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92 ... |
2019-10-04 20:57:29 |
| 220.173.55.8 | attackbotsspam | Oct 4 14:44:34 SilenceServices sshd[16814]: Failed password for root from 220.173.55.8 port 27182 ssh2 Oct 4 14:48:43 SilenceServices sshd[17895]: Failed password for root from 220.173.55.8 port 40532 ssh2 |
2019-10-04 20:59:08 |
| 188.162.236.212 | attackspambots | " " |
2019-10-04 20:41:53 |
| 92.245.106.242 | attack | email spam |
2019-10-04 20:26:02 |
| 178.62.79.227 | attackbotsspam | SSH bruteforce |
2019-10-04 20:24:54 |
| 193.187.82.74 | attackbotsspam | postfix (unknown user, SPF fail or relay access denied) |
2019-10-04 20:56:58 |
| 185.209.0.17 | attackbots | 10/04/2019-13:25:24.332343 185.209.0.17 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-04 20:19:39 |
| 80.211.249.177 | attack | Oct 4 14:26:01 vps647732 sshd[13954]: Failed password for root from 80.211.249.177 port 41462 ssh2 ... |
2019-10-04 20:30:33 |
| 116.196.94.108 | attack | Oct 4 14:24:09 saschabauer sshd[2750]: Failed password for root from 116.196.94.108 port 53080 ssh2 |
2019-10-04 20:56:24 |
| 51.38.51.200 | attackspam | Oct 4 18:24:42 areeb-Workstation sshd[18316]: Failed password for root from 51.38.51.200 port 38508 ssh2 ... |
2019-10-04 21:01:51 |
| 41.140.165.3 | attackspam | DATE:2019-10-04 14:29:19, IP:41.140.165.3, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-10-04 20:52:29 |
| 209.17.96.2 | attack | port scan and connect, tcp 8888 (sun-answerbook) |
2019-10-04 21:01:10 |
| 92.63.194.47 | attackbots | Oct 4 19:29:01 lcl-usvr-02 sshd[921]: Invalid user admin from 92.63.194.47 port 50892 ... |
2019-10-04 20:50:53 |