City: Cape Town
Region: Western Cape
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.164.0.0 - 41.165.255.255'
% No abuse contact registered for 41.164.0.0 - 41.165.255.255
inetnum: 41.164.0.0 - 41.165.255.255
netname: Neotel_WCape
descr: Neotel_WCape _Assignment
country: ZA
org: ORG-LTOL1-AFRINIC
admin-c: AS116-AFRINIC
admin-c: CM53-AFRINIC
admin-c: RD10-AFRINIC
admin-c: DH19-AFRINIC
tech-c: AS116-AFRINIC
tech-c: DV5-AFRINIC
tech-c: CM53-AFRINIC
tech-c: AA110-AFRINIC
tech-c: KR12-AFRINIC
tech-c: DH19-AFRINIC
status: ASSIGNED PA
mnt-by: LIQUID-TOL-MNT
mnt-lower: LIQUID-TOL-MNT
mnt-domains: LIQUID-TOL-MNT
source: AFRINIC # Filtered
parent: 41.160.0.0 - 41.175.255.255
organisation: ORG-LTOL1-AFRINIC
org-name: Liquid Telecommunications Operations Limited
org-type: LIR
country: MU
address: 10th Floor,
address: Raffles Tower,
address: 19 Cybercity
address: Ebene
phone: tel:+254-733-222204
phone: tel:+230-466-7620
phone: tel:+263-8677-033306
phone: tel:+254-731-033754
admin-c: RD10-AFRINIC
admin-c: CM53-AFRINIC
admin-c: MC69-AFRINIC
admin-c: AS116-AFRINIC
tech-c: PS44-AFRINIC
tech-c: CM53-AFRINIC
tech-c: DV5-AFRINIC
tech-c: MC69-AFRINIC
tech-c: AS116-AFRINIC
tech-c: MK122-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: LIQUID-TOL-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
person: Andrew Alston
address: Block A, Sameer Business Park,
address: Mombasa Road,
address: Nairobi
address: Kenya
phone: tel:+254-20-5000000
nic-hdl: AA110-AFRINIC
mnt-by: AA110-MNTR
source: AFRINIC # Filtered
person: Anthony Somerset
nic-hdl: AS116-AFRINIC
address: 401 Old Pretoria Main Road
address: Midrand 1685
address: South Africa
phone: tel:+27-11-774-1220
phone: tel:+44-20-7101-6280
mnt-by: GENERATED-DB3XY0TSHJSHK8INFM8CE2CBOLXRIPLB-MNT
source: AFRINIC # Filtered
person: Christopher Mwangi
nic-hdl: CM53-AFRINIC
address: Block A,
address: Sameer Office Business Park, address: Mombasa Road,
address: Nairobi
address: Kenya
address: Nairobi 00200
address: Kenya
phone: tel:+254-20-5000000
phone: tel:+254-731-033754
mnt-by: GENERATED-GLVPMCUSF8ULWB1RP1HOUAFIHRDTZM7C-MNT
source: AFRINIC # Filtered
person: Daniam Henriques
address: 401 Old Pretoria Rd, Midrand, 1685, Johannesburg
phone: tel:+27-11-585-0000
nic-hdl: DH19-AFRINIC
mnt-by: GENERATED-443VOOYYHDDCWRGJKQUOZ7GSUONIRP0O-MNT
source: AFRINIC # Filtered
person: Damian Vermeulen
address: 408 Old Pretoria Main Road
address: Midrand
address: Postal Code 1685
address: South Africa
phone: tel:+27-10-120-0471
nic-hdl: DV5-AFRINIC
mnt-by: GENERATED-PYQ649OOF2EJAA6CRQKT8VTPFEDCSU9I-MNT
source: AFRINIC # Filtered
person: Keith Rose
address: Liquid Telecom Zimbabwe
address: Sam Levy Office Park
address: Borrowdale
address: Postal Code 263
address: Harare
address: Zimbabwe
phone: tel:+263-8677-033501
nic-hdl: KR12-AFRINIC
mnt-by: GENERATED-S3BT6PUQHKPPIUYTXK5FFIAHEISW9HVT-MNT
source: AFRINIC # Filtered
person: Rob Davelaar
address: Ebene
address: MU
phone: tel:+230-466-7620
nic-hdl: RD10-AFRINIC
mnt-by: GENERATED-CCFCCEXBPZYR7IUANY1SUKTIVIPPULTV-MNT
source: AFRINIC # Filtered
% Information related to '41.164.98.0/24AS36937'
route: 41.164.98.0/24
descr: AS36937 Route Object
origin: AS36937
source: AFRINIC # Filtered
mnt-by: LIQUID-TOL-MNT
mnt-lower: LIQUID-TOL-MNT
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.164.98.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.164.98.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 18:58:10 CST 2026
;; MSG SIZE rcvd: 105
Host 50.98.164.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.98.164.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.126.92 | attackspambots | $f2bV_matches |
2020-05-24 12:45:59 |
| 181.28.254.49 | attackbotsspam | Invalid user pkw from 181.28.254.49 port 47508 |
2020-05-24 12:17:37 |
| 88.130.71.122 | attack | May 24 00:59:14 ws24vmsma01 sshd[10704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.130.71.122 May 24 00:59:16 ws24vmsma01 sshd[10704]: Failed password for invalid user bfp from 88.130.71.122 port 51478 ssh2 ... |
2020-05-24 12:22:46 |
| 36.111.182.51 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2020-05-24 12:47:42 |
| 222.186.175.169 | attackspam | May 24 04:32:51 ip-172-31-61-156 sshd[10485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root May 24 04:32:53 ip-172-31-61-156 sshd[10485]: Failed password for root from 222.186.175.169 port 13146 ssh2 ... |
2020-05-24 12:51:21 |
| 188.11.67.165 | attack | SSH invalid-user multiple login attempts |
2020-05-24 12:49:18 |
| 141.98.81.108 | attackbotsspam | $f2bV_matches |
2020-05-24 12:33:44 |
| 221.181.24.246 | attackbots | Probing for vulnerable services |
2020-05-24 12:52:43 |
| 171.34.197.241 | attackspam | May 24 05:53:51 h2779839 sshd[1153]: Invalid user wmg from 171.34.197.241 port 44572 May 24 05:53:51 h2779839 sshd[1153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.197.241 May 24 05:53:51 h2779839 sshd[1153]: Invalid user wmg from 171.34.197.241 port 44572 May 24 05:53:53 h2779839 sshd[1153]: Failed password for invalid user wmg from 171.34.197.241 port 44572 ssh2 May 24 05:54:57 h2779839 sshd[1325]: Invalid user gfw from 171.34.197.241 port 52457 May 24 05:54:57 h2779839 sshd[1325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.197.241 May 24 05:54:57 h2779839 sshd[1325]: Invalid user gfw from 171.34.197.241 port 52457 May 24 05:54:59 h2779839 sshd[1325]: Failed password for invalid user gfw from 171.34.197.241 port 52457 ssh2 May 24 05:56:02 h2779839 sshd[1345]: Invalid user xmj from 171.34.197.241 port 60349 ... |
2020-05-24 12:19:29 |
| 49.232.152.36 | attackbots | Invalid user ran from 49.232.152.36 port 42418 |
2020-05-24 12:26:38 |
| 61.91.33.22 | attackspam | Dovecot Invalid User Login Attempt. |
2020-05-24 12:38:37 |
| 149.202.133.43 | attackbots | prod8 ... |
2020-05-24 12:54:01 |
| 175.193.13.3 | attackspam | May 24 04:41:25 onepixel sshd[1196446]: Invalid user kgw from 175.193.13.3 port 55778 May 24 04:41:25 onepixel sshd[1196446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.193.13.3 May 24 04:41:25 onepixel sshd[1196446]: Invalid user kgw from 175.193.13.3 port 55778 May 24 04:41:27 onepixel sshd[1196446]: Failed password for invalid user kgw from 175.193.13.3 port 55778 ssh2 May 24 04:43:40 onepixel sshd[1196709]: Invalid user djh from 175.193.13.3 port 34528 |
2020-05-24 12:51:39 |
| 37.255.244.49 | attack | Port Scan detected! ... |
2020-05-24 12:23:52 |
| 212.92.122.216 | attackbots | hacking |
2020-05-24 12:44:58 |