City: Harare
Region: Harare (city)
Country: Zimbabwe
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.85.216.0 - 41.85.219.255'
% No abuse contact registered for 41.85.216.0 - 41.85.219.255
inetnum: 41.85.216.0 - 41.85.219.255
netname: Brooke
descr: Regional POP
country: ZW
admin-c: DK44-AFRINIC
admin-c: SM131-AFRINIC
tech-c: CM89-AFRINIC
tech-c: SM131-AFRINIC
status: ASSIGNED PA
mnt-by: TF-196-29-32-0-196-29-39-255-MNT
source: AFRINIC # Filtered
parent: 41.85.192.0 - 41.85.223.255
person: Charles Mashamba
address: 1112 sunningdale3, Harare
address: Harare 263
address: Zimbabwe
phone: tel:+263-77-264-9961
nic-hdl: CM89-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-E4RSKHVYJSC5GC64GGXTUMRC0YTFZXHZ-MNT
person: Daylight Katengwe
address: 52-54 Samora Machel Ave
address: Harare 0000
address: Zimbabwe
phone: tel:+263-77-264-9961
nic-hdl: DK44-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-QTQXOYWEBWMRBFNOLJK1GL35KZAWV1CT-MNT
person: Shingirai Matare
address: 54-56 Pegasus house, Samora Machael, 263 Harare Zimbabwe
phone: tel:+263-242707533
nic-hdl: SM131-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-WYYBSJ14HPNVOATNH9K0EUGCI8WMDYNE-MNT
% Information related to '41.85.217.0/24AS37183'
route: 41.85.217.0/24
origin: AS37183
descr: Utande
mnt-by: TF-196-29-32-0-196-29-39-255-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.85.217.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.85.217.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041200 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:35:59 CST 2026
;; MSG SIZE rcvd: 106
Host 172.217.85.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 172.217.85.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.184.20.20 | attackspambots | 445/tcp [2019-07-03]1pkt |
2019-07-03 19:14:06 |
| 187.16.96.35 | attack | Jul 3 06:48:53 core01 sshd\[13824\]: Invalid user zai from 187.16.96.35 port 42142 Jul 3 06:48:53 core01 sshd\[13824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.35 ... |
2019-07-03 18:40:29 |
| 5.250.136.139 | attack | SIPVicious Scanner Detection |
2019-07-03 18:56:15 |
| 92.169.172.144 | attack | Jul 2 12:33:53 xb3 sshd[29783]: Failed password for r.r from 92.169.172.144 port 49302 ssh2 Jul 2 12:33:53 xb3 sshd[29783]: Connection closed by 92.169.172.144 [preauth] Jul 2 12:33:56 xb3 sshd[29843]: Failed password for r.r from 92.169.172.144 port 49572 ssh2 Jul 2 12:33:56 xb3 sshd[29843]: Connection closed by 92.169.172.144 [preauth] Jul 2 12:33:58 xb3 sshd[29884]: Failed password for r.r from 92.169.172.144 port 49864 ssh2 Jul 2 12:33:58 xb3 sshd[29884]: Connection closed by 92.169.172.144 [preauth] Jul 2 12:34:00 xb3 sshd[29917]: Failed password for r.r from 92.169.172.144 port 50064 ssh2 Jul 2 12:34:00 xb3 sshd[29917]: Connection closed by 92.169.172.144 [preauth] Jul 2 12:34:03 xb3 sshd[29947]: Failed password for r.r from 92.169.172.144 port 50320 ssh2 Jul 2 12:34:03 xb3 sshd[29947]: Connection closed by 92.169.172.144 [preauth] Jul 2 12:34:05 xb3 sshd[30908]: Failed password for r.r from 92.169.172.144 port 50590 ssh2 Jul 2 12:34:05 xb3 sshd[30908]........ ------------------------------- |
2019-07-03 19:20:49 |
| 109.76.41.167 | attackspambots | Trying to deliver email spam, but blocked by RBL |
2019-07-03 18:51:05 |
| 34.217.114.221 | attackspam | User agent spoofing, by Amazon Technologies Inc. |
2019-07-03 19:25:32 |
| 201.139.111.202 | attack | 2019-07-03T10:16:34.996558abusebot-2.cloudsearch.cf sshd\[3990\]: Invalid user charlott from 201.139.111.202 port 39924 |
2019-07-03 18:53:41 |
| 157.44.148.247 | attackbots | SMB Server BruteForce Attack |
2019-07-03 18:36:01 |
| 186.84.172.62 | attackbotsspam | web-1 [ssh] SSH Attack |
2019-07-03 19:16:49 |
| 114.33.190.222 | attackbotsspam | 88/tcp [2019-07-03]1pkt |
2019-07-03 18:41:51 |
| 95.8.239.95 | attackbots | 23/tcp [2019-07-03]1pkt |
2019-07-03 19:16:29 |
| 114.235.129.119 | attackspambots | Jul 2 16:45:05 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:06 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:06 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:07 wildwolf ssh-honeypotd[26164]: Failed password for service from 114.235.129.119 port 31351 ssh2 (target: 158.69.100.152:22, password: service) Jul 2 16:45:08 wildwolf ssh-ho........ ------------------------------ |
2019-07-03 18:33:44 |
| 175.107.63.2 | attack | 8111/tcp [2019-07-03]1pkt |
2019-07-03 18:48:53 |
| 5.196.29.194 | attackbots | SSH Brute Force, server-1 sshd[428]: Failed password for invalid user lebesgue from 5.196.29.194 port 46781 ssh2 |
2019-07-03 18:58:54 |
| 112.249.183.66 | attackspam | Unauthorised access (Jul 3) SRC=112.249.183.66 LEN=44 TTL=49 ID=43184 TCP DPT=8080 WINDOW=35243 SYN |
2019-07-03 19:12:03 |