城市(city): unknown
省份(region): unknown
国家(country): Kenya
运营商(isp): Safaricom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '196.96.0.0 - 196.111.255.255'
% No abuse contact registered for 196.96.0.0 - 196.111.255.255
inetnum: 196.96.0.0 - 196.111.255.255
netname: SAFARICOM-2015
descr: Safaricom Limited
country: KE
org: ORG-SL70-AFRINIC
admin-c: VK24-AFRINIC
admin-c: JM27-AFRINIC
admin-c: CM107-AFRINIC
admin-c: VE6-AFRINIC
admin-c: GK40-AFRINIC
admin-c: TR18-AFRINIC
admin-c: EA99-AFRINIC
admin-c: SNN3-AFRINIC
tech-c: VK24-AFRINIC
tech-c: JM27-AFRINIC
tech-c: BS56-AFRINIC
tech-c: VE6-AFRINIC
tech-c: GK40-AFRINIC
tech-c: TR18-AFRINIC
tech-c: EA99-AFRINIC
status: ALLOCATED PA
mnt-by: AFRINIC-HM-MNT
mnt-lower: MNT-SAF2004
mnt-routes: MNT-SAF2004
source: AFRINIC # Filtered
parent: 196.0.0.0 - 196.255.255.255
organisation: ORG-SL70-AFRINIC
org-name: Safaricom Limited
org-type: LIR
country: KE
address: WAIYAKI WAY
address: PO BOX 66827 - 00800
address: NAIROBI
phone: tel:+254-722-727615
phone: tel:+254-772-004048
phone: tel:+254-722-002222
phone: tel:+254-725-347648
admin-c: GK40-AFRINIC
admin-c: TR18-AFRINIC
admin-c: VE6-AFRINIC
admin-c: EA99-AFRINIC
admin-c: CM107-AFRINIC
admin-c: JM27-AFRINIC
admin-c: VK24-AFRINIC
admin-c: SNN3-AFRINIC
tech-c: GK40-AFRINIC
tech-c: BS56-AFRINIC
tech-c: TR18-AFRINIC
tech-c: VE6-AFRINIC
tech-c: EA99-AFRINIC
tech-c: JM27-AFRINIC
tech-c: VK24-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: MNT-SAF2004
mnt-by: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered
person: Business Support
address: Nairobi Kenya
phone: tel:+254-722-003272
nic-hdl: BS56-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-ODYJJSDU1ISTV8DHNNCHVVTDTWOEWBS4-MNT
person: Castrol Mutinda
nic-hdl: CM107-AFRINIC
address: Nairobi
address: Kenya
address: Nairobi
address: Kenya
phone: tel:+254-711-319283
mnt-by: GENERATED-QV9VXJB6GA2BM7EIYJI2DMO6VX2CB2UG-MNT
source: AFRINIC # Filtered
person: Eric Angwenyi
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-726-949826
nic-hdl: EA99-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-MJPB85WVRW5SBBVKUJ8ANCZD9YY7JPBZ-MNT
person: Geoffry Kipchumba
address: Safaricom House
address: Nairobi
address: Kenya
phone: tel:+254-722-000000
nic-hdl: GK40-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-OJTXMNIFRMGL5NPUINICY6IGMUBMHHIJ-MNT
person: John Muita
address: P.O Box 66827, 00800
address: Nairobi
address: Kenya
address: Nairobi
address: Kenya
phone: tel:+254-722-002829
fax-no: tel:+254-722-003272
nic-hdl: JM27-afrinic
mnt-by: GENERATED-UNS1E7EXFG6F7TJILQ9DMMHDN4Y0VRSV-MNT
source: AFRINIC # Filtered
person: Stephen Njoroge Njuguna
address: Waiyaki Way
address: Nairobi 00800
address: Kenya
phone: tel:+254-727-371910
nic-hdl: SNN3-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-D8DIT7NFHZPSEVHLFDWP1CEUREU385WW-MNT
person: Timothy Rutto
nic-hdl: TR18-AFRINIC
address: PO BOX 66827 - 00800
address: Nairobi 00800
address: Kenya
phone: tel:+254-723-712399
mnt-by: GENERATED-GLFOMABXKHSQLZA8QNEAQSNSMQ8BNQIV-MNT
source: AFRINIC # Filtered
person: Vincent Etemesi
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-722-358432
nic-hdl: VE6-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-M261FOUJCRTAQ2N8CLDQ9JO1ZJ6VIVCB-MNT
person: Victor Kilei
address: Safaricom House
address: Postal Code 62827
address: Nairobi
address: Kenya
phone: tel:+254-725-403192
nic-hdl: VK24-AFRINIC
source: AFRINIC # Filtered
mnt-by: GENERATED-JEAT1NSPVKKYP1NKGIDU6HLGNLM0U2LK-MNT
% Information related to '196.96.0.0/12AS33771'
route: 196.96.0.0/12
descr: Safaricom Limited
origin: AS33771
mnt-by: MNT-SAF2004
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.106.101.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.106.101.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:03:37 CST 2026
;; MSG SIZE rcvd: 107
Host 75.101.106.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 75.101.106.196.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.215.217.180 | attackbotsspam | $f2bV_matches |
2019-12-12 20:05:25 |
| 50.207.12.103 | attackspam | Dec 12 12:28:44 h2177944 sshd\[9601\]: Invalid user host from 50.207.12.103 port 58512 Dec 12 12:28:44 h2177944 sshd\[9601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103 Dec 12 12:28:45 h2177944 sshd\[9601\]: Failed password for invalid user host from 50.207.12.103 port 58512 ssh2 Dec 12 12:34:08 h2177944 sshd\[9845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103 user=root ... |
2019-12-12 20:12:18 |
| 112.216.93.141 | attackspam | 2019-12-12T12:20:02.257903 sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264 2019-12-12T12:20:02.271166 sshd[28346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141 2019-12-12T12:20:02.257903 sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264 2019-12-12T12:20:04.346124 sshd[28346]: Failed password for invalid user alinus from 112.216.93.141 port 59264 ssh2 2019-12-12T12:26:09.238476 sshd[28421]: Invalid user server from 112.216.93.141 port 35386 ... |
2019-12-12 20:04:16 |
| 13.82.228.197 | attack | Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: Invalid user belldandy from 13.82.228.197 Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.228.197 Dec 12 12:16:52 ArkNodeAT sshd\[2700\]: Failed password for invalid user belldandy from 13.82.228.197 port 60143 ssh2 |
2019-12-12 19:58:44 |
| 63.81.87.100 | attackspambots | Dec 12 08:17:44 grey postfix/smtpd\[17821\]: NOQUEUE: reject: RCPT from announce.vidyad.com\[63.81.87.100\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.100\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.100\]\; from=\ |
2019-12-12 20:18:04 |
| 157.42.95.5 | attack | Unauthorized connection attempt detected from IP address 157.42.95.5 to port 445 |
2019-12-12 20:21:54 |
| 180.215.120.2 | attackbotsspam | Dec 12 09:38:02 MK-Soft-Root2 sshd[31904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.120.2 Dec 12 09:38:03 MK-Soft-Root2 sshd[31904]: Failed password for invalid user q01258 from 180.215.120.2 port 59768 ssh2 ... |
2019-12-12 19:50:49 |
| 1.53.88.143 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:14. |
2019-12-12 20:10:14 |
| 118.32.223.14 | attackbotsspam | Too many connections or unauthorized access detected from Arctic banned ip |
2019-12-12 20:03:08 |
| 195.9.138.78 | attackspam | Dec 12 11:55:09 areeb-Workstation sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.138.78 Dec 12 11:55:11 areeb-Workstation sshd[16605]: Failed password for invalid user admin from 195.9.138.78 port 55649 ssh2 ... |
2019-12-12 19:50:33 |
| 222.186.175.220 | attack | Triggered by Fail2Ban at Vostok web server |
2019-12-12 19:52:10 |
| 202.149.220.50 | attackspambots | 12/12/2019-07:25:19.918752 202.149.220.50 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-12-12 20:04:42 |
| 180.241.35.178 | attackbots | Unauthorized connection attempt detected from IP address 180.241.35.178 to port 445 |
2019-12-12 20:12:49 |
| 221.156.116.51 | attackbots | Dec 12 11:39:36 ws26vmsma01 sshd[185448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51 Dec 12 11:39:38 ws26vmsma01 sshd[185448]: Failed password for invalid user massicotte from 221.156.116.51 port 55360 ssh2 ... |
2019-12-12 19:53:51 |
| 178.44.252.11 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:16. |
2019-12-12 20:07:30 |