必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kenya

运营商(isp): Safaricom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.96.0.0 - 196.111.255.255'

% No abuse contact registered for 196.96.0.0 - 196.111.255.255

inetnum:        196.96.0.0 - 196.111.255.255
netname:        SAFARICOM-2015
descr:          Safaricom Limited
country:        KE
org:            ORG-SL70-AFRINIC
admin-c:        VK24-AFRINIC
admin-c:        JM27-AFRINIC
admin-c:        CM107-AFRINIC
admin-c:        VE6-AFRINIC
admin-c:        GK40-AFRINIC
admin-c:        TR18-AFRINIC
admin-c:        EA99-AFRINIC
admin-c:        SNN3-AFRINIC
tech-c:         VK24-AFRINIC
tech-c:         JM27-AFRINIC
tech-c:         BS56-AFRINIC
tech-c:         VE6-AFRINIC
tech-c:         GK40-AFRINIC
tech-c:         TR18-AFRINIC
tech-c:         EA99-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      MNT-SAF2004
mnt-routes:     MNT-SAF2004
source:         AFRINIC # Filtered
parent:         196.0.0.0 - 196.255.255.255

organisation:   ORG-SL70-AFRINIC
org-name:       Safaricom Limited
org-type:       LIR
country:        KE
address:        WAIYAKI WAY
address:        PO BOX 66827 - 00800
address:        NAIROBI
phone:          tel:+254-722-727615
phone:          tel:+254-772-004048
phone:          tel:+254-722-002222
phone:          tel:+254-725-347648
admin-c:        GK40-AFRINIC
admin-c:        TR18-AFRINIC
admin-c:        VE6-AFRINIC
admin-c:        EA99-AFRINIC
admin-c:        CM107-AFRINIC
admin-c:        JM27-AFRINIC
admin-c:        VK24-AFRINIC
admin-c:        SNN3-AFRINIC
tech-c:         GK40-AFRINIC
tech-c:         BS56-AFRINIC
tech-c:         TR18-AFRINIC
tech-c:         VE6-AFRINIC
tech-c:         EA99-AFRINIC
tech-c:         JM27-AFRINIC
tech-c:         VK24-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        MNT-SAF2004
mnt-by:         AFRINIC-HM-MNT
remarks:        data has been transferred from RIPE Whois Database 20050221
source:         AFRINIC # Filtered

person:         Business Support
address:        Nairobi Kenya
phone:          tel:+254-722-003272
nic-hdl:        BS56-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-ODYJJSDU1ISTV8DHNNCHVVTDTWOEWBS4-MNT

person:         Castrol Mutinda
nic-hdl:        CM107-AFRINIC
address:        Nairobi
address:        Kenya
address:        Nairobi
address:        Kenya
phone:          tel:+254-711-319283
mnt-by:         GENERATED-QV9VXJB6GA2BM7EIYJI2DMO6VX2CB2UG-MNT
source:         AFRINIC # Filtered

person:         Eric Angwenyi
address:        Safaricom House
address:        Postal Code 62827
address:        Nairobi
address:        Kenya
phone:          tel:+254-726-949826
nic-hdl:        EA99-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-MJPB85WVRW5SBBVKUJ8ANCZD9YY7JPBZ-MNT

person:         Geoffry Kipchumba
address:        Safaricom House
address:        Nairobi
address:        Kenya
phone:          tel:+254-722-000000
nic-hdl:        GK40-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-OJTXMNIFRMGL5NPUINICY6IGMUBMHHIJ-MNT

person:         John Muita
address:        P.O Box 66827, 00800
address:        Nairobi
address:        Kenya
address:        Nairobi
address:        Kenya
phone:          tel:+254-722-002829
fax-no:         tel:+254-722-003272
nic-hdl:        JM27-afrinic
mnt-by:         GENERATED-UNS1E7EXFG6F7TJILQ9DMMHDN4Y0VRSV-MNT
source:         AFRINIC # Filtered

person:         Stephen Njoroge Njuguna
address:        Waiyaki Way
address:        Nairobi 00800
address:        Kenya
phone:          tel:+254-727-371910
nic-hdl:        SNN3-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-D8DIT7NFHZPSEVHLFDWP1CEUREU385WW-MNT

person:         Timothy Rutto
nic-hdl:        TR18-AFRINIC
address:        PO BOX 66827 - 00800
address:        Nairobi  00800
address:        Kenya
phone:          tel:+254-723-712399
mnt-by:         GENERATED-GLFOMABXKHSQLZA8QNEAQSNSMQ8BNQIV-MNT
source:         AFRINIC # Filtered

person:         Vincent Etemesi
address:        Safaricom House
address:        Postal Code 62827
address:        Nairobi
address:        Kenya
phone:          tel:+254-722-358432
nic-hdl:        VE6-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-M261FOUJCRTAQ2N8CLDQ9JO1ZJ6VIVCB-MNT

person:         Victor Kilei
address:        Safaricom House
address:        Postal Code 62827
address:        Nairobi
address:        Kenya
phone:          tel:+254-725-403192
nic-hdl:        VK24-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-JEAT1NSPVKKYP1NKGIDU6HLGNLM0U2LK-MNT

% Information related to '196.96.0.0/12AS33771'

route:          196.96.0.0/12
descr:          Safaricom Limited
origin:         AS33771
mnt-by:         MNT-SAF2004
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.106.101.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.106.101.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:03:37 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 75.101.106.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.101.106.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.215.217.180 attackbotsspam
$f2bV_matches
2019-12-12 20:05:25
50.207.12.103 attackspam
Dec 12 12:28:44 h2177944 sshd\[9601\]: Invalid user host from 50.207.12.103 port 58512
Dec 12 12:28:44 h2177944 sshd\[9601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103
Dec 12 12:28:45 h2177944 sshd\[9601\]: Failed password for invalid user host from 50.207.12.103 port 58512 ssh2
Dec 12 12:34:08 h2177944 sshd\[9845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103  user=root
...
2019-12-12 20:12:18
112.216.93.141 attackspam
2019-12-12T12:20:02.257903  sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264
2019-12-12T12:20:02.271166  sshd[28346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141
2019-12-12T12:20:02.257903  sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264
2019-12-12T12:20:04.346124  sshd[28346]: Failed password for invalid user alinus from 112.216.93.141 port 59264 ssh2
2019-12-12T12:26:09.238476  sshd[28421]: Invalid user server from 112.216.93.141 port 35386
...
2019-12-12 20:04:16
13.82.228.197 attack
Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: Invalid user belldandy from 13.82.228.197
Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.228.197
Dec 12 12:16:52 ArkNodeAT sshd\[2700\]: Failed password for invalid user belldandy from 13.82.228.197 port 60143 ssh2
2019-12-12 19:58:44
63.81.87.100 attackspambots
Dec 12 08:17:44 grey postfix/smtpd\[17821\]: NOQUEUE: reject: RCPT from announce.vidyad.com\[63.81.87.100\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.100\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.100\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-12 20:18:04
157.42.95.5 attack
Unauthorized connection attempt detected from IP address 157.42.95.5 to port 445
2019-12-12 20:21:54
180.215.120.2 attackbotsspam
Dec 12 09:38:02 MK-Soft-Root2 sshd[31904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.120.2 
Dec 12 09:38:03 MK-Soft-Root2 sshd[31904]: Failed password for invalid user q01258 from 180.215.120.2 port 59768 ssh2
...
2019-12-12 19:50:49
1.53.88.143 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:14.
2019-12-12 20:10:14
118.32.223.14 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-12 20:03:08
195.9.138.78 attackspam
Dec 12 11:55:09 areeb-Workstation sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.138.78 
Dec 12 11:55:11 areeb-Workstation sshd[16605]: Failed password for invalid user admin from 195.9.138.78 port 55649 ssh2
...
2019-12-12 19:50:33
222.186.175.220 attack
Triggered by Fail2Ban at Vostok web server
2019-12-12 19:52:10
202.149.220.50 attackspambots
12/12/2019-07:25:19.918752 202.149.220.50 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-12 20:04:42
180.241.35.178 attackbots
Unauthorized connection attempt detected from IP address 180.241.35.178 to port 445
2019-12-12 20:12:49
221.156.116.51 attackbots
Dec 12 11:39:36 ws26vmsma01 sshd[185448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51
Dec 12 11:39:38 ws26vmsma01 sshd[185448]: Failed password for invalid user massicotte from 221.156.116.51 port 55360 ssh2
...
2019-12-12 19:53:51
178.44.252.11 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:16.
2019-12-12 20:07:30

最近上报的IP列表

40.131.164.226 122.192.203.74 121.234.219.155 2606:4700:10::ac43:99e
2606:4700:10::6814:6845 2606:4700:10::6814:8481 2606:4700:10::6816:4835 2606:4700:20::681a:300
2606:4700:10::6816:969 2606:4700:10::6814:4376 2606:4700:10::6816:347d 2606:4700:10::6816:1020
2606:4700:10::6816:4857 170.143.163.103 13.235.72.67 121.133.137.61
107.192.136.33 10.115.168.25 10.216.48.185 85.30.178.162