城市(city): unknown
省份(region): unknown
国家(country): Pakistan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '119.30.64.0 - 119.30.127.255'
% Abuse contact for '119.30.64.0 - 119.30.127.255' is 'TEC-ABUSEREPORTTEAM@jazz.com.pk'
inetnum: 119.30.64.0 - 119.30.127.255
netname: LINKDOTNET
descr: LINKdotNET Telecom Limited
descr: Network Service Provider
country: PK
org: ORG-LTL4-AP
admin-c: LH1008-AP
tech-c: LH1008-AP
abuse-c: AL1494-AP
status: ALLOCATED PORTABLE
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be updated by APNIC hostmasters.
remarks: To update this object, please contact APNIC
remarks: hostmasters and include your organisation's account
remarks: name in the subject line.
remarks: * For abuse/spam related to this IP address block,
remarks: * please send email to: abuse@link.net.pk
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
notify: hostmaster@link.net.pk
mnt-by: APNIC-HM
mnt-lower: MAINT-PK-LDN
mnt-routes: MAINT-PK-LDN
mnt-irt: IRT-LINKDOTNET-PK
last-modified: 2020-06-29T06:41:58Z
source: APNIC
irt: IRT-LINKDOTNET-PK
address: Block 2-A, FJ Plaza,
address: Markaz F-7, Islamabad, Pakistan
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
admin-c: TCET1-AP
tech-c: TCET1-AP
auth: # Filtered
remarks: datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks: tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
mnt-by: MAINT-PK-LDN
last-modified: 2026-01-07T13:33:46Z
source: APNIC
organisation: ORG-LTL4-AP
org-name: Linkdotnet Telecom Limited
org-type: LIR
country: PK
address: LINKdotNET/Mobilink
address: 1st Floor, IBC-III, 16-E Kohistan Road
address: F-8 Markaz
phone: +92-42-111600222
fax-no: +92-42-5833277
e-mail: lakht.hassnain@jazz.com.pk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:49Z
source: APNIC
role: ABUSE LINKDOTNETPK
country: ZZ
address: Block 2-A, FJ Plaza,
address: Markaz F-7, Islamabad, Pakistan
phone: +000000000
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c: TCET1-AP
tech-c: TCET1-AP
nic-hdl: AL1494-AP
remarks: Generated from irt object IRT-LINKDOTNET-PK
remarks: datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks: tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
mnt-by: APNIC-ABUSE
last-modified: 2026-01-07T13:34:31Z
source: APNIC
role: LINKdotNET Hostmaster
address: House # 28, Agha Khan Road
address: F-6/4, Islamabad, Pakistan
country: PK
phone: +92-51-111600222
fax-no: +92-51-2650220
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c: IS786-AP
tech-c: IS786-AP
nic-hdl: LH1008-AP
notify: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
mnt-by: MAINT-PK-LDN
last-modified: 2021-07-05T06:00:39Z
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
source: APNIC
% Information related to '119.30.118.0/24AS45669'
route: 119.30.118.0/24
origin: AS45669
descr: Linkdotnet Telecom Limited
LINKdotNET/Mobilink
1st Floor, IBC-III, 16-E Kohistan Road
F-8 Markaz
mnt-by: MAINT-PK-LDN
last-modified: 2024-02-29T13:15:04Z
source: APNIC
% Information related to '119.30.118.0/24AS58470'
route: 119.30.118.0/24
origin: AS58470
descr: Linkdotnet Telecom Limited
LINKdotNET/Mobilink
1st Floor, IBC-III, 16-E Kohistan Road
F-8 Markaz
mnt-by: MAINT-PK-LDN
last-modified: 2025-04-04T10:49:51Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.30.118.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.30.118.181. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041700 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 12:01:00 CST 2026
;; MSG SIZE rcvd: 107
181.118.30.119.in-addr.arpa domain name pointer static-host119-30-118-181.link.net.pk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
181.118.30.119.in-addr.arpa name = static-host119-30-118-181.link.net.pk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.38.80.173 | attackspambots | 2020-03-26T04:54:23.690196librenms sshd[7597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu 2020-03-26T04:54:23.687176librenms sshd[7597]: Invalid user by from 51.38.80.173 port 35402 2020-03-26T04:54:25.917581librenms sshd[7597]: Failed password for invalid user by from 51.38.80.173 port 35402 ssh2 ... |
2020-03-26 13:13:49 |
| 41.170.14.90 | attack | Mar 26 03:56:39 *** sshd[29904]: Invalid user jasper from 41.170.14.90 |
2020-03-26 12:52:09 |
| 111.229.104.94 | attackbotsspam | Mar 26 06:02:10 [host] sshd[22891]: Invalid user p Mar 26 06:02:10 [host] sshd[22891]: pam_unix(sshd: Mar 26 06:02:13 [host] sshd[22891]: Failed passwor |
2020-03-26 13:42:53 |
| 181.210.91.170 | attackspam | port scan and connect, tcp 80 (http) |
2020-03-26 13:48:49 |
| 216.83.52.120 | attackbots | Mar 26 04:54:23 serwer sshd\[16162\]: Invalid user laboratory from 216.83.52.120 port 27332 Mar 26 04:54:23 serwer sshd\[16162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.52.120 Mar 26 04:54:26 serwer sshd\[16162\]: Failed password for invalid user laboratory from 216.83.52.120 port 27332 ssh2 ... |
2020-03-26 13:12:18 |
| 103.129.13.107 | attackspambots | fail2ban |
2020-03-26 13:07:02 |
| 150.136.236.53 | attackspam | k+ssh-bruteforce |
2020-03-26 13:17:44 |
| 141.98.10.141 | attackspam | Mar 26 05:15:00 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 26 05:31:49 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 26 05:33:51 srv01 postfix/smtpd\[31736\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 26 05:34:38 srv01 postfix/smtpd\[22432\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 26 05:34:56 srv01 postfix/smtpd\[31735\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-26 12:49:59 |
| 167.99.170.160 | attack | F2B blocked SSH BF |
2020-03-26 13:09:08 |
| 104.236.142.200 | attackspam | 2020-03-26T04:20:23.353743dmca.cloudsearch.cf sshd[29061]: Invalid user es from 104.236.142.200 port 56726 2020-03-26T04:20:23.359030dmca.cloudsearch.cf sshd[29061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200 2020-03-26T04:20:23.353743dmca.cloudsearch.cf sshd[29061]: Invalid user es from 104.236.142.200 port 56726 2020-03-26T04:20:25.057620dmca.cloudsearch.cf sshd[29061]: Failed password for invalid user es from 104.236.142.200 port 56726 ssh2 2020-03-26T04:26:55.586543dmca.cloudsearch.cf sshd[29579]: Invalid user fr from 104.236.142.200 port 45880 2020-03-26T04:26:55.592491dmca.cloudsearch.cf sshd[29579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200 2020-03-26T04:26:55.586543dmca.cloudsearch.cf sshd[29579]: Invalid user fr from 104.236.142.200 port 45880 2020-03-26T04:26:58.108645dmca.cloudsearch.cf sshd[29579]: Failed password for invalid user fr from 104.236.142.20 ... |
2020-03-26 13:24:07 |
| 115.238.44.237 | attackbots | port scan and connect, tcp 22 (ssh) |
2020-03-26 13:48:10 |
| 51.254.122.71 | attack | Mar 26 09:37:32 gw1 sshd[8609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.122.71 Mar 26 09:37:34 gw1 sshd[8609]: Failed password for invalid user 1234567890 from 51.254.122.71 port 51204 ssh2 ... |
2020-03-26 12:58:04 |
| 120.132.6.27 | attackspambots | (sshd) Failed SSH login from 120.132.6.27 (CN/China/-): 5 in the last 3600 secs |
2020-03-26 13:28:27 |
| 79.106.4.202 | attack | CMS (WordPress or Joomla) login attempt. |
2020-03-26 13:01:00 |
| 91.121.159.180 | attackbots | Mar 26 03:54:22 work-partkepr sshd\[29785\]: Invalid user robot from 91.121.159.180 port 46802 Mar 26 03:54:22 work-partkepr sshd\[29785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.159.180 ... |
2020-03-26 13:21:27 |