城市(city): Lahore
省份(region): Punjab
国家(country): Pakistan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 137.59.64.0 - 137.59.255.255
CIDR: 137.59.128.0/17, 137.59.64.0/18
NetName: APNIC-ERX-137-59-0-0
NetHandle: NET-137-59-64-0-1
Parent: NET137 (NET-137-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2015-09-04
Updated: 2021-10-06
Comment: This IP address range is not registered in the ARIN database.
Comment: This range was transferred to the APNIC Whois Database as
Comment: part of the ERX (Early Registration Transfer) project.
Comment: For details, refer to the APNIC Whois Database via
Comment: WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:
Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment: for the Asia Pacific region. APNIC does not operate networks
Comment: using this IP address range and is not able to investigate
Comment: spam or abuse reports relating to these addresses. For more
Comment: help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/137.59.64.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '137.59.230.0 - 137.59.231.255'
% Abuse contact for '137.59.230.0 - 137.59.231.255' is 'noc-abuse@cyber.net.pk'
inetnum: 137.59.230.0 - 137.59.231.255
netname: CYBERNET-PK
descr: Cyber Internet Services Pakistan
country: PK
admin-c: AQ84-AP
tech-c: AQ84-AP
abuse-c: AC1727-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-PK-CYBERNET
mnt-irt: IRT-CYBERNET-PK
last-modified: 2024-12-05T05:50:44Z
source: APNIC
irt: IRT-CYBERNET-PK
address: A904, 9th Floor,Lakson Bldg 3,Sarwar Shaheed Rd,Karachi-74200
e-mail: noc-abuse@cyber.net.pk
abuse-mailbox: noc-abuse@cyber.net.pk
admin-c: AQ84-AP
tech-c: AQ84-AP
auth: # Filtered
remarks: noc-abuse@cyber.net.pk was validated on 2026-01-14
mnt-by: MAINT-PK-AQ
last-modified: 2026-01-14T06:53:33Z
source: APNIC
role: ABUSE CYBERNETPK
country: ZZ
address: A904, 9th Floor,Lakson Bldg 3,Sarwar Shaheed Rd,Karachi-74200
phone: +000000000
e-mail: noc-abuse@cyber.net.pk
admin-c: AQ84-AP
tech-c: AQ84-AP
nic-hdl: AC1727-AP
remarks: Generated from irt object IRT-CYBERNET-PK
remarks: noc-abuse@cyber.net.pk was validated on 2026-01-14
abuse-mailbox: noc-abuse@cyber.net.pk
mnt-by: APNIC-ABUSE
last-modified: 2026-01-14T06:54:03Z
source: APNIC
person: Amjad Qasmi
address: A904, 9th Floor,Lakson Bldg 3,Sarwar Shaheed Rd,Karachi-74200
country: PK
phone: +92-021-38400654
e-mail: zhqasmi@cyber.net.pk
nic-hdl: AQ84-AP
abuse-mailbox: noc-abuse@cyber.net.pk
mnt-by: MAINT-PK-AQ
last-modified: 2021-08-31T07:15:27Z
source: APNIC
% Information related to '137.59.230.0/24AS9541'
route: 137.59.230.0/24
origin: AS9541
descr: Cyber Internet Services Pakistan
A - 904 9th Floor Lakson Square Building No. 3
No. 3, Sarwar Shaheed Road Karachi-74200 Pakistan
mnt-by: MAINT-PK-CYBERNET
last-modified: 2018-04-30T07:21:59Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.59.230.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.59.230.171. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050601 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 04:00:28 CST 2026
;; MSG SIZE rcvd: 107
Host 171.230.59.137.in-addr.arpa not found: 2(SERVFAIL)
server can't find 137.59.230.171.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.66.208.250 | attack | Automatic report - Port Scan Attack |
2020-03-01 21:46:07 |
| 185.254.141.80 | attack | Automatic report - XMLRPC Attack |
2020-03-01 21:21:59 |
| 171.67.70.80 | attackbots | port scan and connect, tcp 80 (http) |
2020-03-01 21:31:52 |
| 222.186.180.17 | attackbotsspam | detected by Fail2Ban |
2020-03-01 21:53:15 |
| 60.12.84.190 | attack | B: Magento admin pass test (abusive) |
2020-03-01 21:24:05 |
| 68.183.204.24 | attackbotsspam | Mar 1 14:17:47 MK-Soft-VM4 sshd[14106]: Failed password for lp from 68.183.204.24 port 48264 ssh2 ... |
2020-03-01 21:51:29 |
| 222.186.175.140 | attack | Mar 1 16:03:06 ift sshd\[29408\]: Failed password for root from 222.186.175.140 port 44754 ssh2Mar 1 16:03:31 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar 1 16:03:35 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar 1 16:03:38 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2Mar 1 16:03:42 ift sshd\[29431\]: Failed password for root from 222.186.175.140 port 60780 ssh2 ... |
2020-03-01 22:04:44 |
| 90.3.112.119 | attackbots | Mar 1 14:20:15 silence02 sshd[7313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.3.112.119 Mar 1 14:20:17 silence02 sshd[7313]: Failed password for invalid user ns2c from 90.3.112.119 port 37492 ssh2 Mar 1 14:26:31 silence02 sshd[7666]: Failed password for root from 90.3.112.119 port 33522 ssh2 |
2020-03-01 21:32:33 |
| 27.116.255.153 | attackbots | (imapd) Failed IMAP login from 27.116.255.153 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 1 12:28:16 ir1 dovecot[4133960]: imap-login: Disconnected (auth failed, 1 attempts in 7 secs): user= |
2020-03-01 21:24:28 |
| 118.140.118.250 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-01 21:51:07 |
| 112.6.231.114 | attackbotsspam | Mar 1 08:20:33 NPSTNNYC01T sshd[5656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.6.231.114 Mar 1 08:20:36 NPSTNNYC01T sshd[5656]: Failed password for invalid user admin from 112.6.231.114 port 57471 ssh2 Mar 1 08:26:24 NPSTNNYC01T sshd[5930]: Failed password for root from 112.6.231.114 port 14862 ssh2 ... |
2020-03-01 21:38:22 |
| 116.234.202.98 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-01 21:38:00 |
| 49.88.112.116 | attackbotsspam | Mar 1 14:27:51 localhost sshd\[1940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116 user=root Mar 1 14:27:53 localhost sshd\[1940\]: Failed password for root from 49.88.112.116 port 48035 ssh2 Mar 1 14:27:56 localhost sshd\[1940\]: Failed password for root from 49.88.112.116 port 48035 ssh2 |
2020-03-01 21:34:39 |
| 109.196.129.84 | attack | B: Magento admin pass test (wrong country) |
2020-03-01 21:23:21 |
| 104.131.224.81 | attack | 2020-03-01T13:49:13.763279shield sshd\[18301\]: Invalid user michelle from 104.131.224.81 port 44456 2020-03-01T13:49:13.767508shield sshd\[18301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.224.81 2020-03-01T13:49:15.209474shield sshd\[18301\]: Failed password for invalid user michelle from 104.131.224.81 port 44456 ssh2 2020-03-01T13:53:35.403323shield sshd\[19288\]: Invalid user neeraj from 104.131.224.81 port 49261 2020-03-01T13:53:35.411028shield sshd\[19288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.224.81 |
2020-03-01 21:54:18 |