城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): Etisalat
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 156.172.0.0 - 156.172.255.255
CIDR: 156.172.0.0/16
NetName: AFRINIC-ERX-156-172-0-0
NetHandle: NET-156-172-0-0-1
Parent: NET156 (NET-156-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2010-11-03
Updated: 2010-11-17
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/156.172.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '156.172.128.0 - 156.172.255.255'
% No abuse contact registered for 156.172.128.0 - 156.172.255.255
inetnum: 156.172.128.0 - 156.172.255.255
netname: EM-4
descr: Network used for Mobile Web Users
country: EG
admin-c: LM52-AFRINIC
tech-c: LM52-AFRINIC
status: ASSIGNED PA
remarks: For any abuse, please direct your queries to IP.Abuse@etisalat.com
mnt-by: etisalat-mnt
source: AFRINIC # Filtered
parent: 156.160.0.0 - 156.191.255.255
person: Lasheen Muhammad
nic-hdl: LM52-AFRINIC
address: DownTown Mall S4 Building
address: Cairo
address: Egypt
address: Cairo
address: Egypt
phone: tel:+20-2-35381000
mnt-by: GENERATED-GVVIZ7IFYOJTOO87DXVP60TILOJK59IG-MNT
source: AFRINIC # Filtered
% Information related to '156.172.187.0/24as36992'
route: 156.172.187.0/24
descr: Etisalat Misr Mobile BB
origin: as36992
mnt-by: etisalat-mnt
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.172.187.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;156.172.187.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041501 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 02:37:46 CST 2026
;; MSG SIZE rcvd: 108
138.187.172.156.in-addr.arpa domain name pointer host-156.172.187.138.etisalat.com.eg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.187.172.156.in-addr.arpa name = host-156.172.187.138.etisalat.com.eg.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.166.14.149 | attack | 07/25/2020-23:54:21.224421 14.166.14.149 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-07-26 16:44:04 |
| 162.243.25.25 | attackspam | Invalid user ysp from 162.243.25.25 port 51234 |
2020-07-26 16:53:46 |
| 46.250.53.83 | attack | 1595735662 - 07/26/2020 05:54:22 Host: 46.250.53.83/46.250.53.83 Port: 445 TCP Blocked |
2020-07-26 16:39:20 |
| 181.48.28.13 | attackbotsspam | Invalid user ircd from 181.48.28.13 port 34068 |
2020-07-26 16:59:09 |
| 13.211.218.195 | attackbots | $f2bV_matches |
2020-07-26 17:16:29 |
| 81.190.117.14 | attackbotsspam | 4 attacks from this IP |
2020-07-26 16:52:28 |
| 45.140.165.205 | attackbotsspam | port scan and connect, tcp 8443 (https-alt) |
2020-07-26 16:41:15 |
| 94.143.197.57 | attack | Unauthorised access (Jul 26) SRC=94.143.197.57 LEN=52 TTL=117 ID=4893 DF TCP DPT=445 WINDOW=8192 SYN |
2020-07-26 17:05:31 |
| 122.225.230.10 | attackbotsspam | Jul 26 09:10:39 ajax sshd[1793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.230.10 Jul 26 09:10:41 ajax sshd[1793]: Failed password for invalid user kr from 122.225.230.10 port 46650 ssh2 |
2020-07-26 16:40:42 |
| 104.236.179.140 | attackbotsspam | Jul 26 08:29:14 ajax sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.179.140 Jul 26 08:29:16 ajax sshd[19038]: Failed password for invalid user derek from 104.236.179.140 port 39076 ssh2 |
2020-07-26 16:54:07 |
| 185.234.219.12 | attack | Jul 26 09:56:12 h2608077 postfix/smtpd[14899]: warning: unknown[185.234.219.12]: SASL LOGIN authentication failed: authentication failure Jul 26 10:15:04 h2608077 postfix/smtpd[15024]: warning: unknown[185.234.219.12]: SASL LOGIN authentication failed: authentication failure Jul 26 10:20:01 h2608077 postfix/smtpd[15036]: warning: unknown[185.234.219.12]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-26 17:19:06 |
| 135.0.24.9 | attackbotsspam | SSH break in attempt ... |
2020-07-26 16:47:37 |
| 189.91.7.203 | attackspam | (smtpauth) Failed SMTP AUTH login from 189.91.7.203 (BR/Brazil/189-91-7-203.dvl-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-26 08:23:58 plain authenticator failed for ([189.91.7.203]) [189.91.7.203]: 535 Incorrect authentication data (set_id=info) |
2020-07-26 16:58:14 |
| 186.215.195.249 | attack | Dovecot Invalid User Login Attempt. |
2020-07-26 17:14:25 |
| 222.173.12.35 | attackspam | Brute-force attempt banned |
2020-07-26 16:48:04 |