城市(city): Islamabad
省份(region): Islamabad Capital Territory
国家(country): Pakistan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '175.107.0.0 - 175.107.63.255'
% Abuse contact for '175.107.0.0 - 175.107.63.255' is 'zahir.abbas@ntc.net.pk'
inetnum: 175.107.0.0 - 175.107.63.255
netname: NTCISP-PK
descr: National Telecommunication Corporation
descr: Corporation
descr: NTC Headquarters Sector F-5/1
country: PK
org: ORG-NTC3-AP
admin-c: NTCA1-AP
tech-c: NTCA1-AP
abuse-c: AN769-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-PK-WAHEED
mnt-routes: MAINT-PK-WAHEED
mnt-irt: IRT-NTCISP-PK
last-modified: 2020-06-22T05:24:27Z
source: APNIC
irt: IRT-NTCISP-PK
address: Ntc Regional Hqs F-5/1 Islamabad
e-mail: zahir.abbas@ntc.org.pk
abuse-mailbox: zahir.abbas@ntc.net.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
auth: # Filtered
remarks: zahir.abbas@ntc.org.pk is invalid
mnt-by: MAINT-PK-ZAHIR
last-modified: 2025-10-02T10:50:50Z
source: APNIC
organisation: ORG-NTC3-AP
org-name: National Telecommunication Corporation
org-type: LIR
country: PK
address: Corporation
address: NTC Headquarters Sector F-5/1
phone: +92-51-9208686
fax-no: +92-51-9201489
e-mail: talha.javaid@ntc.net.pk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:53Z
source: APNIC
role: ABUSE NTCISPPK
country: ZZ
address: Ntc Regional Hqs F-5/1 Islamabad
phone: +000000000
e-mail: zahir.abbas@ntc.org.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
nic-hdl: AN769-AP
remarks: Generated from irt object IRT-NTCISP-PK
remarks: zahir.abbas@ntc.org.pk is invalid
abuse-mailbox: zahir.abbas@ntc.net.pk
mnt-by: APNIC-ABUSE
last-modified: 2025-10-02T10:51:19Z
source: APNIC
role: National Telecommunication Corporation administrator
address: Sector F 5/1, Islamabad
country: PK
phone: +92-51-9208809
fax-no: +92-51-9201489
e-mail: ispsupport@ntc.net.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
nic-hdl: NTCA1-AP
mnt-by: MAINT-PK-WAHEED
last-modified: 2015-07-01T04:51:22Z
source: APNIC
% Information related to '175.107.36.0/22AS23888'
route: 175.107.36.0/22
origin: AS23888
descr: National Telecommunication Corporation
Corporation
NTC Headquarters Sector F-5/1
mnt-by: MAINT-PK-WAHEED
last-modified: 2021-08-13T02:33:56Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.107.37.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;175.107.37.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 14:01:37 CST 2025
;; MSG SIZE rcvd: 107
b'Host 112.37.107.175.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 175.107.37.112.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
185.86.164.100 | attack | B: Abusive content scan (301) |
2019-07-31 11:48:52 |
91.134.143.2 | attackspam | $f2bV_matches_ltvn |
2019-07-31 11:41:40 |
159.89.88.127 | attackbotsspam | port 23 attempt blocked |
2019-07-31 11:38:45 |
190.41.173.219 | attackbotsspam | Jul 31 00:35:15 [munged] sshd[20271]: Invalid user felicia from 190.41.173.219 port 34810 Jul 31 00:35:15 [munged] sshd[20271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.41.173.219 |
2019-07-31 11:13:08 |
134.209.1.169 | attackbots | Jul 31 02:57:13 [host] sshd[17173]: Invalid user csmi from 134.209.1.169 Jul 31 02:57:13 [host] sshd[17173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.1.169 Jul 31 02:57:15 [host] sshd[17173]: Failed password for invalid user csmi from 134.209.1.169 port 41612 ssh2 |
2019-07-31 11:28:34 |
198.108.67.82 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-07-31 11:26:45 |
130.43.126.237 | attackspam | port 23 attempt blocked |
2019-07-31 11:45:06 |
189.79.245.129 | attack | Jul 30 22:35:16 debian sshd\[7843\]: Invalid user admin from 189.79.245.129 port 44406 Jul 30 22:35:16 debian sshd\[7843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.79.245.129 Jul 30 22:35:19 debian sshd\[7843\]: Failed password for invalid user admin from 189.79.245.129 port 44406 ssh2 ... |
2019-07-31 11:18:58 |
37.187.54.45 | attack | Jul 31 02:24:35 mail sshd\[6566\]: Failed password for invalid user j0k3r from 37.187.54.45 port 45228 ssh2 Jul 31 02:41:41 mail sshd\[6863\]: Invalid user ud from 37.187.54.45 port 56568 ... |
2019-07-31 11:12:37 |
207.46.13.22 | attackbotsspam | Automatic report - Banned IP Access |
2019-07-31 11:09:52 |
170.83.184.36 | attack | Unauthorized connection attempt from IP address 170.83.184.36 on Port 445(SMB) |
2019-07-31 11:49:19 |
137.74.233.90 | attackspambots | Jul 30 23:35:36 ms-srv sshd[50996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.233.90 Jul 30 23:35:38 ms-srv sshd[50996]: Failed password for invalid user testdev from 137.74.233.90 port 52248 ssh2 |
2019-07-31 11:04:50 |
206.189.132.246 | attackspam | $f2bV_matches |
2019-07-31 11:10:10 |
200.107.154.47 | attackspam | Jul 31 04:06:10 localhost sshd\[63327\]: Invalid user gs from 200.107.154.47 port 20046 Jul 31 04:06:10 localhost sshd\[63327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.47 ... |
2019-07-31 11:14:32 |
66.70.130.146 | attackbotsspam | Unauthorized SSH login attempts |
2019-07-31 11:26:07 |