City: Karachi
Region: Sindh
Country: Pakistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.38.242.0 - 110.38.242.255'
% Abuse contact for '110.38.242.0 - 110.38.242.255' is 'whois@wateen.com'
inetnum: 110.38.242.0 - 110.38.242.255
netname: WATEEN-TEL
descr: National Wimax/IMS environment
country: PK
admin-c: WS1673-AP
tech-c: WS1673-AP
abuse-c: AW997-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-PK-WATEEN
mnt-irt: IRT-WATEENTEL-PK
geoloc: 24.930798602 67.087031334
last-modified: 2025-05-23T10:06:30Z
source: APNIC
irt: IRT-WATEENTEL-PK
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
e-mail: whois@wateen.com
abuse-mailbox: whois@wateen.com
admin-c: WS1673-AP
tech-c: WS1673-AP
auth: # Filtered
remarks: whois@wateen.com was validated on 2025-12-03
mnt-by: MAINT-PK-WATEEN
last-modified: 2025-12-03T05:30:49Z
source: APNIC
role: ABUSE WATEENTELPK
country: ZZ
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
phone: +000000000
e-mail: whois@wateen.com
admin-c: WS1673-AP
tech-c: WS1673-AP
nic-hdl: AW997-AP
remarks: Generated from irt object IRT-WATEENTEL-PK
remarks: whois@wateen.com was validated on 2025-12-03
abuse-mailbox: whois@wateen.com
mnt-by: APNIC-ABUSE
last-modified: 2025-12-03T05:31:00Z
source: APNIC
person: Wateen Support
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
country: PK
phone: +92-111 365 111
e-mail: whois@wateen.com
nic-hdl: WS1673-AP
mnt-by: MAINT-PK-WATEEN
last-modified: 2025-05-13T05:51:27Z
source: APNIC
% Information related to '110.38.242.0/24AS139879'
route: 110.38.242.0/24
origin: AS139879
descr: Wateen Telecom Limited
Main Walton Road
Opp. Bab-e-Pakistan
Walton Cantt
mnt-by: MAINT-PK-WATEEN
last-modified: 2022-11-28T10:32:24Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.38.242.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.38.242.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031000 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 15:31:13 CST 2026
;; MSG SIZE rcvd: 106
96.242.38.110.in-addr.arpa domain name pointer GPONUser38242-96.wateen.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.242.38.110.in-addr.arpa name = GPONUser38242-96.wateen.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.28.119.22 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-03-23 06:12:51 |
| 191.247.120.98 | attack | Honeypot attack, port: 445, PTR: 191-247-120-98.3g.claro.net.br. |
2020-03-23 05:41:04 |
| 13.81.28.233 | attackbots | Mar 22 18:22:59 [HOSTNAME] sshd[1962]: User **removed** from 13.81.28.233 not allowed because not listed in AllowUsers Mar 22 18:23:51 [HOSTNAME] sshd[1971]: User **removed** from 13.81.28.233 not allowed because not listed in AllowUsers Mar 22 18:24:43 [HOSTNAME] sshd[1991]: User **removed** from 13.81.28.233 not allowed because not listed in AllowUsers ... |
2020-03-23 05:54:56 |
| 36.79.248.23 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-23 06:03:53 |
| 190.181.8.135 | attackspambots | ... |
2020-03-23 06:05:48 |
| 185.96.69.75 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-03-23 05:58:28 |
| 110.138.149.68 | attackspam | Honeypot attack, port: 445, PTR: 68.subnet110-138-149.speedy.telkom.net.id. |
2020-03-23 06:02:09 |
| 192.241.238.92 | attackbotsspam | *Port Scan* detected from 192.241.238.92 (US/United States/California/San Francisco/zg-0312b-109.stretchoid.com). 4 hits in the last 170 seconds |
2020-03-23 05:49:20 |
| 164.132.46.197 | attack | $f2bV_matches_ltvn |
2020-03-23 05:42:42 |
| 218.92.0.158 | attackspam | 2020-03-22T22:49:44.021655vps773228.ovh.net sshd[4623]: Failed password for root from 218.92.0.158 port 1573 ssh2 2020-03-22T22:49:47.332499vps773228.ovh.net sshd[4623]: Failed password for root from 218.92.0.158 port 1573 ssh2 2020-03-22T22:49:51.055164vps773228.ovh.net sshd[4623]: Failed password for root from 218.92.0.158 port 1573 ssh2 2020-03-22T22:49:54.323770vps773228.ovh.net sshd[4623]: Failed password for root from 218.92.0.158 port 1573 ssh2 2020-03-22T22:49:57.342480vps773228.ovh.net sshd[4623]: Failed password for root from 218.92.0.158 port 1573 ssh2 ... |
2020-03-23 05:53:14 |
| 203.112.74.146 | attackspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-03-23 05:42:19 |
| 197.60.162.252 | attack | 1584881664 - 03/22/2020 13:54:24 Host: 197.60.162.252/197.60.162.252 Port: 445 TCP Blocked |
2020-03-23 06:07:23 |
| 113.161.24.89 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 22-03-2020 12:55:09. |
2020-03-23 05:47:47 |
| 162.243.132.54 | attackspambots | ssh brute force |
2020-03-23 06:10:42 |
| 88.157.229.59 | attack | k+ssh-bruteforce |
2020-03-23 06:11:19 |