City: Karachi
Region: Sindh
Country: Pakistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.38.247.0 - 110.38.247.255'
% Abuse contact for '110.38.247.0 - 110.38.247.255' is 'whois@wateen.com'
inetnum: 110.38.247.0 - 110.38.247.255
netname: WATEEN-TEL
descr: National Wimax/IMS environment
country: PK
admin-c: WS1673-AP
tech-c: WS1673-AP
abuse-c: AW997-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-PK-WATEEN
mnt-irt: IRT-WATEENTEL-PK
geoloc: 24.930798602 67.087031334
last-modified: 2025-05-23T10:08:19Z
source: APNIC
irt: IRT-WATEENTEL-PK
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
e-mail: whois@wateen.com
abuse-mailbox: whois@wateen.com
admin-c: WS1673-AP
tech-c: WS1673-AP
auth: # Filtered
remarks: whois@wateen.com was validated on 2025-12-03
mnt-by: MAINT-PK-WATEEN
last-modified: 2025-12-03T05:30:49Z
source: APNIC
role: ABUSE WATEENTELPK
country: ZZ
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
phone: +000000000
e-mail: whois@wateen.com
admin-c: WS1673-AP
tech-c: WS1673-AP
nic-hdl: AW997-AP
remarks: Generated from irt object IRT-WATEENTEL-PK
remarks: whois@wateen.com was validated on 2025-12-03
abuse-mailbox: whois@wateen.com
mnt-by: APNIC-ABUSE
last-modified: 2025-12-03T05:31:00Z
source: APNIC
person: Wateen Support
address: Wateen Telecom Limited Main Walton Road, Opp. Bab-e-Pakistan, Walton Cantt., Lahore
country: PK
phone: +92-111 365 111
e-mail: whois@wateen.com
nic-hdl: WS1673-AP
mnt-by: MAINT-PK-WATEEN
last-modified: 2025-05-13T05:51:27Z
source: APNIC
% Information related to '110.38.247.0/24AS139879'
route: 110.38.247.0/24
origin: AS139879
descr: Wateen Telecom Limited
Main Walton Road
Opp. Bab-e-Pakistan
Walton Cantt
mnt-by: MAINT-PK-WATEEN
last-modified: 2022-11-28T10:33:14Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.38.247.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.38.247.217. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 18:31:49 CST 2026
;; MSG SIZE rcvd: 107
217.247.38.110.in-addr.arpa domain name pointer GPONUser38247-217.wateen.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
217.247.38.110.in-addr.arpa name = GPONUser38247-217.wateen.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 50.112.234.175 | attackspambots | Invalid user ncs from 50.112.234.175 port 45314 |
2019-08-23 19:24:19 |
| 151.80.61.103 | attack | Invalid user ts3 from 151.80.61.103 port 45120 |
2019-08-23 19:41:08 |
| 58.56.9.3 | attackbotsspam | Invalid user christine from 58.56.9.3 port 59898 |
2019-08-23 19:23:25 |
| 71.59.212.18 | attackspambots | Invalid user zimbra from 71.59.212.18 port 47136 |
2019-08-23 19:22:32 |
| 178.128.216.115 | attack | Invalid user garry from 178.128.216.115 port 44612 |
2019-08-23 19:37:52 |
| 46.166.173.154 | attack | Invalid user admin from 46.166.173.154 port 38122 |
2019-08-23 19:24:40 |
| 124.156.202.243 | attackbotsspam | Aug 23 12:22:31 nextcloud sshd\[21940\]: Invalid user intro1 from 124.156.202.243 Aug 23 12:22:31 nextcloud sshd\[21940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.202.243 Aug 23 12:22:33 nextcloud sshd\[21940\]: Failed password for invalid user intro1 from 124.156.202.243 port 60054 ssh2 ... |
2019-08-23 19:14:50 |
| 136.144.203.36 | attackspam | Invalid user teste from 136.144.203.36 port 41886 |
2019-08-23 19:42:54 |
| 145.239.133.27 | attackbots | $f2bV_matches |
2019-08-23 19:09:22 |
| 51.83.77.224 | attackbotsspam | Invalid user butter from 51.83.77.224 port 59284 |
2019-08-23 18:57:21 |
| 211.143.246.38 | attack | Aug 23 11:32:25 MK-Soft-Root1 sshd\[758\]: Invalid user testing from 211.143.246.38 port 39336 Aug 23 11:32:25 MK-Soft-Root1 sshd\[758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 Aug 23 11:32:27 MK-Soft-Root1 sshd\[758\]: Failed password for invalid user testing from 211.143.246.38 port 39336 ssh2 ... |
2019-08-23 19:01:16 |
| 51.255.83.44 | attack | Invalid user programacion from 51.255.83.44 port 34632 |
2019-08-23 18:56:46 |
| 113.173.36.66 | attackspam | Invalid user admin from 113.173.36.66 port 45565 |
2019-08-23 19:17:25 |
| 145.239.82.192 | attackspambots | Invalid user batchService from 145.239.82.192 port 36108 |
2019-08-23 19:09:50 |
| 202.169.46.82 | attackspam | Aug 23 10:14:49 work-partkepr sshd\[2279\]: Invalid user headmaster from 202.169.46.82 port 49181 Aug 23 10:14:49 work-partkepr sshd\[2279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.82 ... |
2019-08-23 19:34:24 |