City: unknown
Region: unknown
Country: Pakistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '119.30.64.0 - 119.30.127.255'
% Abuse contact for '119.30.64.0 - 119.30.127.255' is 'TEC-ABUSEREPORTTEAM@jazz.com.pk'
inetnum: 119.30.64.0 - 119.30.127.255
netname: LINKDOTNET
descr: LINKdotNET Telecom Limited
descr: Network Service Provider
country: PK
org: ORG-LTL4-AP
admin-c: LH1008-AP
tech-c: LH1008-AP
abuse-c: AL1494-AP
status: ALLOCATED PORTABLE
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be updated by APNIC hostmasters.
remarks: To update this object, please contact APNIC
remarks: hostmasters and include your organisation's account
remarks: name in the subject line.
remarks: * For abuse/spam related to this IP address block,
remarks: * please send email to: abuse@link.net.pk
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
notify: hostmaster@link.net.pk
mnt-by: APNIC-HM
mnt-lower: MAINT-PK-LDN
mnt-routes: MAINT-PK-LDN
mnt-irt: IRT-LINKDOTNET-PK
last-modified: 2020-06-29T06:41:58Z
source: APNIC
irt: IRT-LINKDOTNET-PK
address: Block 2-A, FJ Plaza,
address: Markaz F-7, Islamabad, Pakistan
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
admin-c: TCET1-AP
tech-c: TCET1-AP
auth: # Filtered
remarks: datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks: tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
mnt-by: MAINT-PK-LDN
last-modified: 2026-01-07T13:33:46Z
source: APNIC
organisation: ORG-LTL4-AP
org-name: Linkdotnet Telecom Limited
org-type: LIR
country: PK
address: LINKdotNET/Mobilink
address: 1st Floor, IBC-III, 16-E Kohistan Road
address: F-8 Markaz
phone: +92-42-111600222
fax-no: +92-42-5833277
e-mail: lakht.hassnain@jazz.com.pk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:49Z
source: APNIC
role: ABUSE LINKDOTNETPK
country: ZZ
address: Block 2-A, FJ Plaza,
address: Markaz F-7, Islamabad, Pakistan
phone: +000000000
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c: TCET1-AP
tech-c: TCET1-AP
nic-hdl: AL1494-AP
remarks: Generated from irt object IRT-LINKDOTNET-PK
remarks: datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks: tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
mnt-by: APNIC-ABUSE
last-modified: 2026-01-07T13:34:31Z
source: APNIC
role: LINKdotNET Hostmaster
address: House # 28, Agha Khan Road
address: F-6/4, Islamabad, Pakistan
country: PK
phone: +92-51-111600222
fax-no: +92-51-2650220
e-mail: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c: IS786-AP
tech-c: IS786-AP
nic-hdl: LH1008-AP
notify: DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
mnt-by: MAINT-PK-LDN
last-modified: 2021-07-05T06:00:39Z
abuse-mailbox: TEC-ABUSEREPORTTEAM@jazz.com.pk
source: APNIC
% Information related to '119.30.116.0/24AS45669'
route: 119.30.116.0/24
origin: AS45669
descr: Linkdotnet Telecom Limited
LINKdotNET/Mobilink
1st Floor, IBC-III, 16-E Kohistan Road
F-8 Markaz
mnt-by: MAINT-PK-LDN
last-modified: 2024-02-29T13:14:48Z
source: APNIC
% Information related to '119.30.116.0/24AS58470'
route: 119.30.116.0/24
origin: AS58470
descr: Linkdotnet Telecom Limited
LINKdotNET/Mobilink
1st Floor, IBC-III, 16-E Kohistan Road
F-8 Markaz
mnt-by: MAINT-PK-LDN
last-modified: 2025-04-04T10:49:43Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.30.116.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.30.116.16. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050102 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 07:00:13 CST 2026
;; MSG SIZE rcvd: 106
b'16.116.30.119.in-addr.arpa domain name pointer static-host119-30-116-16.link.net.pk.
'
b'16.116.30.119.in-addr.arpa name = static-host119-30-116-16.link.net.pk.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 95.128.139.99 | attackspam | Automatic report - Port Scan Attack |
2020-04-09 12:48:22 |
| 51.15.111.139 | attack | Apr 9 07:59:26 hosting sshd[20329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139 user=root Apr 9 07:59:27 hosting sshd[20329]: Failed password for root from 51.15.111.139 port 33372 ssh2 Apr 9 07:59:28 hosting sshd[20332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139 user=admin Apr 9 07:59:30 hosting sshd[20332]: Failed password for admin from 51.15.111.139 port 36182 ssh2 Apr 9 07:59:31 hosting sshd[20336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139 user=admin Apr 9 07:59:32 hosting sshd[20336]: Failed password for admin from 51.15.111.139 port 39086 ssh2 ... |
2020-04-09 13:11:43 |
| 41.239.158.253 | attackspam | 1586404560 - 04/09/2020 10:56:00 Host: host-41.239.158.253.tedata.net/41.239.158.253 Port: 23 TCP Blocked ... |
2020-04-09 12:58:54 |
| 118.89.108.152 | attack | Apr 9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152 Apr 9 05:31:05 h2646465 sshd[1758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152 Apr 9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152 Apr 9 05:31:07 h2646465 sshd[1758]: Failed password for invalid user zyg from 118.89.108.152 port 35330 ssh2 Apr 9 05:52:11 h2646465 sshd[4429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152 user=root Apr 9 05:52:12 h2646465 sshd[4429]: Failed password for root from 118.89.108.152 port 36402 ssh2 Apr 9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152 Apr 9 05:56:12 h2646465 sshd[5031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152 Apr 9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152 Apr 9 05:56:14 h2646465 sshd[5031]: Failed password for invalid user teams |
2020-04-09 12:43:25 |
| 219.75.134.27 | attack | Apr 9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417 Apr 9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 Apr 9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417 Apr 9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 Apr 9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417 Apr 9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 Apr 9 06:39:26 tuxlinux sshd[26163]: Failed password for invalid user cron from 219.75.134.27 port 36417 ssh2 ... |
2020-04-09 12:51:34 |
| 62.234.91.173 | attackbots | Apr 9 05:56:29 ArkNodeAT sshd\[24346\]: Invalid user test from 62.234.91.173 Apr 9 05:56:29 ArkNodeAT sshd\[24346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.173 Apr 9 05:56:31 ArkNodeAT sshd\[24346\]: Failed password for invalid user test from 62.234.91.173 port 45778 ssh2 |
2020-04-09 12:26:25 |
| 31.184.254.64 | attack | Apr 9 06:49:42 www sshd\[54571\]: Invalid user linda from 31.184.254.64Apr 9 06:49:44 www sshd\[54571\]: Failed password for invalid user linda from 31.184.254.64 port 47180 ssh2Apr 9 06:56:30 www sshd\[54926\]: Invalid user atlas from 31.184.254.64 ... |
2020-04-09 12:36:17 |
| 187.190.188.140 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-09 12:53:38 |
| 210.97.77.161 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-09 12:58:24 |
| 157.230.240.34 | attackspambots | SSH auth scanning - multiple failed logins |
2020-04-09 12:35:27 |
| 203.135.20.36 | attackspambots | Apr 9 03:52:27 game-panel sshd[12651]: Failed password for root from 203.135.20.36 port 40866 ssh2 Apr 9 03:54:31 game-panel sshd[12744]: Failed password for root from 203.135.20.36 port 54124 ssh2 |
2020-04-09 12:25:22 |
| 112.15.51.70 | attackspam | 2020-04-09T03:55:49.411792abusebot-5.cloudsearch.cf sshd[6696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70 user=root 2020-04-09T03:55:51.770226abusebot-5.cloudsearch.cf sshd[6696]: Failed password for root from 112.15.51.70 port 45070 ssh2 2020-04-09T03:55:57.170559abusebot-5.cloudsearch.cf sshd[6698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70 user=root 2020-04-09T03:55:58.961771abusebot-5.cloudsearch.cf sshd[6698]: Failed password for root from 112.15.51.70 port 47108 ssh2 2020-04-09T03:56:04.341432abusebot-5.cloudsearch.cf sshd[6700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70 user=root 2020-04-09T03:56:05.761124abusebot-5.cloudsearch.cf sshd[6700]: Failed password for root from 112.15.51.70 port 49649 ssh2 2020-04-09T03:56:10.486735abusebot-5.cloudsearch.cf sshd[6702]: Invalid user admin from 112.15.51.70 po ... |
2020-04-09 12:47:49 |
| 167.114.226.137 | attackbots | Apr 8 17:57:54 web9 sshd\[12265\]: Invalid user postgres from 167.114.226.137 Apr 8 17:57:54 web9 sshd\[12265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 Apr 8 17:57:56 web9 sshd\[12265\]: Failed password for invalid user postgres from 167.114.226.137 port 50018 ssh2 Apr 8 18:01:18 web9 sshd\[12713\]: Invalid user minecraft from 167.114.226.137 Apr 8 18:01:18 web9 sshd\[12713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 |
2020-04-09 12:43:03 |
| 129.211.70.33 | attackbotsspam | Apr 9 05:56:33 vmd17057 sshd[6999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.70.33 Apr 9 05:56:35 vmd17057 sshd[6999]: Failed password for invalid user admin from 129.211.70.33 port 41320 ssh2 ... |
2020-04-09 12:22:35 |
| 179.107.7.15 | attackbots | Automatic report - Port Scan Attack |
2020-04-09 12:54:23 |