Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.30.64.0 - 119.30.127.255'

% Abuse contact for '119.30.64.0 - 119.30.127.255' is 'TEC-ABUSEREPORTTEAM@jazz.com.pk'

inetnum:        119.30.64.0 - 119.30.127.255
netname:        LINKDOTNET
descr:          LINKdotNET Telecom Limited
descr:          Network Service Provider
country:        PK
org:            ORG-LTL4-AP
admin-c:        LH1008-AP
tech-c:         LH1008-AP
abuse-c:        AL1494-AP
status:         ALLOCATED PORTABLE
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        This object can only be updated by APNIC hostmasters.
remarks:        To update this object, please contact APNIC
remarks:        hostmasters and include your organisation's account
remarks:        name in the subject line.
remarks:        * For abuse/spam related to this IP address block,
remarks:        * please send email to: abuse@link.net.pk
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
notify:         hostmaster@link.net.pk
mnt-by:         APNIC-HM
mnt-lower:      MAINT-PK-LDN
mnt-routes:     MAINT-PK-LDN
mnt-irt:        IRT-LINKDOTNET-PK
last-modified:  2020-06-29T06:41:58Z
source:         APNIC

irt:            IRT-LINKDOTNET-PK
address:        Block 2-A, FJ Plaza,
address:        Markaz F-7, Islamabad, Pakistan
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
admin-c:        TCET1-AP
tech-c:         TCET1-AP
auth:           # Filtered
remarks:        datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks:        tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
mnt-by:         MAINT-PK-LDN
last-modified:  2026-01-07T13:33:46Z
source:         APNIC

organisation:   ORG-LTL4-AP
org-name:       Linkdotnet Telecom Limited
org-type:       LIR
country:        PK
address:        LINKdotNET/Mobilink
address:        1st Floor, IBC-III, 16-E Kohistan Road
address:        F-8 Markaz
phone:          +92-42-111600222
fax-no:         +92-42-5833277
e-mail:         lakht.hassnain@jazz.com.pk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:49Z
source:         APNIC

role:           ABUSE LINKDOTNETPK
country:        ZZ
address:        Block 2-A, FJ Plaza,
address:        Markaz F-7, Islamabad, Pakistan
phone:          +000000000
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c:        TCET1-AP
tech-c:         TCET1-AP
nic-hdl:        AL1494-AP
remarks:        Generated from irt object IRT-LINKDOTNET-PK
remarks:        datacoreengineering-technolgydevelopment@jazz.com.pk was validated on 2025-12-10
remarks:        tec-abusereportteam@jazz.com.pk was validated on 2026-01-07
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-07T13:34:31Z
source:         APNIC

role:           LINKdotNET Hostmaster
address:        House # 28, Agha Khan Road
address:        F-6/4, Islamabad, Pakistan
country:        PK
phone:          +92-51-111600222
fax-no:         +92-51-2650220
e-mail:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
admin-c:        IS786-AP
tech-c:         IS786-AP
nic-hdl:        LH1008-AP
notify:         DATACOREENGINEERING-TECHNOLGYDEVELOPMENT@jazz.com.pk
mnt-by:         MAINT-PK-LDN
last-modified:  2021-07-05T06:00:39Z
abuse-mailbox:  TEC-ABUSEREPORTTEAM@jazz.com.pk
source:         APNIC

% Information related to '119.30.116.0/24AS45669'

route:          119.30.116.0/24
origin:         AS45669
descr:          Linkdotnet Telecom Limited
                LINKdotNET/Mobilink
                1st Floor, IBC-III, 16-E Kohistan Road
                F-8 Markaz
mnt-by:         MAINT-PK-LDN
last-modified:  2024-02-29T13:14:48Z
source:         APNIC

% Information related to '119.30.116.0/24AS58470'

route:          119.30.116.0/24
origin:         AS58470
descr:          Linkdotnet Telecom Limited
                LINKdotNET/Mobilink
                1st Floor, IBC-III, 16-E Kohistan Road
                F-8 Markaz
mnt-by:         MAINT-PK-LDN
last-modified:  2025-04-04T10:49:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.30.116.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.30.116.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050102 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 07:00:13 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'16.116.30.119.in-addr.arpa domain name pointer static-host119-30-116-16.link.net.pk.
'
Nslookup info:
b'16.116.30.119.in-addr.arpa	name = static-host119-30-116-16.link.net.pk.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
95.128.139.99 attackspam
Automatic report - Port Scan Attack
2020-04-09 12:48:22
51.15.111.139 attack
Apr  9 07:59:26 hosting sshd[20329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139  user=root
Apr  9 07:59:27 hosting sshd[20329]: Failed password for root from 51.15.111.139 port 33372 ssh2
Apr  9 07:59:28 hosting sshd[20332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139  user=admin
Apr  9 07:59:30 hosting sshd[20332]: Failed password for admin from 51.15.111.139 port 36182 ssh2
Apr  9 07:59:31 hosting sshd[20336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.111.139  user=admin
Apr  9 07:59:32 hosting sshd[20336]: Failed password for admin from 51.15.111.139 port 39086 ssh2
...
2020-04-09 13:11:43
41.239.158.253 attackspam
1586404560 - 04/09/2020 10:56:00 Host: host-41.239.158.253.tedata.net/41.239.158.253 Port: 23 TCP Blocked
...
2020-04-09 12:58:54
118.89.108.152 attack
Apr  9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152
Apr  9 05:31:05 h2646465 sshd[1758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Apr  9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152
Apr  9 05:31:07 h2646465 sshd[1758]: Failed password for invalid user zyg from 118.89.108.152 port 35330 ssh2
Apr  9 05:52:11 h2646465 sshd[4429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152  user=root
Apr  9 05:52:12 h2646465 sshd[4429]: Failed password for root from 118.89.108.152 port 36402 ssh2
Apr  9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152
Apr  9 05:56:12 h2646465 sshd[5031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Apr  9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152
Apr  9 05:56:14 h2646465 sshd[5031]: Failed password for invalid user teams
2020-04-09 12:43:25
219.75.134.27 attack
Apr  9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417
Apr  9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 
Apr  9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417
Apr  9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 
Apr  9 06:39:24 tuxlinux sshd[26163]: Invalid user cron from 219.75.134.27 port 36417
Apr  9 06:39:24 tuxlinux sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27 
Apr  9 06:39:26 tuxlinux sshd[26163]: Failed password for invalid user cron from 219.75.134.27 port 36417 ssh2
...
2020-04-09 12:51:34
62.234.91.173 attackbots
Apr  9 05:56:29 ArkNodeAT sshd\[24346\]: Invalid user test from 62.234.91.173
Apr  9 05:56:29 ArkNodeAT sshd\[24346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.173
Apr  9 05:56:31 ArkNodeAT sshd\[24346\]: Failed password for invalid user test from 62.234.91.173 port 45778 ssh2
2020-04-09 12:26:25
31.184.254.64 attack
Apr  9 06:49:42 www sshd\[54571\]: Invalid user linda from 31.184.254.64Apr  9 06:49:44 www sshd\[54571\]: Failed password for invalid user linda from 31.184.254.64 port 47180 ssh2Apr  9 06:56:30 www sshd\[54926\]: Invalid user atlas from 31.184.254.64
...
2020-04-09 12:36:17
187.190.188.140 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-09 12:53:38
210.97.77.161 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-09 12:58:24
157.230.240.34 attackspambots
SSH auth scanning - multiple failed logins
2020-04-09 12:35:27
203.135.20.36 attackspambots
Apr  9 03:52:27 game-panel sshd[12651]: Failed password for root from 203.135.20.36 port 40866 ssh2
Apr  9 03:54:31 game-panel sshd[12744]: Failed password for root from 203.135.20.36 port 54124 ssh2
2020-04-09 12:25:22
112.15.51.70 attackspam
2020-04-09T03:55:49.411792abusebot-5.cloudsearch.cf sshd[6696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70  user=root
2020-04-09T03:55:51.770226abusebot-5.cloudsearch.cf sshd[6696]: Failed password for root from 112.15.51.70 port 45070 ssh2
2020-04-09T03:55:57.170559abusebot-5.cloudsearch.cf sshd[6698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70  user=root
2020-04-09T03:55:58.961771abusebot-5.cloudsearch.cf sshd[6698]: Failed password for root from 112.15.51.70 port 47108 ssh2
2020-04-09T03:56:04.341432abusebot-5.cloudsearch.cf sshd[6700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.51.70  user=root
2020-04-09T03:56:05.761124abusebot-5.cloudsearch.cf sshd[6700]: Failed password for root from 112.15.51.70 port 49649 ssh2
2020-04-09T03:56:10.486735abusebot-5.cloudsearch.cf sshd[6702]: Invalid user admin from 112.15.51.70 po
...
2020-04-09 12:47:49
167.114.226.137 attackbots
Apr  8 17:57:54 web9 sshd\[12265\]: Invalid user postgres from 167.114.226.137
Apr  8 17:57:54 web9 sshd\[12265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137
Apr  8 17:57:56 web9 sshd\[12265\]: Failed password for invalid user postgres from 167.114.226.137 port 50018 ssh2
Apr  8 18:01:18 web9 sshd\[12713\]: Invalid user minecraft from 167.114.226.137
Apr  8 18:01:18 web9 sshd\[12713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137
2020-04-09 12:43:03
129.211.70.33 attackbotsspam
Apr  9 05:56:33 vmd17057 sshd[6999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.70.33 
Apr  9 05:56:35 vmd17057 sshd[6999]: Failed password for invalid user admin from 129.211.70.33 port 41320 ssh2
...
2020-04-09 12:22:35
179.107.7.15 attackbots
Automatic report - Port Scan Attack
2020-04-09 12:54:23

Recently Reported IPs

134.35.157.32 2606:4700:10::6816:3154 216.25.89.134 20.168.7.24
2606:4700:10::6816:4212 122.192.203.6 2606:4700:10::6816:2712 53.87.9.16
34.191.183.29 45.156.129.193 35.92.218.138 29.208.174.101
150.94.161.89 220.177.176.226 239.113.213.121 245.27.131.180
2606:4700:10::6816:2732 251.233.209.7 176.65.139.9 2606:4700:10::6814:6615