City: unknown
Region: unknown
Country: Egypt
Internet Service Provider: Etisalat
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 156.172.0.0 - 156.172.255.255
CIDR: 156.172.0.0/16
NetName: AFRINIC-ERX-156-172-0-0
NetHandle: NET-156-172-0-0-1
Parent: NET156 (NET-156-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2010-11-03
Updated: 2010-11-17
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/156.172.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '156.172.128.0 - 156.172.255.255'
% No abuse contact registered for 156.172.128.0 - 156.172.255.255
inetnum: 156.172.128.0 - 156.172.255.255
netname: EM-4
descr: Network used for Mobile Web Users
country: EG
admin-c: LM52-AFRINIC
tech-c: LM52-AFRINIC
status: ASSIGNED PA
remarks: For any abuse, please direct your queries to IP.Abuse@etisalat.com
mnt-by: etisalat-mnt
source: AFRINIC # Filtered
parent: 156.160.0.0 - 156.191.255.255
person: Lasheen Muhammad
nic-hdl: LM52-AFRINIC
address: DownTown Mall S4 Building
address: Cairo
address: Egypt
address: Cairo
address: Egypt
phone: tel:+20-2-35381000
mnt-by: GENERATED-GVVIZ7IFYOJTOO87DXVP60TILOJK59IG-MNT
source: AFRINIC # Filtered
% Information related to '156.172.187.0/24as36992'
route: 156.172.187.0/24
descr: Etisalat Misr Mobile BB
origin: as36992
mnt-by: etisalat-mnt
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.172.187.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;156.172.187.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041501 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 02:37:46 CST 2026
;; MSG SIZE rcvd: 108
138.187.172.156.in-addr.arpa domain name pointer host-156.172.187.138.etisalat.com.eg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.187.172.156.in-addr.arpa name = host-156.172.187.138.etisalat.com.eg.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.117.21.250 | attackspam | Automatic report - Port Scan Attack |
2020-09-04 13:21:19 |
| 190.75.243.153 | attack | Port Scan ... |
2020-09-04 13:14:28 |
| 113.250.254.107 | attackbots | $f2bV_matches |
2020-09-04 12:59:01 |
| 185.216.140.240 | attackspam |
|
2020-09-04 12:54:53 |
| 218.92.0.208 | attack | Sep 4 07:02:59 eventyay sshd[22555]: Failed password for root from 218.92.0.208 port 60819 ssh2 Sep 4 07:03:03 eventyay sshd[22555]: Failed password for root from 218.92.0.208 port 60819 ssh2 Sep 4 07:03:05 eventyay sshd[22555]: Failed password for root from 218.92.0.208 port 60819 ssh2 ... |
2020-09-04 13:24:44 |
| 95.10.184.228 | attack | Web-based SQL injection attempt |
2020-09-04 13:00:23 |
| 51.210.44.194 | attack | Sep 3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194 Sep 3 21:32:59 h2646465 sshd[20786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194 Sep 3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194 Sep 3 21:33:01 h2646465 sshd[20786]: Failed password for invalid user test from 51.210.44.194 port 57892 ssh2 Sep 3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194 Sep 3 21:49:12 h2646465 sshd[22852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194 Sep 3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194 Sep 3 21:49:13 h2646465 sshd[22852]: Failed password for invalid user zhs from 51.210.44.194 port 59090 ssh2 Sep 3 21:53:57 h2646465 sshd[23463]: Invalid user praveen from 51.210.44.194 ... |
2020-09-04 12:59:25 |
| 112.85.42.185 | attack | 2020-09-04T07:42:43.172376lavrinenko.info sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185 user=root 2020-09-04T07:42:45.026963lavrinenko.info sshd[1856]: Failed password for root from 112.85.42.185 port 23161 ssh2 2020-09-04T07:42:43.172376lavrinenko.info sshd[1856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185 user=root 2020-09-04T07:42:45.026963lavrinenko.info sshd[1856]: Failed password for root from 112.85.42.185 port 23161 ssh2 2020-09-04T07:42:47.260289lavrinenko.info sshd[1856]: Failed password for root from 112.85.42.185 port 23161 ssh2 ... |
2020-09-04 12:49:15 |
| 134.175.129.58 | attack | Invalid user courses from 134.175.129.58 port 28565 |
2020-09-04 13:27:58 |
| 222.186.173.142 | attack | Sep 4 06:43:25 minden010 sshd[30003]: Failed password for root from 222.186.173.142 port 45746 ssh2 Sep 4 06:43:29 minden010 sshd[30003]: Failed password for root from 222.186.173.142 port 45746 ssh2 Sep 4 06:43:32 minden010 sshd[30003]: Failed password for root from 222.186.173.142 port 45746 ssh2 Sep 4 06:43:38 minden010 sshd[30003]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 45746 ssh2 [preauth] ... |
2020-09-04 12:52:07 |
| 222.186.175.169 | attackbotsspam | Sep 3 21:50:04 dignus sshd[1407]: Failed password for root from 222.186.175.169 port 15462 ssh2 Sep 3 21:50:07 dignus sshd[1407]: Failed password for root from 222.186.175.169 port 15462 ssh2 Sep 3 21:50:10 dignus sshd[1407]: Failed password for root from 222.186.175.169 port 15462 ssh2 Sep 3 21:50:14 dignus sshd[1407]: Failed password for root from 222.186.175.169 port 15462 ssh2 Sep 3 21:50:18 dignus sshd[1407]: Failed password for root from 222.186.175.169 port 15462 ssh2 ... |
2020-09-04 12:53:47 |
| 192.241.227.144 | attackspam | Icarus honeypot on github |
2020-09-04 13:23:49 |
| 87.190.16.229 | attack | Time: Fri Sep 4 04:24:59 2020 +0000 IP: 87.190.16.229 (DE/Germany/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 4 04:16:29 ca-1-ams1 sshd[12516]: Invalid user user from 87.190.16.229 port 44734 Sep 4 04:16:31 ca-1-ams1 sshd[12516]: Failed password for invalid user user from 87.190.16.229 port 44734 ssh2 Sep 4 04:21:46 ca-1-ams1 sshd[12735]: Invalid user tangyong from 87.190.16.229 port 42024 Sep 4 04:21:48 ca-1-ams1 sshd[12735]: Failed password for invalid user tangyong from 87.190.16.229 port 42024 ssh2 Sep 4 04:24:56 ca-1-ams1 sshd[12921]: Invalid user norma from 87.190.16.229 port 47254 |
2020-09-04 12:54:27 |
| 46.101.154.142 | attack | SSH-BruteForce |
2020-09-04 13:21:55 |
| 118.24.2.141 | attackbotsspam | Sep 4 01:13:10 ws26vmsma01 sshd[76298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.2.141 Sep 4 01:13:11 ws26vmsma01 sshd[76298]: Failed password for invalid user ubuntu from 118.24.2.141 port 44794 ssh2 ... |
2020-09-04 13:05:31 |