City: Damanhur
Region: Al Buhayrah
Country: Egypt
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 156.217.0.0 - 156.217.255.255
CIDR: 156.217.0.0/16
NetName: AFRINIC-ERX-156-217-0-0
NetHandle: NET-156-217-0-0-1
Parent: NET156 (NET-156-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2010-11-03
Updated: 2010-11-17
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/156.217.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '156.216.0.0 - 156.217.255.255'
% No abuse contact registered for 156.216.0.0 - 156.217.255.255
inetnum: 156.216.0.0 - 156.217.255.255
netname: All-38
descr: TE Data
country: EG
admin-c: TDCR1-AFRINIC
tech-c: TDCR2-AFRINIC
status: ASSIGNED PA
remarks: ====================================================
remarks: For Internet Abuse & Spam reports : admins@tedata.net
remarks: ====================================================
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
parent: 156.192.0.0 - 156.223.255.255
role: TE Data Contact Role
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR2-AFRINIC
nic-hdl: TDCR1-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
role: TE Data Contact Role-2
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR1-AFRINIC
nic-hdl: TDCR2-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
% Information related to '156.217.64.0/19AS8452'
route: 156.217.64.0/19
descr: Telecom-Egypt-Data
origin: AS8452
mnt-by: GEGA-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.217.85.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;156.217.85.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 20:19:03 CST 2026
;; MSG SIZE rcvd: 107
Host 214.85.217.156.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.85.217.156.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.242.102.66 | attack | 2019-10-13T16:27:31.317364abusebot-2.cloudsearch.cf sshd\[27839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hst-102-66.irenala.edu.mg user=root |
2019-10-14 00:40:44 |
| 45.70.32.250 | attack | Unauthorised access (Oct 13) SRC=45.70.32.250 LEN=44 TTL=241 ID=21198 DF TCP DPT=23 WINDOW=14600 SYN Unauthorised access (Oct 10) SRC=45.70.32.250 LEN=44 TTL=241 ID=50078 DF TCP DPT=23 WINDOW=14600 SYN |
2019-10-14 01:17:15 |
| 168.232.198.18 | attackbots | Oct 13 17:55:42 jane sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.18 Oct 13 17:55:44 jane sshd[15259]: Failed password for invalid user Thierry-123 from 168.232.198.18 port 33293 ssh2 ... |
2019-10-14 00:43:56 |
| 219.250.188.46 | attack | Oct 13 12:49:29 web8 sshd\[9964\]: Invalid user Docteur@123 from 219.250.188.46 Oct 13 12:49:29 web8 sshd\[9964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.46 Oct 13 12:49:30 web8 sshd\[9964\]: Failed password for invalid user Docteur@123 from 219.250.188.46 port 57821 ssh2 Oct 13 12:54:28 web8 sshd\[12314\]: Invalid user 123Euro from 219.250.188.46 Oct 13 12:54:28 web8 sshd\[12314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.46 |
2019-10-14 01:10:03 |
| 37.17.65.154 | attackspambots | Oct 13 18:12:55 legacy sshd[23328]: Failed password for root from 37.17.65.154 port 38208 ssh2 Oct 13 18:17:01 legacy sshd[23449]: Failed password for root from 37.17.65.154 port 49810 ssh2 ... |
2019-10-14 00:25:51 |
| 45.82.153.39 | attack | 10/13/2019-17:26:08.697597 45.82.153.39 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44 |
2019-10-14 00:26:52 |
| 66.249.79.1 | attack | Automatic report - Web App Attack |
2019-10-14 00:56:16 |
| 202.71.13.79 | attackbots | Automatic report - Port Scan Attack |
2019-10-14 01:10:16 |
| 222.186.180.147 | attackspambots | Oct 13 17:43:50 MK-Soft-Root2 sshd[16600]: Failed password for root from 222.186.180.147 port 36758 ssh2 Oct 13 17:43:55 MK-Soft-Root2 sshd[16600]: Failed password for root from 222.186.180.147 port 36758 ssh2 ... |
2019-10-14 00:30:41 |
| 80.211.169.93 | attackbotsspam | Oct 13 19:02:41 vps01 sshd[2807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.93 Oct 13 19:02:43 vps01 sshd[2807]: Failed password for invalid user Parola! from 80.211.169.93 port 46582 ssh2 |
2019-10-14 01:13:51 |
| 119.57.103.38 | attackspam | Oct 13 17:52:20 SilenceServices sshd[9513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.103.38 Oct 13 17:52:21 SilenceServices sshd[9513]: Failed password for invalid user P4sswort123!@# from 119.57.103.38 port 53965 ssh2 Oct 13 17:57:19 SilenceServices sshd[10823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.103.38 |
2019-10-14 00:33:36 |
| 45.80.65.76 | attack | Oct 13 19:11:35 vps691689 sshd[4489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.76 Oct 13 19:11:37 vps691689 sshd[4489]: Failed password for invalid user Exotic123 from 45.80.65.76 port 33782 ssh2 ... |
2019-10-14 01:19:12 |
| 46.105.57.169 | attack | abusive spammer |
2019-10-14 01:18:44 |
| 175.193.206.200 | attack | Invalid user pi from 175.193.206.200 port 42940 |
2019-10-14 00:53:55 |
| 128.199.154.60 | attack | 2019-10-13T14:23:06.204474abusebot-2.cloudsearch.cf sshd\[27408\]: Invalid user Relationen_123 from 128.199.154.60 port 49536 |
2019-10-14 00:30:16 |