City: unknown
Region: unknown
Country: Pakistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 160.21.0.0 - 160.30.255.255
CIDR: 160.24.0.0/14, 160.30.0.0/16, 160.22.0.0/15, 160.21.0.0/16, 160.28.0.0/15
NetName: APNIC
NetHandle: NET-160-21-0-0-1
Parent: NET160 (NET-160-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2017-09-05
Updated: 2017-09-05
Ref: https://rdap.arin.net/registry/ip/160.21.0.0
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '160.30.142.0 - 160.30.143.255'
% Abuse contact for '160.30.142.0 - 160.30.143.255' is 'noc@brainnetworks.net.pk'
inetnum: 160.30.142.0 - 160.30.143.255
netname: BRAINNETWORKS-PK
descr: Muhammad Akbar, Shafiq Ahmed t/a Brain Networks
country: PK
org: ORG-BN20-AP
admin-c: BNA28-AP
tech-c: BNA28-AP
abuse-c: AB1717-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-BRAINNETWORKS-PK
mnt-routes: MAINT-BRAINNETWORKS-PK
mnt-irt: IRT-BRAINNETWORKS-PK
last-modified: 2024-08-16T10:07:25Z
source: APNIC
irt: IRT-BRAINNETWORKS-PK
address: Street
e-mail: noc@brainnetworks.net.pk
abuse-mailbox: noc@brainnetworks.net.pk
admin-c: BNA28-AP
tech-c: BNA28-AP
auth: # Filtered
remarks: noc@brainnetworks.net.pk is invalid
mnt-by: MAINT-BRAINNETWORKS-PK
last-modified: 2025-09-04T08:06:59Z
source: APNIC
organisation: ORG-BN20-AP
org-name: Brain Networks
org-type: LIR
country: PK
address: Street # 4 near Malkhanwala Civil Hospital
address: Adda Malkhanwala tehsil Sambrial Siallkot
phone: +92524586199
e-mail: frontdesk@brainnetworks.net.pk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-07-09T13:10:55Z
source: APNIC
role: ABUSE BRAINNETWORKSPK
country: ZZ
address: Street # 4 near Malkhanwala Civil Hospital, Adda Malkhanwala tehsil Sambrial Siallkot, Sialkot Punjab 51070
phone: +000000000
e-mail: noc@brainnetworks.net.pk
admin-c: BNA28-AP
tech-c: BNA28-AP
nic-hdl: AB1717-AP
remarks: Generated from irt object IRT-BRAINNETWORKS-PK
remarks: noc@brainnetworks.net.pk is invalid
abuse-mailbox: noc@brainnetworks.net.pk
mnt-by: APNIC-ABUSE
last-modified: 2025-03-19T13:13:13Z
source: APNIC
role: Brain Networks administrator
address: Street#4 near Malkhanwala Civil Hospital, Adda Malkhanwala tehsil Sambrial Siallkot, Sialkot Punjab 51070
country: PK
phone: +92524586199
e-mail: noc@brainnetworks.net.pk
admin-c: BNA28-AP
tech-c: BNA28-AP
nic-hdl: BNA28-AP
mnt-by: MAINT-BRAINNETWORKS-PK
last-modified: 2024-08-15T11:30:29Z
source: APNIC
% Information related to '160.30.142.0/24AS142647'
route: 160.30.142.0/24
origin: AS142647
descr: Muhammad Akbar, Shafiq Ahmed
Street#4 near Malkhanwala Civil Hospital
Adda Malkhanwala tehsil Sambrial Siallkot
mnt-by: MAINT-BRAINNETWORKS-PK
last-modified: 2024-08-16T11:12:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.30.142.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.30.142.33. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110401 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 05:28:33 CST 2025
;; MSG SIZE rcvd: 106
Host 33.142.30.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 33.142.30.160.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.24.173.104 | attack | Sep 24 07:03:29 hcbbdb sshd\[19960\]: Invalid user www-sftp-shared from 118.24.173.104 Sep 24 07:03:29 hcbbdb sshd\[19960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 Sep 24 07:03:31 hcbbdb sshd\[19960\]: Failed password for invalid user www-sftp-shared from 118.24.173.104 port 41010 ssh2 Sep 24 07:09:58 hcbbdb sshd\[20645\]: Invalid user Boulder from 118.24.173.104 Sep 24 07:09:58 hcbbdb sshd\[20645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 |
2019-09-24 17:46:59 |
| 95.9.139.212 | attackbots | Automatic report - Port Scan Attack |
2019-09-24 17:17:46 |
| 181.189.229.26 | attack | Hits on port : 445 |
2019-09-24 17:22:47 |
| 192.144.142.72 | attackspam | Sep 23 20:42:52 web1 sshd\[532\]: Invalid user tunnel from 192.144.142.72 Sep 23 20:42:52 web1 sshd\[532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72 Sep 23 20:42:53 web1 sshd\[532\]: Failed password for invalid user tunnel from 192.144.142.72 port 54990 ssh2 Sep 23 20:46:52 web1 sshd\[897\]: Invalid user light from 192.144.142.72 Sep 23 20:46:52 web1 sshd\[897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72 |
2019-09-24 17:18:09 |
| 51.38.185.121 | attack | Sep 23 20:59:48 php1 sshd\[15658\]: Invalid user user from 51.38.185.121 Sep 23 20:59:48 php1 sshd\[15658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-51-38-185.eu Sep 23 20:59:50 php1 sshd\[15658\]: Failed password for invalid user user from 51.38.185.121 port 50559 ssh2 Sep 23 21:03:48 php1 sshd\[16940\]: Invalid user felcia from 51.38.185.121 Sep 23 21:03:48 php1 sshd\[16940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-51-38-185.eu |
2019-09-24 17:34:59 |
| 51.38.57.78 | attackbots | $f2bV_matches |
2019-09-24 17:09:22 |
| 115.152.211.180 | attackbots | Chat Spam |
2019-09-24 17:47:21 |
| 177.189.207.177 | attackbotsspam | scan z |
2019-09-24 17:02:02 |
| 103.129.220.214 | attack | Sep 23 19:36:24 friendsofhawaii sshd\[479\]: Invalid user teresinha from 103.129.220.214 Sep 23 19:36:24 friendsofhawaii sshd\[479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.220.214 Sep 23 19:36:26 friendsofhawaii sshd\[479\]: Failed password for invalid user teresinha from 103.129.220.214 port 38944 ssh2 Sep 23 19:41:01 friendsofhawaii sshd\[996\]: Invalid user lab from 103.129.220.214 Sep 23 19:41:01 friendsofhawaii sshd\[996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.220.214 |
2019-09-24 17:26:37 |
| 220.121.58.55 | attackbotsspam | Sep 24 06:23:06 rpi sshd[30544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.121.58.55 Sep 24 06:23:08 rpi sshd[30544]: Failed password for invalid user craig from 220.121.58.55 port 56286 ssh2 |
2019-09-24 17:21:25 |
| 41.34.8.248 | attackspam | Unauthorised access (Sep 24) SRC=41.34.8.248 LEN=40 TTL=53 ID=8907 TCP DPT=8080 WINDOW=23001 SYN |
2019-09-24 17:15:28 |
| 61.175.134.190 | attackbots | Sep 23 21:37:01 hpm sshd\[2256\]: Invalid user bever from 61.175.134.190 Sep 23 21:37:01 hpm sshd\[2256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.134.190 Sep 23 21:37:03 hpm sshd\[2256\]: Failed password for invalid user bever from 61.175.134.190 port 59212 ssh2 Sep 23 21:42:20 hpm sshd\[2817\]: Invalid user test123 from 61.175.134.190 Sep 23 21:42:20 hpm sshd\[2817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.134.190 |
2019-09-24 17:16:00 |
| 218.247.254.162 | attackspam | Automatic report - Port Scan Attack |
2019-09-24 17:08:26 |
| 203.45.45.241 | attack | Sep 24 09:57:00 OPSO sshd\[20936\]: Invalid user 123456 from 203.45.45.241 port 59940 Sep 24 09:57:00 OPSO sshd\[20936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.45.45.241 Sep 24 09:57:02 OPSO sshd\[20936\]: Failed password for invalid user 123456 from 203.45.45.241 port 59940 ssh2 Sep 24 10:02:01 OPSO sshd\[21877\]: Invalid user 123456 from 203.45.45.241 port 58113 Sep 24 10:02:01 OPSO sshd\[21877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.45.45.241 |
2019-09-24 17:27:44 |
| 71.6.232.7 | attackspam | " " |
2019-09-24 17:04:11 |