City: Chicago
Region: Illinois
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.155.0.0 - 164.155.255.255
CIDR: 164.155.0.0/16
NetName: AFRINIC-164-155-0-0
NetHandle: NET-164-155-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2005-02-21
Updated: 2005-02-21
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/164.155.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '164.155.0.0 - 164.155.255.255'
% No abuse contact registered for 164.155.0.0 - 164.155.255.255
inetnum: 164.155.0.0 - 164.155.255.255
netname: SENTRACHEM
descr: Sentrachem Limited
descr: PO BOX 781811
descr: Sandton, 2146
country: ZA
org: ORG-SL72-AFRINIC
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
status: ASSIGNED PI
remarks: ============REMARK===================
remarks: The custodianship of this IP prefix is presently
remarks: deemed to be in dispute. Consequently,
remarks: no change request pertaining to this particular
remarks: prefix will be entertained by AFRINIC until the
remarks: issue is finally resolved between the disputants
remarks: themselves or by a competent authority.
remarks: Further, whilst the current holder of the said prefix
remarks: continues to hold same, AFRINIC shall bear no
remarks: responsibility whatsoever in relation thereto and
remarks: disputants are encouraged to resolve the said
remarks: dispute expeditiously.
remarks: ============REMARK====================
mnt-by: AFRINIC-HM-MNT
mnt-lower: AFRINIC-LH-MNT
source: AFRINIC # Filtered
parent: 0.0.0.0 - 255.255.255.255
organisation: ORG-SL72-AFRINIC
org-name: Sentrachem Limited
org-type: EU-PI
country: ZA
address: PO BOX 781811
address: Sandton, 2146
address: Johannesburg
phone: tel:+230-403-5100
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-LH-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
role: AFRINIC LH HOSTMASTERS
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène, Mauritius
admin-c: JC17-AFRINIC
tech-c: JC17-AFRINIC
tech-c: NMB1-AFRINIC
nic-hdl: ALH1-AFRINIC
mnt-by: AFRINIC-LH-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.74.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.155.74.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 03:07:10 CST 2026
;; MSG SIZE rcvd: 106
b'Host 46.74.155.164.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 164.155.74.46.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.253.218.155 | attackbots | Automatic report - WordPress Brute Force |
2020-02-29 00:57:32 |
| 84.51.59.130 | attackspam | (ftpd) Failed FTP login from 84.51.59.130 (TR/Turkey/host-84-51-59-130.reverse.superonline.net): 10 in the last 3600 secs |
2020-02-29 01:24:08 |
| 185.176.27.246 | attack | 02/28/2020-11:55:53.990030 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-29 01:16:50 |
| 46.101.184.111 | attackspambots | Feb 26 16:01:57 lamijardin sshd[28359]: Did not receive identification string from 46.101.184.111 Feb 26 16:02:12 lamijardin sshd[28360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111 user=r.r Feb 26 16:02:14 lamijardin sshd[28360]: Failed password for r.r from 46.101.184.111 port 45896 ssh2 Feb 26 16:02:14 lamijardin sshd[28360]: Received disconnect from 46.101.184.111 port 45896:11: Normal Shutdown, Thank you for playing [preauth] Feb 26 16:02:14 lamijardin sshd[28360]: Disconnected from 46.101.184.111 port 45896 [preauth] Feb 26 16:02:25 lamijardin sshd[28362]: Invalid user oracle from 46.101.184.111 Feb 26 16:02:25 lamijardin sshd[28362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111 Feb 26 16:02:28 lamijardin sshd[28362]: Failed password for invalid user oracle from 46.101.184.111 port 42176 ssh2 Feb 26 16:02:28 lamijardin sshd[28362]: Received disconn........ ------------------------------- |
2020-02-29 00:53:20 |
| 42.117.137.17 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-29 00:56:21 |
| 78.157.35.52 | attackspambots | Unauthorized connection attempt from IP address 78.157.35.52 on Port 445(SMB) |
2020-02-29 01:10:17 |
| 80.68.0.142 | attackbots | Unauthorized connection attempt from IP address 80.68.0.142 on Port 445(SMB) |
2020-02-29 01:22:42 |
| 209.17.96.106 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 56c00668986c389e | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: ATL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-02-29 01:06:23 |
| 13.229.119.66 | attackbotsspam | Total attacks: 2 |
2020-02-29 01:10:44 |
| 201.26.30.38 | attackspambots | Port probing on unauthorized port 23 |
2020-02-29 01:34:03 |
| 113.21.117.250 | attackspam | Distributed brute force attack |
2020-02-29 01:27:14 |
| 111.26.180.130 | attackspambots | Feb 28 15:25:27 vps sshd\[23536\]: Invalid user ubuntu from 111.26.180.130 Feb 28 15:54:26 vps sshd\[24090\]: Invalid user ubuntu from 111.26.180.130 ... |
2020-02-29 01:32:59 |
| 45.125.65.42 | attack | 2020-02-28 17:49:35 dovecot_login authenticator failed for \(User\) \[45.125.65.42\]: 535 Incorrect authentication data \(set_id=luke\) 2020-02-28 17:50:40 dovecot_login authenticator failed for \(User\) \[45.125.65.42\]: 535 Incorrect authentication data \(set_id=luke\) 2020-02-28 17:50:40 dovecot_login authenticator failed for \(User\) \[45.125.65.42\]: 535 Incorrect authentication data \(set_id=luke\) 2020-02-28 17:54:58 dovecot_login authenticator failed for \(User\) \[45.125.65.42\]: 535 Incorrect authentication data \(set_id=contact@no-server.de\) 2020-02-28 17:56:01 dovecot_login authenticator failed for \(User\) \[45.125.65.42\]: 535 Incorrect authentication data \(set_id=demons\) ... |
2020-02-29 01:05:51 |
| 49.50.236.221 | attackspam | Unauthorized connection attempt from IP address 49.50.236.221 on Port 445(SMB) |
2020-02-29 01:07:27 |
| 120.24.230.187 | attackbotsspam | firewall-block, port(s): 445/tcp |
2020-02-29 01:36:47 |