City: Chicago
Region: Illinois
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.155.0.0 - 164.155.255.255
CIDR: 164.155.0.0/16
NetName: AFRINIC-164-155-0-0
NetHandle: NET-164-155-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2005-02-21
Updated: 2005-02-21
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/164.155.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '164.155.0.0 - 164.155.255.255'
% No abuse contact registered for 164.155.0.0 - 164.155.255.255
inetnum: 164.155.0.0 - 164.155.255.255
netname: SENTRACHEM
descr: Sentrachem Limited
descr: PO BOX 781811
descr: Sandton, 2146
country: ZA
org: ORG-SL72-AFRINIC
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
status: ASSIGNED PI
remarks: ============REMARK===================
remarks: The custodianship of this IP prefix is presently
remarks: deemed to be in dispute. Consequently,
remarks: no change request pertaining to this particular
remarks: prefix will be entertained by AFRINIC until the
remarks: issue is finally resolved between the disputants
remarks: themselves or by a competent authority.
remarks: Further, whilst the current holder of the said prefix
remarks: continues to hold same, AFRINIC shall bear no
remarks: responsibility whatsoever in relation thereto and
remarks: disputants are encouraged to resolve the said
remarks: dispute expeditiously.
remarks: ============REMARK====================
mnt-by: AFRINIC-HM-MNT
mnt-lower: AFRINIC-LH-MNT
source: AFRINIC # Filtered
parent: 0.0.0.0 - 255.255.255.255
organisation: ORG-SL72-AFRINIC
org-name: Sentrachem Limited
org-type: EU-PI
country: ZA
address: PO BOX 781811
address: Sandton, 2146
address: Johannesburg
phone: tel:+230-403-5100
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-LH-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
role: AFRINIC LH HOSTMASTERS
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène, Mauritius
admin-c: JC17-AFRINIC
tech-c: JC17-AFRINIC
tech-c: NMB1-AFRINIC
nic-hdl: ALH1-AFRINIC
mnt-by: AFRINIC-LH-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.74.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.155.74.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 17:16:21 CST 2026
;; MSG SIZE rcvd: 106
b'Host 48.74.155.164.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 164.155.74.48.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.39.74.69 | attackbots | Aug 16 21:07:26 spiceship sshd\[30524\]: Invalid user admin from 61.39.74.69 Aug 16 21:07:26 spiceship sshd\[30524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.39.74.69 ... |
2019-08-17 09:35:39 |
| 23.129.64.180 | attackspam | Invalid user mother from 23.129.64.180 port 23331 |
2019-08-17 09:12:57 |
| 109.194.54.126 | attackspambots | Aug 16 20:51:31 Tower sshd[41330]: Connection from 109.194.54.126 port 56126 on 192.168.10.220 port 22 Aug 16 20:51:32 Tower sshd[41330]: Invalid user gs from 109.194.54.126 port 56126 Aug 16 20:51:32 Tower sshd[41330]: error: Could not get shadow information for NOUSER Aug 16 20:51:32 Tower sshd[41330]: Failed password for invalid user gs from 109.194.54.126 port 56126 ssh2 Aug 16 20:51:33 Tower sshd[41330]: Received disconnect from 109.194.54.126 port 56126:11: Bye Bye [preauth] Aug 16 20:51:33 Tower sshd[41330]: Disconnected from invalid user gs 109.194.54.126 port 56126 [preauth] |
2019-08-17 09:41:03 |
| 223.196.83.98 | attack | Aug 16 15:15:30 php1 sshd\[19154\]: Invalid user qhsupport from 223.196.83.98 Aug 16 15:15:30 php1 sshd\[19154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.196.83.98 Aug 16 15:15:32 php1 sshd\[19154\]: Failed password for invalid user qhsupport from 223.196.83.98 port 48596 ssh2 Aug 16 15:21:44 php1 sshd\[19835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.196.83.98 user=root Aug 16 15:21:45 php1 sshd\[19835\]: Failed password for root from 223.196.83.98 port 45852 ssh2 |
2019-08-17 09:26:21 |
| 210.217.24.246 | attackbotsspam | Aug 17 00:30:09 XXX sshd[28793]: Invalid user ofsaa from 210.217.24.246 port 34176 |
2019-08-17 09:30:28 |
| 183.6.155.108 | attack | 2019-08-17T03:01:32.060252enmeeting.mahidol.ac.th sshd\[25887\]: Invalid user jethro from 183.6.155.108 port 3948 2019-08-17T03:01:32.074521enmeeting.mahidol.ac.th sshd\[25887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.155.108 2019-08-17T03:01:33.995112enmeeting.mahidol.ac.th sshd\[25887\]: Failed password for invalid user jethro from 183.6.155.108 port 3948 ssh2 ... |
2019-08-17 09:31:26 |
| 14.161.7.97 | attack | Aug 16 22:01:55 bouncer sshd\[4832\]: Invalid user admin from 14.161.7.97 port 12450 Aug 16 22:01:55 bouncer sshd\[4832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.7.97 Aug 16 22:01:58 bouncer sshd\[4832\]: Failed password for invalid user admin from 14.161.7.97 port 12450 ssh2 ... |
2019-08-17 09:02:52 |
| 37.187.248.10 | attackbots | SSH-BruteForce |
2019-08-17 09:05:55 |
| 189.47.168.151 | attackbots | Unauthorized connection attempt from IP address 189.47.168.151 on Port 445(SMB) |
2019-08-17 09:04:54 |
| 95.80.74.110 | attack | Unauthorized connection attempt from IP address 95.80.74.110 on Port 445(SMB) |
2019-08-17 09:42:56 |
| 76.104.243.253 | attackspambots | Aug 17 00:42:04 XXX sshd[28945]: Invalid user ofsaa from 76.104.243.253 port 56782 |
2019-08-17 09:05:24 |
| 175.211.112.246 | attack | ssh failed login |
2019-08-17 09:20:48 |
| 104.248.57.21 | attackbots | 2019-08-16T18:43:00.778659mizuno.rwx.ovh sshd[21946]: Connection from 104.248.57.21 port 35672 on 78.46.61.178 port 22 2019-08-16T18:43:01.363947mizuno.rwx.ovh sshd[21946]: Invalid user support from 104.248.57.21 port 35672 2019-08-16T18:43:01.372491mizuno.rwx.ovh sshd[21946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21 2019-08-16T18:43:00.778659mizuno.rwx.ovh sshd[21946]: Connection from 104.248.57.21 port 35672 on 78.46.61.178 port 22 2019-08-16T18:43:01.363947mizuno.rwx.ovh sshd[21946]: Invalid user support from 104.248.57.21 port 35672 2019-08-16T18:43:03.542315mizuno.rwx.ovh sshd[21946]: Failed password for invalid user support from 104.248.57.21 port 35672 ssh2 ... |
2019-08-17 09:19:15 |
| 165.22.248.215 | attackspambots | Aug 16 14:55:02 web9 sshd\[30385\]: Invalid user mongod from 165.22.248.215 Aug 16 14:55:02 web9 sshd\[30385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.248.215 Aug 16 14:55:04 web9 sshd\[30385\]: Failed password for invalid user mongod from 165.22.248.215 port 43570 ssh2 Aug 16 15:00:05 web9 sshd\[31276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.248.215 user=root Aug 16 15:00:07 web9 sshd\[31276\]: Failed password for root from 165.22.248.215 port 35666 ssh2 |
2019-08-17 09:17:11 |
| 46.170.92.188 | attack | Unauthorized connection attempt from IP address 46.170.92.188 on Port 445(SMB) |
2019-08-17 09:32:37 |