City: Chicago
Region: Illinois
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 164.155.0.0 - 164.155.255.255
CIDR: 164.155.0.0/16
NetName: AFRINIC-164-155-0-0
NetHandle: NET-164-155-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Transferred to AfriNIC
OriginAS:
Organization: African Network Information Center (AFRINIC)
RegDate: 2005-02-21
Updated: 2005-02-21
Comment: This IP address range is under AFRINIC responsibility.
Comment: Please see http://www.afrinic.net/ for further details,
Comment: or check the WHOIS server located at whois.afrinic.net.
Ref: https://rdap.arin.net/registry/ip/164.155.0.0
ResourceLink: http://afrinic.net/en/services/whois-query
ResourceLink: whois.afrinic.net
OrgName: African Network Information Center
OrgId: AFRINIC
Address: Level 11ABC
Address: Raffles Tower
Address: Lot 19, Cybercity
City: Ebene
StateProv:
PostalCode:
Country: MU
RegDate: 2004-05-17
Updated: 2015-05-04
Comment: AfriNIC - http://www.afrinic.net
Comment: The African & Indian Ocean Internet Registry
Ref: https://rdap.arin.net/registry/entity/AFRINIC
ReferralServer: whois://whois.afrinic.net
ResourceLink: http://afrinic.net/en/services/whois-query
OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net
OrgTechRef: https://rdap.arin.net/registry/entity/GENER11-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.afrinic.net.
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '164.155.0.0 - 164.155.255.255'
% No abuse contact registered for 164.155.0.0 - 164.155.255.255
inetnum: 164.155.0.0 - 164.155.255.255
netname: SENTRACHEM
descr: Sentrachem Limited
descr: PO BOX 781811
descr: Sandton, 2146
country: ZA
org: ORG-SL72-AFRINIC
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
status: ASSIGNED PI
remarks: ============REMARK===================
remarks: The custodianship of this IP prefix is presently
remarks: deemed to be in dispute. Consequently,
remarks: no change request pertaining to this particular
remarks: prefix will be entertained by AFRINIC until the
remarks: issue is finally resolved between the disputants
remarks: themselves or by a competent authority.
remarks: Further, whilst the current holder of the said prefix
remarks: continues to hold same, AFRINIC shall bear no
remarks: responsibility whatsoever in relation thereto and
remarks: disputants are encouraged to resolve the said
remarks: dispute expeditiously.
remarks: ============REMARK====================
mnt-by: AFRINIC-HM-MNT
mnt-lower: AFRINIC-LH-MNT
source: AFRINIC # Filtered
parent: 0.0.0.0 - 255.255.255.255
organisation: ORG-SL72-AFRINIC
org-name: Sentrachem Limited
org-type: EU-PI
country: ZA
address: PO BOX 781811
address: Sandton, 2146
address: Johannesburg
phone: tel:+230-403-5100
admin-c: ALH1-AFRINIC
tech-c: ALH1-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-ref: AFRINIC-LH-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
role: AFRINIC LH HOSTMASTERS
address: 11th Floor, Standard Chartered Tower
address: 19, Cybercity
address: Ebène, Mauritius
admin-c: JC17-AFRINIC
tech-c: JC17-AFRINIC
tech-c: NMB1-AFRINIC
nic-hdl: ALH1-AFRINIC
mnt-by: AFRINIC-LH-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.74.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.155.74.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 02:04:34 CST 2026
;; MSG SIZE rcvd: 106
b'Host 89.74.155.164.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 164.155.74.89.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.186.125.74 | attack | Unauthorized connection attempt from IP address 58.186.125.74 on Port 445(SMB) |
2019-07-05 05:56:27 |
| 77.20.216.19 | attackbotsspam | Jul 4 20:42:38 lvps5-35-247-183 sshd[21945]: Invalid user pi from 77.20.216.19 Jul 4 20:42:39 lvps5-35-247-183 sshd[21947]: Invalid user pi from 77.20.216.19 Jul 4 20:42:40 lvps5-35-247-183 sshd[21945]: Failed password for invalid user pi from 77.20.216.19 port 40108 ssh2 Jul 4 20:42:40 lvps5-35-247-183 sshd[21945]: Connection closed by 77.20.216.19 [preauth] Jul 4 20:42:41 lvps5-35-247-183 sshd[21947]: Failed password for invalid user pi from 77.20.216.19 port 40110 ssh2 Jul 4 20:42:41 lvps5-35-247-183 sshd[21947]: Connection closed by 77.20.216.19 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=77.20.216.19 |
2019-07-05 06:08:05 |
| 35.221.226.56 | attack | Jul 4 21:12:06 [munged] sshd[32596]: Invalid user mirror02 from 35.221.226.56 port 51616 Jul 4 21:12:06 [munged] sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.221.226.56 |
2019-07-05 06:28:42 |
| 200.170.139.169 | attackspambots | Jul 4 10:42:26 plusreed sshd[1234]: Invalid user xp from 200.170.139.169 ... |
2019-07-05 06:03:05 |
| 52.177.202.136 | attackbots | jannisjulius.de 52.177.202.136 \[04/Jul/2019:19:22:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 6117 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" jannisjulius.de 52.177.202.136 \[04/Jul/2019:19:22:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 6119 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-05 06:27:35 |
| 113.172.217.173 | attackbotsspam | Jul 4 15:56:38 master sshd[12674]: Failed password for invalid user admin from 113.172.217.173 port 52109 ssh2 |
2019-07-05 06:07:46 |
| 198.50.161.20 | attackbots | 04.07.2019 18:42:38 SSH access blocked by firewall |
2019-07-05 06:29:42 |
| 118.93.125.4 | attackbotsspam | 23/tcp 37215/tcp [2019-07-03/04]2pkt |
2019-07-05 05:51:56 |
| 206.189.136.160 | attack | Jul 4 21:46:13 localhost sshd\[3416\]: Invalid user coen from 206.189.136.160 port 33612 Jul 4 21:46:13 localhost sshd\[3416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.160 Jul 4 21:46:15 localhost sshd\[3416\]: Failed password for invalid user coen from 206.189.136.160 port 33612 ssh2 ... |
2019-07-05 05:56:56 |
| 37.1.202.186 | attackspambots | Unauthorized connection attempt from IP address 37.1.202.186 on Port 445(SMB) |
2019-07-05 06:10:57 |
| 167.114.234.52 | attackbotsspam | Automatic report - Web App Attack |
2019-07-05 06:01:55 |
| 109.110.169.107 | attackbotsspam | Port scan and direct access per IP instead of hostname |
2019-07-05 06:32:13 |
| 68.183.236.29 | attack | Jul 4 22:12:59 vserver sshd\[20956\]: Invalid user Rupesh from 68.183.236.29Jul 4 22:13:01 vserver sshd\[20956\]: Failed password for invalid user Rupesh from 68.183.236.29 port 32914 ssh2Jul 4 22:16:04 vserver sshd\[20981\]: Invalid user chloe from 68.183.236.29Jul 4 22:16:06 vserver sshd\[20981\]: Failed password for invalid user chloe from 68.183.236.29 port 58320 ssh2 ... |
2019-07-05 06:27:08 |
| 31.163.150.102 | attack | DATE:2019-07-04 15:00:03, IP:31.163.150.102, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) |
2019-07-05 05:51:02 |
| 188.254.106.186 | attackbots | utm - spam |
2019-07-05 06:30:01 |