Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Islamabad

Region: Islamabad Capital Territory

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '175.107.0.0 - 175.107.63.255'

% Abuse contact for '175.107.0.0 - 175.107.63.255' is 'zahir.abbas@ntc.net.pk'

inetnum:        175.107.0.0 - 175.107.63.255
netname:        NTCISP-PK
descr:          National Telecommunication Corporation
descr:          Corporation
descr:          NTC Headquarters Sector F-5/1
country:        PK
org:            ORG-NTC3-AP
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
abuse-c:        AN769-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-PK-WAHEED
mnt-routes:     MAINT-PK-WAHEED
mnt-irt:        IRT-NTCISP-PK
last-modified:  2020-06-22T05:24:27Z
source:         APNIC

irt:            IRT-NTCISP-PK
address:        Ntc Regional Hqs F-5/1 Islamabad
e-mail:         zahir.abbas@ntc.org.pk
abuse-mailbox:  zahir.abbas@ntc.net.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
auth:           # Filtered
remarks:        zahir.abbas@ntc.org.pk is invalid
mnt-by:         MAINT-PK-ZAHIR
last-modified:  2025-10-02T10:50:50Z
source:         APNIC

organisation:   ORG-NTC3-AP
org-name:       National Telecommunication Corporation
org-type:       LIR
country:        PK
address:        Corporation
address:        NTC Headquarters Sector F-5/1
phone:          +92-51-9208686
fax-no:         +92-51-9201489
e-mail:         talha.javaid@ntc.net.pk
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:53Z
source:         APNIC

role:           ABUSE NTCISPPK
country:        ZZ
address:        Ntc Regional Hqs F-5/1 Islamabad
phone:          +000000000
e-mail:         zahir.abbas@ntc.org.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
nic-hdl:        AN769-AP
remarks:        Generated from irt object IRT-NTCISP-PK
remarks:        zahir.abbas@ntc.org.pk is invalid
abuse-mailbox:  zahir.abbas@ntc.net.pk
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-02T10:51:19Z
source:         APNIC

role:           National Telecommunication Corporation administrator
address:        Sector F 5/1, Islamabad
country:        PK
phone:          +92-51-9208809
fax-no:         +92-51-9201489
e-mail:         ispsupport@ntc.net.pk
admin-c:        NTCA1-AP
tech-c:         NTCA1-AP
nic-hdl:        NTCA1-AP
mnt-by:         MAINT-PK-WAHEED
last-modified:  2015-07-01T04:51:22Z
source:         APNIC

% Information related to '175.107.36.0/22AS23888'

route:          175.107.36.0/22
origin:         AS23888
descr:          National Telecommunication Corporation
                Corporation
                NTC Headquarters Sector F-5/1
mnt-by:         MAINT-PK-WAHEED
last-modified:  2021-08-13T02:33:56Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.107.37.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.107.37.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 14:01:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 112.37.107.175.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 175.107.37.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.7.176.146 attack
Oct 12 14:11:18 sshgateway sshd\[4152\]: Invalid user Irene@321 from 116.7.176.146
Oct 12 14:11:18 sshgateway sshd\[4152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.7.176.146
Oct 12 14:11:19 sshgateway sshd\[4152\]: Failed password for invalid user Irene@321 from 116.7.176.146 port 60334 ssh2
2019-10-13 02:56:31
158.69.117.126 attackspam
Lines containing failures of 158.69.117.126
/var/log/apache/pucorp.org.log:2019-10-12T15:29:40.615524+02:00 edughostname sshd[22354]: Received disconnect from 158.69.117.126 port 44832:11: Normal Shutdown, Thank you for playing [preauth]
/var/log/apache/pucorp.org.log:2019-10-12T15:29:40.616350+02:00 edughostname sshd[22354]: Disconnected from authenticating user r.r 158.69.117.126 port 44832 [preauth]
/var/log/apache/pucorp.org.log:2019-10-12T15:30:06.160551+02:00 edughostname sshd[22427]: Received disconnect from 158.69.117.126 port 35832:11: Normal Shutdown, Thank you for playing [preauth]
/var/log/apache/pucorp.org.log:2019-10-12T15:30:06.161228+02:00 edughostname sshd[22427]: Disconnected from authenticating user r.r 158.69.117.126 port 35832 [preauth]
/var/log/apache/pucorp.org.log:2019-10-12T15:30:34.236040+02:00 edughostname sshd[22544]: Received disconnect from 158.69.117.126 port 55094:11: Normal Shutdown, Thank you for playing [preauth]
/var/log/apache/pucorp.........
------------------------------
2019-10-13 03:08:48
51.15.51.2 attack
Invalid user Wachtwoord1qaz from 51.15.51.2 port 54332
2019-10-13 03:23:49
78.186.156.212 attackbotsspam
Automatic report - Port Scan Attack
2019-10-13 02:53:09
192.241.249.53 attackbots
Oct 12 17:00:18 vps691689 sshd[14554]: Failed password for root from 192.241.249.53 port 46953 ssh2
Oct 12 17:04:58 vps691689 sshd[14609]: Failed password for root from 192.241.249.53 port 38222 ssh2
...
2019-10-13 03:26:29
59.49.99.124 attack
Oct 12 17:15:10 MK-Soft-VM4 sshd[15096]: Failed password for root from 59.49.99.124 port 18061 ssh2
...
2019-10-13 03:01:07
112.115.105.132 attackbotsspam
Unauthorised access (Oct 12) SRC=112.115.105.132 LEN=44 TOS=0x10 PREC=0x40 TTL=238 ID=27467 TCP DPT=1433 WINDOW=1024 SYN
2019-10-13 03:11:50
188.4.180.65 attackbots
Automatic report - Port Scan Attack
2019-10-13 03:11:21
185.176.27.250 attackbots
10/12/2019-20:54:58.048278 185.176.27.250 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-13 03:19:06
46.101.76.236 attackbotsspam
Oct 12 20:40:15 xeon sshd[28105]: Failed password for root from 46.101.76.236 port 41150 ssh2
2019-10-13 02:57:02
138.201.64.18 attack
138.201.64.18 - - [12/Oct/2019:18:20:32 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x"
2019-10-13 03:30:02
61.69.78.78 attackspambots
Automatic report - SSH Brute-Force Attack
2019-10-13 02:50:07
189.225.92.193 attackbots
firewall-block, port(s): 81/tcp, 85/tcp
2019-10-13 03:13:17
67.222.7.109 attackbotsspam
Unsolicited bulk porn & phishing - varying ISPs (primarily Chinanet); spam volume up to 15/day.  Spam series change: shift from repetitive redirects from blacklisted IP 92.63.192.124 & .151 to malicious attachments.

Unsolicited bulk spam - panotetsu.com, CHINANET hebei province network - 106.115.39.239

Permitted sender domain jmramosmejia.com.ar = 67.222.7.109 PrivateSystems Networks

Repetitive reply to:
Reply-To: nanikarige@yahoo.com = 72.30.35.9 Oath Holdings Inc.

Repetitive Apple mail:
-	boundary=" Apple-Mail-B7687EC7-712A-D2F6-E174-B1707B9FFC68"
-	X-Mailer: iPad Mail (13E238)

Spam series change: no phishing redirect spam link.  Malicious attachment - Outlook blocked access to unsafe attachment: 22.jpg
2019-10-13 03:25:54
217.182.79.245 attackbotsspam
Oct 12 16:27:11 MK-Soft-VM5 sshd[17153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.79.245 
Oct 12 16:27:13 MK-Soft-VM5 sshd[17153]: Failed password for invalid user Bemvinda@123 from 217.182.79.245 port 39100 ssh2
...
2019-10-13 03:19:53

Recently Reported IPs

121.41.169.100 144.172.115.86 20.64.106.71 36.68.53.95
162.216.149.7 99.86.13.218 45.134.13.216 20.65.194.188
113.95.136.78 64.62.156.230 205.210.31.241 118.16.14.81
118.16.14.250 36.159.51.72 20.64.104.9 196.251.118.109
202.181.24.236 38.150.35.225 138.36.155.73 20.64.104.27