City: Islamabad
Region: Islamabad Capital Territory
Country: Pakistan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '175.107.0.0 - 175.107.63.255'
% Abuse contact for '175.107.0.0 - 175.107.63.255' is 'zahir.abbas@ntc.net.pk'
inetnum: 175.107.0.0 - 175.107.63.255
netname: NTCISP-PK
descr: National Telecommunication Corporation
descr: Corporation
descr: NTC Headquarters Sector F-5/1
country: PK
org: ORG-NTC3-AP
admin-c: NTCA1-AP
tech-c: NTCA1-AP
abuse-c: AN769-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-PK-WAHEED
mnt-routes: MAINT-PK-WAHEED
mnt-irt: IRT-NTCISP-PK
last-modified: 2020-06-22T05:24:27Z
source: APNIC
irt: IRT-NTCISP-PK
address: Ntc Regional Hqs F-5/1 Islamabad
e-mail: zahir.abbas@ntc.org.pk
abuse-mailbox: zahir.abbas@ntc.net.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
auth: # Filtered
remarks: zahir.abbas@ntc.org.pk is invalid
mnt-by: MAINT-PK-ZAHIR
last-modified: 2025-10-02T10:50:50Z
source: APNIC
organisation: ORG-NTC3-AP
org-name: National Telecommunication Corporation
org-type: LIR
country: PK
address: Corporation
address: NTC Headquarters Sector F-5/1
phone: +92-51-9208686
fax-no: +92-51-9201489
e-mail: talha.javaid@ntc.net.pk
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:53Z
source: APNIC
role: ABUSE NTCISPPK
country: ZZ
address: Ntc Regional Hqs F-5/1 Islamabad
phone: +000000000
e-mail: zahir.abbas@ntc.org.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
nic-hdl: AN769-AP
remarks: Generated from irt object IRT-NTCISP-PK
remarks: zahir.abbas@ntc.org.pk is invalid
abuse-mailbox: zahir.abbas@ntc.net.pk
mnt-by: APNIC-ABUSE
last-modified: 2025-10-02T10:51:19Z
source: APNIC
role: National Telecommunication Corporation administrator
address: Sector F 5/1, Islamabad
country: PK
phone: +92-51-9208809
fax-no: +92-51-9201489
e-mail: ispsupport@ntc.net.pk
admin-c: NTCA1-AP
tech-c: NTCA1-AP
nic-hdl: NTCA1-AP
mnt-by: MAINT-PK-WAHEED
last-modified: 2015-07-01T04:51:22Z
source: APNIC
% Information related to '175.107.36.0/22AS23888'
route: 175.107.36.0/22
origin: AS23888
descr: National Telecommunication Corporation
Corporation
NTC Headquarters Sector F-5/1
mnt-by: MAINT-PK-WAHEED
last-modified: 2021-08-13T02:33:56Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.107.37.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;175.107.37.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 14:01:37 CST 2025
;; MSG SIZE rcvd: 107
b'Host 112.37.107.175.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 175.107.37.112.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
116.7.176.146 | attack | Oct 12 14:11:18 sshgateway sshd\[4152\]: Invalid user Irene@321 from 116.7.176.146 Oct 12 14:11:18 sshgateway sshd\[4152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.7.176.146 Oct 12 14:11:19 sshgateway sshd\[4152\]: Failed password for invalid user Irene@321 from 116.7.176.146 port 60334 ssh2 |
2019-10-13 02:56:31 |
158.69.117.126 | attackspam | Lines containing failures of 158.69.117.126 /var/log/apache/pucorp.org.log:2019-10-12T15:29:40.615524+02:00 edughostname sshd[22354]: Received disconnect from 158.69.117.126 port 44832:11: Normal Shutdown, Thank you for playing [preauth] /var/log/apache/pucorp.org.log:2019-10-12T15:29:40.616350+02:00 edughostname sshd[22354]: Disconnected from authenticating user r.r 158.69.117.126 port 44832 [preauth] /var/log/apache/pucorp.org.log:2019-10-12T15:30:06.160551+02:00 edughostname sshd[22427]: Received disconnect from 158.69.117.126 port 35832:11: Normal Shutdown, Thank you for playing [preauth] /var/log/apache/pucorp.org.log:2019-10-12T15:30:06.161228+02:00 edughostname sshd[22427]: Disconnected from authenticating user r.r 158.69.117.126 port 35832 [preauth] /var/log/apache/pucorp.org.log:2019-10-12T15:30:34.236040+02:00 edughostname sshd[22544]: Received disconnect from 158.69.117.126 port 55094:11: Normal Shutdown, Thank you for playing [preauth] /var/log/apache/pucorp......... ------------------------------ |
2019-10-13 03:08:48 |
51.15.51.2 | attack | Invalid user Wachtwoord1qaz from 51.15.51.2 port 54332 |
2019-10-13 03:23:49 |
78.186.156.212 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-13 02:53:09 |
192.241.249.53 | attackbots | Oct 12 17:00:18 vps691689 sshd[14554]: Failed password for root from 192.241.249.53 port 46953 ssh2 Oct 12 17:04:58 vps691689 sshd[14609]: Failed password for root from 192.241.249.53 port 38222 ssh2 ... |
2019-10-13 03:26:29 |
59.49.99.124 | attack | Oct 12 17:15:10 MK-Soft-VM4 sshd[15096]: Failed password for root from 59.49.99.124 port 18061 ssh2 ... |
2019-10-13 03:01:07 |
112.115.105.132 | attackbotsspam | Unauthorised access (Oct 12) SRC=112.115.105.132 LEN=44 TOS=0x10 PREC=0x40 TTL=238 ID=27467 TCP DPT=1433 WINDOW=1024 SYN |
2019-10-13 03:11:50 |
188.4.180.65 | attackbots | Automatic report - Port Scan Attack |
2019-10-13 03:11:21 |
185.176.27.250 | attackbots | 10/12/2019-20:54:58.048278 185.176.27.250 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-13 03:19:06 |
46.101.76.236 | attackbotsspam | Oct 12 20:40:15 xeon sshd[28105]: Failed password for root from 46.101.76.236 port 41150 ssh2 |
2019-10-13 02:57:02 |
138.201.64.18 | attack | 138.201.64.18 - - [12/Oct/2019:18:20:32 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x" |
2019-10-13 03:30:02 |
61.69.78.78 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-10-13 02:50:07 |
189.225.92.193 | attackbots | firewall-block, port(s): 81/tcp, 85/tcp |
2019-10-13 03:13:17 |
67.222.7.109 | attackbotsspam | Unsolicited bulk porn & phishing - varying ISPs (primarily Chinanet); spam volume up to 15/day. Spam series change: shift from repetitive redirects from blacklisted IP 92.63.192.124 & .151 to malicious attachments. Unsolicited bulk spam - panotetsu.com, CHINANET hebei province network - 106.115.39.239 Permitted sender domain jmramosmejia.com.ar = 67.222.7.109 PrivateSystems Networks Repetitive reply to: Reply-To: nanikarige@yahoo.com = 72.30.35.9 Oath Holdings Inc. Repetitive Apple mail: - boundary=" Apple-Mail-B7687EC7-712A-D2F6-E174-B1707B9FFC68" - X-Mailer: iPad Mail (13E238) Spam series change: no phishing redirect spam link. Malicious attachment - Outlook blocked access to unsafe attachment: 22.jpg |
2019-10-13 03:25:54 |
217.182.79.245 | attackbotsspam | Oct 12 16:27:11 MK-Soft-VM5 sshd[17153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.79.245 Oct 12 16:27:13 MK-Soft-VM5 sshd[17153]: Failed password for invalid user Bemvinda@123 from 217.182.79.245 port 39100 ssh2 ... |
2019-10-13 03:19:53 |