Share

Whois information

NetRange: 157.54.0.0 - 157.60.255.255
CIDR: 157.56.0.0/14, 157.54.0.0/15, 157.60.0.0/16
NetName: MSFT-GFS
NetHandle: NET-157-54-0-0-1
Parent: NET157 (NET-157-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS8075
Organization: Microsoft Corporation (MSFT)
RegDate: 1994-04-28
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/157.54.0.0

OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-10
Updated: 2024-03-18
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://rdap.arin.net/registry/entity/MSFT

OrgTechHandle: BEDAR6-ARIN
OrgTechName: Bedard, Dawn
OrgTechPhone: +1-425-538-6637
OrgTechEmail: dabedard@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/BEDAR6-ARIN

OrgRoutingHandle: CHATU3-ARIN
OrgRoutingName: Chaturmohta, Somesh
OrgRoutingPhone: +1-425-882-8080
OrgRoutingEmail: someshch@microsoft.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CHATU3-ARIN

OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/MRPD-ARIN

OrgTechHandle: IPHOS5-ARIN
OrgTechName: IPHostmaster, IPHostmaster
OrgTechPhone: +1-425-538-6637
OrgTechEmail: iphostmaster@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPHOS5-ARIN

OrgTechHandle: KIMAV-ARIN
OrgTechName: Kim, Avery
OrgTechPhone: +1-425-882-8080
OrgTechEmail: averykim@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/KIMAV-ARIN

OrgTechHandle: SINGH683-ARIN
OrgTechName: Singh, Prachi
OrgTechPhone: +1-425-707-5601
OrgTechEmail: pracsin@microsoft.com
OrgTechRef: https://rdap.arin.net/registry/entity/SINGH683-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/MAC74-ARIN

DNS BlackList results:

  • BL.SPAMCOP.NET Not Listed
  • SBL.SPAMHAUS.ORG Not Listed
  • B.BARRACUDACENTRAL.ORG Not Listed
  • SPAM.SPAMRATS.COM Not Listed
  • Z.MAILSPIKE.NET Not Listed
  • CBL.ABUSEAT.ORG Not Listed

Most recent complaints

Complaint by Behrod :

flooding port 443 company in Asia, 157.56.67.222, 64.4.23.143, US SERVER, complaint Internet Crime Center http://www.spaminform.com/spam-report/-c926737.html TCP SYN flooding port 443 in Asia, 157.56.67.222, 64.4.23.143, SKYPE, HOTMAIL, MICROSOFT, US SERVER What US networks server is looking for to flooding company's firewall in Asia? TCP SYN flooding port 443, cookies sending, 157.56.67.222, 64.4.23.143, HOTMAIL, MICROSOFT http://www.ipillion.com/ip/157.56.67.222 Port 443 flooding, Skype, 64.4.23.143, 157.56.67.222, HOTMAIL, MICROSOFT http://www.ipillion.com/ip/64.4.23.143 need help! possible SYN flooding on port 80 ... If it is a heavy DDOS, you need to get your DC to filter them out for you. http://www.webhostingtalk.com/showthread.php?t=628063 flooding Port 443, Skype, 64.4.23.143, HOTMAIL flooding Port 443, 157.56.67.222, MICROSOFT Windows update sporty actions and incidents without any significant impacts 11/28/2012 9:44 AM [FireWall] Flooding 11/28/2012 9:44 AM [FireWall] Flooding 11/25/2012 14:43 PM [FireWall] Flooding 11/25/2012 14:44 PM [FireWall] Flooding 11/25/2012 14:12 PM [FireWall] Flooding 11/25/2012 14:13 PM [FireWall] Flooding Skype.exe 3432 TCP 192.168.2.103 4311 64.4.23.143 443 SYN_SENT ticket#0002 - 64.4.23.143 443, SRX1188810738ID http://cert.microsoft.com WINLV.WLHM.00.00.EN.STR.SHW.AU.T01.SPT.00.EM@...microsoft.com NetRange: 64.4.0.0 - 64.4.63.255 HOTMAIL Comment: [abuse@microsoft.com] and [abuse@msn.com] NetRange: 157.54.0.0 - 157.60.255.255 CIDR: 157.56.0.0/14, 157.54.0.0/15, 157.60.0.0/16 NetName: MSFT-GFS MICROSOFT server notice : kernel: possible SYN flooding on port 110. Sending cookies and down how to disable flood on port 110, flood port 443 .... http://webhosting.bigresource.com/server-notice-kernel-possible-SYN-flooding-on-port-110-Sending-cookies-kSSJN6QR.html TCP: Possible SYN flooding on port 443. Sending cookies http://guzik.net.pl/blog/2012/08/tcp-possible-syn-flooding-on-port-443-sending-cookies/ report spying, port scanning, communication attacks from US server Mobile phone hacking or spying attacks by US citizen reports to US Internet Cyber Crime Complaint Center [spam@uce.gov] http://www.fbi.gov/scams-safety/e-scams/e-scams Global FBI offices - called legal attaches or legats http://www.fbi.gov/contact-us/legat

Reported on: 5th, May. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 157.56.67.222 IP address

DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.