城市(city): Jagdīshpur
省份(region): Uttar Pradesh
国家(country): India
运营商(isp): AirTel
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '106.205.64.0 - 106.205.127.255'
% Abuse contact for '106.205.64.0 - 106.205.127.255' is 'ip.misuse@airtel.com'
inetnum: 106.205.64.0 - 106.205.127.255
netname: JammuGPRS
descr: Bharti Airtel Jammu
country: IN
admin-c: NA40-AP
tech-c: NA40-AP
abuse-c: AB1077-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-IN-MOBILITY
mnt-irt: IRT-BHARTI-MO-IN
last-modified: 2021-01-06T04:45:24Z
source: APNIC
irt: IRT-BHARTI-MO-IN
address: Bharti Airtel Ltd.
address: Airtel Center, Plot No. 16 Udhyog Vihar
address: Gurgaon, India
e-mail: Rahul3.Jain@airtel.com
abuse-mailbox: ip.misuse@airtel.com
admin-c: RJ777-AP
tech-c: RJ777-AP
auth: # Filtered
remarks: ip.misuse@airtel.com is invalid
remarks: rahul3.jain@airtel.com was validated on 2025-09-05
mnt-by: MAINT-IN-MOBILITY
last-modified: 2025-11-18T00:26:32Z
source: APNIC
role: ABUSE BHARTIMOIN
country: ZZ
address: Bharti Airtel Ltd.
address: Airtel Center, Plot No. 16 Udhyog Vihar
address: Gurgaon, India
phone: +000000000
e-mail: Rahul3.Jain@airtel.com
admin-c: RJ777-AP
tech-c: RJ777-AP
nic-hdl: AB1077-AP
remarks: Generated from irt object IRT-BHARTI-MO-IN
remarks: ip.misuse@airtel.com is invalid
remarks: rahul3.jain@airtel.com was validated on 2025-09-05
abuse-mailbox: ip.misuse@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-05T03:38:28Z
source: APNIC
person: Network Administrator
nic-hdl: NA40-AP
e-mail: noc-dataprov@airtel.com
address: Bharti Airtel Ltd.
address: ISP Division - Transport Network Group
address: Plot no.16 , Udyog Vihar , Phase -IV , Gurgaon - 122015 , Haryana , INDIA
address: Phase III, New Delhi-110020, INDIA
phone: +91-0124 4282528
fax-no: +91-124-4244017
country: IN
mnt-by: MAINT-IN-BBIL
last-modified: 2026-03-19T10:53:18Z
source: APNIC
% Information related to '106.205.64.0/18AS45609'
route: 106.205.64.0/18
descr: GPRS-Subscribers-Jammu-Airtel
origin: AS45609
mnt-by: MAINT-IN-MOBILITY
last-modified: 2019-03-14T05:37:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.205.85.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.205.85.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032702 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 08:27:39 CST 2026
;; MSG SIZE rcvd: 106
Host 21.85.205.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.85.205.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.229.76.117 | attackbots | 2020-09-26T15:33:51.588166morrigan.ad5gb.com sshd[763999]: Failed password for invalid user teamspeak from 111.229.76.117 port 36144 ssh2 |
2020-09-28 03:24:10 |
| 23.101.135.220 | attackbots | Invalid user 148 from 23.101.135.220 port 60518 |
2020-09-28 03:32:06 |
| 87.251.74.18 | attack | Unauthorized connection attempt from IP address 87.251.74.18 on Port 3389(RDP) |
2020-09-28 03:17:33 |
| 40.71.233.57 | attack | Invalid user 206 from 40.71.233.57 port 14470 |
2020-09-28 03:24:42 |
| 175.5.23.74 | attackspam | IP 175.5.23.74 attacked honeypot on port: 23 at 9/26/2020 1:33:29 PM |
2020-09-28 03:16:15 |
| 193.201.214.51 | attackspambots |
|
2020-09-28 03:49:35 |
| 159.203.188.141 | attackbotsspam | Sep 27 19:23:37 vm1 sshd[16091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.188.141 Sep 27 19:23:39 vm1 sshd[16091]: Failed password for invalid user al from 159.203.188.141 port 39066 ssh2 ... |
2020-09-28 03:39:27 |
| 20.188.58.70 | attackbots | Invalid user azureadmin from 20.188.58.70 port 59933 |
2020-09-28 03:31:29 |
| 45.178.2.163 | attack | CMS (WordPress or Joomla) login attempt. |
2020-09-28 03:40:07 |
| 185.74.4.189 | attackbots | Invalid user devops from 185.74.4.189 port 42312 |
2020-09-28 03:47:05 |
| 40.118.43.195 | attackspambots | Invalid user 109 from 40.118.43.195 port 14097 |
2020-09-28 03:38:57 |
| 218.89.241.68 | attackbotsspam | Sep 27 18:19:10 jumpserver sshd[339959]: Failed password for invalid user tms from 218.89.241.68 port 56657 ssh2 Sep 27 18:22:20 jumpserver sshd[339966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.89.241.68 user=root Sep 27 18:22:22 jumpserver sshd[339966]: Failed password for root from 218.89.241.68 port 42579 ssh2 ... |
2020-09-28 03:32:26 |
| 59.144.48.34 | attackspambots | Sep 27 03:20:25 NPSTNNYC01T sshd[9542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34 Sep 27 03:20:27 NPSTNNYC01T sshd[9542]: Failed password for invalid user test from 59.144.48.34 port 9279 ssh2 Sep 27 03:22:24 NPSTNNYC01T sshd[9730]: Failed password for root from 59.144.48.34 port 7672 ssh2 ... |
2020-09-28 03:19:40 |
| 118.24.11.226 | attackspam | Sep 27 20:35:02 prod4 sshd\[30529\]: Invalid user user1 from 118.24.11.226 Sep 27 20:35:05 prod4 sshd\[30529\]: Failed password for invalid user user1 from 118.24.11.226 port 54906 ssh2 Sep 27 20:40:23 prod4 sshd\[984\]: Invalid user km from 118.24.11.226 ... |
2020-09-28 03:43:47 |
| 202.191.60.145 | attack | 202.191.60.145 - - [26/Sep/2020:13:41:14 -0700] "GET /wp-admin/ HTTP/1.0" 301 593 "http://stitch-maps.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36" ... |
2020-09-28 03:40:38 |