必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Noida

省份(region): Uttar Pradesh

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.161.0.0 - 122.161.255.255'

% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'

inetnum:        122.161.0.0 - 122.161.255.255
netname:        ABTS-DSl-DEL
descr:          Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr:          Contact Person: DSL TAC
descr:          Email: DSLTAC2NORTH.UNOC@airtel.com
descr:          Phone:011-41612222
descr:          Date of allocation:15-JAN-07
country:        IN
geoloc:         28.549038 77.268795
admin-c:        DEL2-AP
tech-c:         DEL2-AP
abuse-c:        AB914-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-IN-TELEMEDIA
mnt-irt:        IRT-BHARTI-TELEMEDIA-IN
last-modified:  2021-03-31T13:02:48Z
source:         APNIC

irt:            IRT-BHARTI-TELEMEDIA-IN
address:        Bharti Airtel Ltd.
e-mail:         shankar.B@airtel.com
abuse-mailbox:  dsltac2north.unoc@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
auth:           # Filtered
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2026-02-03T23:14:59Z
source:         APNIC

role:           ABUSE BHARTITELEMEDIAIN
country:        ZZ
address:        Bharti Airtel Ltd.
phone:          +000000000
e-mail:         shankar.B@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
nic-hdl:        AB914-AP
remarks:        Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox:  dsltac2north.unoc@airtel.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-03T23:15:15Z
source:         APNIC

person:         Network Administrator for ABTS DEL
address:        Bharti Airtel Ltd. - TELEMEDIA Services
address:        224, Okhla Industrial Estate
address:        Phase III, New Delhi-110020
country:        IN
phone:          +91-11-41615533
e-mail:         dsl.noc@airtel.com
nic-hdl:        DEL2-AP
remarks:        --------------------------------------
remarks:        Send abuse reports to
remarks:        DSLTAC2NORTH.UNOC@airtel.com
remarks:        --------------------------------------
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2015-11-05T05:17:08Z
source:         APNIC

% Information related to '122.161.69.0/24AS24560'

route:          122.161.69.0/24
descr:          BHARTI-IN
descr:          Bharti Tele-Ventures Limited
descr:          Class A ISP in INDIA .
descr:          234 , OKHLA PHASE III ,
descr:          NEW DELHI
descr:          INDIA
country:        IN
origin:         AS24560
mnt-by:         MAINT-IN-BBIL
last-modified:  2008-09-04T07:55:18Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.69.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.161.69.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 08:00:19 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
92.69.161.122.in-addr.arpa domain name pointer abts-north-dynamic-092.69.161.122.airtelbroadband.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.69.161.122.in-addr.arpa	name = abts-north-dynamic-092.69.161.122.airtelbroadband.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
73.0.88.55 attackspam
Mar 25 17:08:56 OPSO sshd\[16414\]: Invalid user og from 73.0.88.55 port 22717
Mar 25 17:08:56 OPSO sshd\[16414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.0.88.55
Mar 25 17:08:58 OPSO sshd\[16414\]: Failed password for invalid user og from 73.0.88.55 port 22717 ssh2
Mar 25 17:09:33 OPSO sshd\[16466\]: Invalid user wuchen from 73.0.88.55 port 43679
Mar 25 17:09:33 OPSO sshd\[16466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.0.88.55
2020-03-26 04:50:29
64.225.12.205 attack
Mar 25 20:45:45 haigwepa sshd[31461]: Failed password for uucp from 64.225.12.205 port 51560 ssh2
...
2020-03-26 04:42:44
80.1.97.160 attack
Automatic report - Port Scan Attack
2020-03-26 04:50:09
140.143.61.200 attackbots
Invalid user ud from 140.143.61.200 port 59672
2020-03-26 04:28:13
41.34.164.105 attackspam
port scan and connect, tcp 23 (telnet)
2020-03-26 04:51:47
122.146.94.100 attack
Invalid user woongyoon from 122.146.94.100 port 48440
2020-03-26 04:29:31
92.62.131.124 attackspambots
Mar 25 20:58:20 dev0-dcde-rnet sshd[18421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.124
Mar 25 20:58:22 dev0-dcde-rnet sshd[18421]: Failed password for invalid user nexus from 92.62.131.124 port 36698 ssh2
Mar 25 21:02:56 dev0-dcde-rnet sshd[18475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.124
2020-03-26 04:51:26
112.171.26.46 attackbotsspam
Mar 25 21:14:39 server sshd[58518]: Failed password for invalid user student05 from 112.171.26.46 port 23278 ssh2
Mar 25 21:16:51 server sshd[59106]: Failed password for invalid user kavo from 112.171.26.46 port 58518 ssh2
Mar 25 21:18:11 server sshd[59545]: Failed password for invalid user mattermos from 112.171.26.46 port 25684 ssh2
2020-03-26 04:52:19
118.89.221.36 attackbots
Invalid user Acotas from 118.89.221.36 port 42478
2020-03-26 04:55:18
164.155.117.222 attackspambots
Invalid user noc from 164.155.117.222 port 48566
2020-03-26 04:30:35
152.32.216.240 attackbots
Mar 26 01:49:30 itv-usvr-02 sshd[23303]: Invalid user testing from 152.32.216.240 port 59318
Mar 26 01:49:30 itv-usvr-02 sshd[23303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.216.240
Mar 26 01:49:30 itv-usvr-02 sshd[23303]: Invalid user testing from 152.32.216.240 port 59318
Mar 26 01:49:32 itv-usvr-02 sshd[23303]: Failed password for invalid user testing from 152.32.216.240 port 59318 ssh2
Mar 26 01:54:29 itv-usvr-02 sshd[23444]: Invalid user sirius from 152.32.216.240 port 57586
2020-03-26 04:41:41
192.42.116.24 attackspambots
Mar 25 21:10:23 vpn01 sshd[18878]: Failed password for root from 192.42.116.24 port 39830 ssh2
Mar 25 21:10:25 vpn01 sshd[18878]: Failed password for root from 192.42.116.24 port 39830 ssh2
...
2020-03-26 04:41:20
49.84.233.148 attack
5x Failed Password
2020-03-26 04:43:18
71.6.158.166 attackspam
Mar 25 21:35:15 debian-2gb-nbg1-2 kernel: \[7427593.412257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=71.6.158.166 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=109 ID=22081 PROTO=TCP SPT=25653 DPT=9418 WINDOW=13579 RES=0x00 SYN URGP=0
2020-03-26 04:39:32
180.76.171.53 attack
(sshd) Failed SSH login from 180.76.171.53 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 19:09:13 srv sshd[18232]: Invalid user livia from 180.76.171.53 port 36658
Mar 25 19:09:15 srv sshd[18232]: Failed password for invalid user livia from 180.76.171.53 port 36658 ssh2
Mar 25 19:25:49 srv sshd[18542]: Invalid user willy from 180.76.171.53 port 53536
Mar 25 19:25:51 srv sshd[18542]: Failed password for invalid user willy from 180.76.171.53 port 53536 ssh2
Mar 25 19:30:21 srv sshd[18595]: Invalid user admin from 180.76.171.53 port 56114
2020-03-26 04:33:33

最近上报的IP列表

121.134.95.195 107.172.58.36 2606:4700:10::6814:4913 2606:4700:10::6814:5523
2606:4700:10::6814:9699 2606:4700:10::6816:2733 2606:4700:10::ac43:2818 164.155.74.159
211.104.7.243 110.78.158.147 2606:4700:10::6814:4878 2606:4700:10::6816:4922
2606:4700:10::6816:4268 2606:4700:10::6814:5606 2606:4700:10::6816:862 2606:4700:10::6814:7437
2606:4700:10::6814:4957 23.249.153.175 131.64.176.255 47.128.123.132