城市(city): Noida
省份(region): Uttar Pradesh
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.161.0.0 - 122.161.255.255'
% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'
inetnum: 122.161.0.0 - 122.161.255.255
netname: ABTS-DSl-DEL
descr: Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr: Contact Person: DSL TAC
descr: Email: DSLTAC2NORTH.UNOC@airtel.com
descr: Phone:011-41612222
descr: Date of allocation:15-JAN-07
country: IN
geoloc: 28.549038 77.268795
admin-c: DEL2-AP
tech-c: DEL2-AP
abuse-c: AB914-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-IN-TELEMEDIA
mnt-irt: IRT-BHARTI-TELEMEDIA-IN
last-modified: 2021-03-31T13:02:48Z
source: APNIC
irt: IRT-BHARTI-TELEMEDIA-IN
address: Bharti Airtel Ltd.
e-mail: shankar.B@airtel.com
abuse-mailbox: dsltac2north.unoc@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
auth: # Filtered
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2026-02-03T23:14:59Z
source: APNIC
role: ABUSE BHARTITELEMEDIAIN
country: ZZ
address: Bharti Airtel Ltd.
phone: +000000000
e-mail: shankar.B@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
nic-hdl: AB914-AP
remarks: Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox: dsltac2north.unoc@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-03T23:15:15Z
source: APNIC
person: Network Administrator for ABTS DEL
address: Bharti Airtel Ltd. - TELEMEDIA Services
address: 224, Okhla Industrial Estate
address: Phase III, New Delhi-110020
country: IN
phone: +91-11-41615533
e-mail: dsl.noc@airtel.com
nic-hdl: DEL2-AP
remarks: --------------------------------------
remarks: Send abuse reports to
remarks: DSLTAC2NORTH.UNOC@airtel.com
remarks: --------------------------------------
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2015-11-05T05:17:08Z
source: APNIC
% Information related to '122.161.69.0/24AS24560'
route: 122.161.69.0/24
descr: BHARTI-IN
descr: Bharti Tele-Ventures Limited
descr: Class A ISP in INDIA .
descr: 234 , OKHLA PHASE III ,
descr: NEW DELHI
descr: INDIA
country: IN
origin: AS24560
mnt-by: MAINT-IN-BBIL
last-modified: 2008-09-04T07:55:18Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.69.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.161.69.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 08:00:19 CST 2026
;; MSG SIZE rcvd: 106
92.69.161.122.in-addr.arpa domain name pointer abts-north-dynamic-092.69.161.122.airtelbroadband.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
92.69.161.122.in-addr.arpa name = abts-north-dynamic-092.69.161.122.airtelbroadband.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 73.0.88.55 | attackspam | Mar 25 17:08:56 OPSO sshd\[16414\]: Invalid user og from 73.0.88.55 port 22717 Mar 25 17:08:56 OPSO sshd\[16414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.0.88.55 Mar 25 17:08:58 OPSO sshd\[16414\]: Failed password for invalid user og from 73.0.88.55 port 22717 ssh2 Mar 25 17:09:33 OPSO sshd\[16466\]: Invalid user wuchen from 73.0.88.55 port 43679 Mar 25 17:09:33 OPSO sshd\[16466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.0.88.55 |
2020-03-26 04:50:29 |
| 64.225.12.205 | attack | Mar 25 20:45:45 haigwepa sshd[31461]: Failed password for uucp from 64.225.12.205 port 51560 ssh2 ... |
2020-03-26 04:42:44 |
| 80.1.97.160 | attack | Automatic report - Port Scan Attack |
2020-03-26 04:50:09 |
| 140.143.61.200 | attackbots | Invalid user ud from 140.143.61.200 port 59672 |
2020-03-26 04:28:13 |
| 41.34.164.105 | attackspam | port scan and connect, tcp 23 (telnet) |
2020-03-26 04:51:47 |
| 122.146.94.100 | attack | Invalid user woongyoon from 122.146.94.100 port 48440 |
2020-03-26 04:29:31 |
| 92.62.131.124 | attackspambots | Mar 25 20:58:20 dev0-dcde-rnet sshd[18421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.124 Mar 25 20:58:22 dev0-dcde-rnet sshd[18421]: Failed password for invalid user nexus from 92.62.131.124 port 36698 ssh2 Mar 25 21:02:56 dev0-dcde-rnet sshd[18475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.124 |
2020-03-26 04:51:26 |
| 112.171.26.46 | attackbotsspam | Mar 25 21:14:39 server sshd[58518]: Failed password for invalid user student05 from 112.171.26.46 port 23278 ssh2 Mar 25 21:16:51 server sshd[59106]: Failed password for invalid user kavo from 112.171.26.46 port 58518 ssh2 Mar 25 21:18:11 server sshd[59545]: Failed password for invalid user mattermos from 112.171.26.46 port 25684 ssh2 |
2020-03-26 04:52:19 |
| 118.89.221.36 | attackbots | Invalid user Acotas from 118.89.221.36 port 42478 |
2020-03-26 04:55:18 |
| 164.155.117.222 | attackspambots | Invalid user noc from 164.155.117.222 port 48566 |
2020-03-26 04:30:35 |
| 152.32.216.240 | attackbots | Mar 26 01:49:30 itv-usvr-02 sshd[23303]: Invalid user testing from 152.32.216.240 port 59318 Mar 26 01:49:30 itv-usvr-02 sshd[23303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.216.240 Mar 26 01:49:30 itv-usvr-02 sshd[23303]: Invalid user testing from 152.32.216.240 port 59318 Mar 26 01:49:32 itv-usvr-02 sshd[23303]: Failed password for invalid user testing from 152.32.216.240 port 59318 ssh2 Mar 26 01:54:29 itv-usvr-02 sshd[23444]: Invalid user sirius from 152.32.216.240 port 57586 |
2020-03-26 04:41:41 |
| 192.42.116.24 | attackspambots | Mar 25 21:10:23 vpn01 sshd[18878]: Failed password for root from 192.42.116.24 port 39830 ssh2 Mar 25 21:10:25 vpn01 sshd[18878]: Failed password for root from 192.42.116.24 port 39830 ssh2 ... |
2020-03-26 04:41:20 |
| 49.84.233.148 | attack | 5x Failed Password |
2020-03-26 04:43:18 |
| 71.6.158.166 | attackspam | Mar 25 21:35:15 debian-2gb-nbg1-2 kernel: \[7427593.412257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=71.6.158.166 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=109 ID=22081 PROTO=TCP SPT=25653 DPT=9418 WINDOW=13579 RES=0x00 SYN URGP=0 |
2020-03-26 04:39:32 |
| 180.76.171.53 | attack | (sshd) Failed SSH login from 180.76.171.53 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 19:09:13 srv sshd[18232]: Invalid user livia from 180.76.171.53 port 36658 Mar 25 19:09:15 srv sshd[18232]: Failed password for invalid user livia from 180.76.171.53 port 36658 ssh2 Mar 25 19:25:49 srv sshd[18542]: Invalid user willy from 180.76.171.53 port 53536 Mar 25 19:25:51 srv sshd[18542]: Failed password for invalid user willy from 180.76.171.53 port 53536 ssh2 Mar 25 19:30:21 srv sshd[18595]: Invalid user admin from 180.76.171.53 port 56114 |
2020-03-26 04:33:33 |