必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Noida

省份(region): Uttar Pradesh

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.161.0.0 - 122.161.255.255'

% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'

inetnum:        122.161.0.0 - 122.161.255.255
netname:        ABTS-DSl-DEL
descr:          Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr:          Contact Person: DSL TAC
descr:          Email: DSLTAC2NORTH.UNOC@airtel.com
descr:          Phone:011-41612222
descr:          Date of allocation:15-JAN-07
country:        IN
geoloc:         28.549038 77.268795
admin-c:        DEL2-AP
tech-c:         DEL2-AP
abuse-c:        AB914-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-IN-TELEMEDIA
mnt-irt:        IRT-BHARTI-TELEMEDIA-IN
last-modified:  2021-03-31T13:02:48Z
source:         APNIC

irt:            IRT-BHARTI-TELEMEDIA-IN
address:        Bharti Airtel Ltd.
e-mail:         shankar.B@airtel.com
abuse-mailbox:  dsltac2north.unoc@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
auth:           # Filtered
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2026-02-03T23:14:59Z
source:         APNIC

role:           ABUSE BHARTITELEMEDIAIN
country:        ZZ
address:        Bharti Airtel Ltd.
phone:          +000000000
e-mail:         shankar.B@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
nic-hdl:        AB914-AP
remarks:        Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox:  dsltac2north.unoc@airtel.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-03T23:15:15Z
source:         APNIC

person:         Network Administrator for ABTS DEL
address:        Bharti Airtel Ltd. - TELEMEDIA Services
address:        224, Okhla Industrial Estate
address:        Phase III, New Delhi-110020
country:        IN
phone:          +91-11-41615533
e-mail:         dsl.noc@airtel.com
nic-hdl:        DEL2-AP
remarks:        --------------------------------------
remarks:        Send abuse reports to
remarks:        DSLTAC2NORTH.UNOC@airtel.com
remarks:        --------------------------------------
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2015-11-05T05:17:08Z
source:         APNIC

% Information related to '122.161.75.0/24AS24560'

route:          122.161.75.0/24
descr:          BHARTI-IN
descr:          Bharti Tele-Ventures Limited
descr:          Class A ISP in INDIA .
descr:          234 , OKHLA PHASE III ,
descr:          NEW DELHI
descr:          INDIA
country:        IN
origin:         AS24560
mnt-by:         MAINT-IN-BBIL
last-modified:  2008-09-04T07:55:18Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.75.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.161.75.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 03:00:07 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
23.75.161.122.in-addr.arpa domain name pointer abts-north-dynamic-023.75.161.122.airtelbroadband.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
23.75.161.122.in-addr.arpa	name = abts-north-dynamic-023.75.161.122.airtelbroadband.in.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.162.140.172 attackbots
89 failed attempt(s) in the last 24h
2019-11-15 08:28:10
103.215.80.81 attackbotsspam
Nov 15 00:18:34 lnxded63 sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81
2019-11-15 08:29:15
81.28.167.30 attackbotsspam
2019-11-14T23:24:29.033567abusebot-2.cloudsearch.cf sshd\[6611\]: Invalid user adamos from 81.28.167.30 port 38764
2019-11-15 07:59:46
132.232.32.228 attackspambots
50 failed attempt(s) in the last 24h
2019-11-15 08:15:07
180.96.69.215 attackbots
50 failed attempt(s) in the last 24h
2019-11-15 08:10:14
36.155.115.95 attackspambots
Nov 15 00:51:00 vps691689 sshd[4950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Nov 15 00:51:02 vps691689 sshd[4950]: Failed password for invalid user ftpuser from 36.155.115.95 port 59252 ssh2
...
2019-11-15 07:59:26
98.126.88.107 attackbots
90 failed attempt(s) in the last 24h
2019-11-15 08:26:53
221.180.206.141 attackbotsspam
2019-11-14T22:35:54.504596abusebot-5.cloudsearch.cf sshd\[9071\]: Invalid user ts3bot from 221.180.206.141 port 5579
2019-11-15 08:30:05
35.188.77.30 attack
blogonese.net 35.188.77.30 \[14/Nov/2019:23:36:23 +0100\] "POST /wp-login.php HTTP/1.1" 200 6376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 35.188.77.30 \[14/Nov/2019:23:36:24 +0100\] "POST /wp-login.php HTTP/1.1" 200 6340 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 35.188.77.30 \[14/Nov/2019:23:36:25 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4085 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 08:06:32
203.93.209.8 attack
Nov 14 23:36:25 MK-Soft-VM5 sshd[16270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.93.209.8 
Nov 14 23:36:28 MK-Soft-VM5 sshd[16270]: Failed password for invalid user sysadm from 203.93.209.8 port 38802 ssh2
...
2019-11-15 07:58:40
192.254.73.218 attack
50 failed attempt(s) in the last 24h
2019-11-15 08:07:43
190.196.60.203 attackspambots
Nov 14 13:57:19 tdfoods sshd\[13617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.60.203  user=root
Nov 14 13:57:21 tdfoods sshd\[13617\]: Failed password for root from 190.196.60.203 port 15550 ssh2
Nov 14 14:01:42 tdfoods sshd\[14000\]: Invalid user cvs2 from 190.196.60.203
Nov 14 14:01:42 tdfoods sshd\[14000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.60.203
Nov 14 14:01:44 tdfoods sshd\[14000\]: Failed password for invalid user cvs2 from 190.196.60.203 port 52802 ssh2
2019-11-15 08:17:36
31.222.195.30 attackbotsspam
Nov 11 20:56:54 sanyalnet-cloud-vps3 sshd[24193]: Connection from 31.222.195.30 port 14611 on 45.62.248.66 port 22
Nov 11 20:56:54 sanyalnet-cloud-vps3 sshd[24193]: User sync from 31.222.195.30 not allowed because not listed in AllowUsers
Nov 11 20:56:54 sanyalnet-cloud-vps3 sshd[24193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.222.195.30  user=sync
Nov 11 20:56:56 sanyalnet-cloud-vps3 sshd[24193]: Failed password for invalid user sync from 31.222.195.30 port 14611 ssh2
Nov 11 20:56:56 sanyalnet-cloud-vps3 sshd[24193]: Received disconnect from 31.222.195.30: 11: Bye Bye [preauth]
Nov 11 21:59:52 sanyalnet-cloud-vps3 sshd[25587]: Connection from 31.222.195.30 port 33231 on 45.62.248.66 port 22
Nov 11 21:59:53 sanyalnet-cloud-vps3 sshd[25587]: User r.r from 31.222.195.30 not allowed because not listed in AllowUsers
Nov 11 21:59:53 sanyalnet-cloud-vps3 sshd[25587]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2019-11-15 08:33:47
118.121.201.83 attackbotsspam
$f2bV_matches
2019-11-15 08:18:20
110.35.173.2 attackspambots
Nov 14 13:58:17 web9 sshd\[26984\]: Invalid user nigel from 110.35.173.2
Nov 14 13:58:17 web9 sshd\[26984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2
Nov 14 13:58:19 web9 sshd\[26984\]: Failed password for invalid user nigel from 110.35.173.2 port 30472 ssh2
Nov 14 14:02:01 web9 sshd\[27450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2  user=root
Nov 14 14:02:04 web9 sshd\[27450\]: Failed password for root from 110.35.173.2 port 21029 ssh2
2019-11-15 08:18:49

最近上报的IP列表

164.110.75.136 2606:4700:10::6814:8528 2606:4700:10::ac43:2443 2606:4700:10::6814:9246
2606:4700:10::6814:8511 2606:4700:10::ac43:817 2606:4700:10::6814:5716 127.116.141.98
66.132.172.186 10.119.246.52 115.190.25.164 192.36.217.48
2606:4700:10::6816:1826 2606:4700:10::6816:2529 2606:4700:10::6816:1621 2606:4700:10::6816:400
2606:4700:10::6816:2477 2606:4700:10::6814:9649 2606:4700:10::6814:5365 2606:4700:10::6814:8631