城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.64.0.0 - 219.65.255.255'
% Abuse contact for '219.64.0.0 - 219.65.255.255' is '4755abuse@tatacommunications.com'
inetnum: 219.64.0.0 - 219.65.255.255
netname: TATACOMM-IN
descr: Internet Service Provider
descr: TATA Communications formerly VSNL is Leading ISP,
descr: Data and Voice Carrier in India
country: IN
org: ORG-TCL6-AP
admin-c: TC651-AP
tech-c: TC651-AP
abuse-c: AT1356-AP
status: ALLOCATED PORTABLE
remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be modified by APNIC hostmaster
remarks: If you wish to modify this object details please
remarks: send email to hostmaster@apnic.net with your organisation
remarks: account name in the subject line.
remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by: APNIC-HM
mnt-lower: MAINT-TATACOMM-IN
mnt-routes: MAINT-TATACOMM-IN
mnt-irt: IRT-TATACOMM-IN
last-modified: 2020-12-08T14:35:53Z
source: APNIC
irt: IRT-TATACOMM-IN
address: 6th Floor, LVSB, VSNL
address: Kashinath Dhuru marg, Prabhadevi
address: Dadar(W), Mumbai 400028
address: India
e-mail: ip.admin@tatacommunications.com
abuse-mailbox: 4755abuse@tatacommunications.com
admin-c: IA15-AP
tech-c: IA15-AP
auth: # Filtered
remarks: ip.admin@tatacommunications.com was validated on 2026-02-17
remarks: 4755abuse@tatacommunications.com was validated on 2026-02-17
mnt-by: MAINT-TATACOMM-IN
last-modified: 2026-02-17T10:21:33Z
source: APNIC
organisation: ORG-TCL6-AP
org-name: Tata Communications Limited
org-type: LIR
country: IN
address: Customer Service & Operations
address: Plot Nos. C-21 & C-36
address: 'G' Block, Bandra Kurla Complex,
phone: +91-22-66502826
fax-no: +91-22-66502039
e-mail: ip-addr@tatacommunications.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:43Z
source: APNIC
role: ABUSE TATACOMMIN
country: ZZ
address: 6th Floor, LVSB, VSNL
address: Kashinath Dhuru marg, Prabhadevi
address: Dadar(W), Mumbai 400028
address: India
phone: +000000000
e-mail: ip.admin@tatacommunications.com
admin-c: IA15-AP
tech-c: IA15-AP
nic-hdl: AT1356-AP
remarks: Generated from irt object IRT-TATACOMM-IN
remarks: ip.admin@tatacommunications.com was validated on 2026-02-17
remarks: 4755abuse@tatacommunications.com was validated on 2026-02-17
abuse-mailbox: 4755abuse@tatacommunications.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-17T10:21:44Z
source: APNIC
role: TATA Communications
nic-hdl: TC651-AP
address: 6th Floor,A Tower, BKC
address: Plot Nos. C-21 & C-36
address: 'G' Block, Bandra Kurla Complex, Mumbai
phone: +91-020-66357160
country: IN
e-mail: ip.admin@tatacommunications.com
admin-c: IA15-AP
tech-c: VT43-AP
mnt-by: MAINT-TATACOMM-IN
last-modified: 2024-10-25T08:12:54Z
source: APNIC
% Information related to '219.65.245.0/24AS17908'
route: 219.65.245.0/24
descr: Route to TCISL
origin: AS17908
mnt-by: MAINT-TATACOMM-IN
last-modified: 2008-10-20T08:45:51Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.65.245.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.65.245.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041402 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 07:21:17 CST 2026
;; MSG SIZE rcvd: 107
130.245.65.219.in-addr.arpa domain name pointer 219.65.245.130.static.vsnl.net.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.245.65.219.in-addr.arpa name = 219.65.245.130.static.vsnl.net.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.227.255.203 | attackspam | leo_www |
2019-11-25 05:00:08 |
| 89.163.209.26 | attackspam | Nov 24 08:18:23 hpm sshd\[3927\]: Invalid user sreid123 from 89.163.209.26 Nov 24 08:18:23 hpm sshd\[3927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rs000279.fastrootserver.de Nov 24 08:18:25 hpm sshd\[3927\]: Failed password for invalid user sreid123 from 89.163.209.26 port 33903 ssh2 Nov 24 08:24:23 hpm sshd\[4439\]: Invalid user 1Q2W3E!@\# from 89.163.209.26 Nov 24 08:24:23 hpm sshd\[4439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rs000279.fastrootserver.de |
2019-11-25 04:50:38 |
| 58.187.173.88 | attackbotsspam | Unauthorized connection attempt from IP address 58.187.173.88 on Port 445(SMB) |
2019-11-25 04:55:58 |
| 185.247.140.245 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-11-25 05:09:02 |
| 201.24.185.199 | attack | 2019-11-24T09:36:21.923483ns547587 sshd\[607\]: Invalid user kt from 201.24.185.199 port 54306 2019-11-24T09:36:21.928220ns547587 sshd\[607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.24.185.199 2019-11-24T09:36:24.181823ns547587 sshd\[607\]: Failed password for invalid user kt from 201.24.185.199 port 54306 ssh2 2019-11-24T09:46:08.716271ns547587 sshd\[4598\]: Invalid user neon from 201.24.185.199 port 44211 2019-11-24T09:46:08.722011ns547587 sshd\[4598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.24.185.199 ... |
2019-11-25 04:57:17 |
| 37.144.215.146 | attackspambots | Unauthorized connection attempt from IP address 37.144.215.146 on Port 445(SMB) |
2019-11-25 04:57:00 |
| 182.76.180.42 | attackbots | Unauthorized connection attempt from IP address 182.76.180.42 on Port 445(SMB) |
2019-11-25 05:20:36 |
| 178.128.154.236 | attack | SS1,DEF GET /wp-login.php |
2019-11-25 05:15:56 |
| 192.68.185.252 | attack | Nov 24 14:53:22 www6-3 sshd[23761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.68.185.252 user=r.r Nov 24 14:53:23 www6-3 sshd[23761]: Failed password for r.r from 192.68.185.252 port 54554 ssh2 Nov 24 14:53:24 www6-3 sshd[23761]: Received disconnect from 192.68.185.252 port 54554:11: Bye Bye [preauth] Nov 24 14:53:24 www6-3 sshd[23761]: Disconnected from 192.68.185.252 port 54554 [preauth] Nov 24 15:03:22 www6-3 sshd[24847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.68.185.252 user=r.r Nov 24 15:03:25 www6-3 sshd[24847]: Failed password for r.r from 192.68.185.252 port 40408 ssh2 Nov 24 15:03:25 www6-3 sshd[24847]: Received disconnect from 192.68.185.252 port 40408:11: Bye Bye [preauth] Nov 24 15:03:25 www6-3 sshd[24847]: Disconnected from 192.68.185.252 port 40408 [preauth] Nov 24 15:11:22 www6-3 sshd[25760]: Invalid user dreuilles from 192.68.185.252 port 49476 Nov 24........ ------------------------------- |
2019-11-25 04:49:56 |
| 115.78.11.200 | attackbotsspam | Unauthorized connection attempt from IP address 115.78.11.200 on Port 445(SMB) |
2019-11-25 05:12:01 |
| 31.44.176.8 | attackbots | Unauthorized connection attempt from IP address 31.44.176.8 on Port 445(SMB) |
2019-11-25 05:02:18 |
| 45.80.65.82 | attackbots | ssh intrusion attempt |
2019-11-25 05:12:23 |
| 142.93.195.189 | attack | Nov 24 19:43:35 *** sshd[11437]: Invalid user debian from 142.93.195.189 |
2019-11-25 04:51:03 |
| 92.46.110.2 | attackbotsspam | Unauthorized connection attempt from IP address 92.46.110.2 on Port 445(SMB) |
2019-11-25 04:59:23 |
| 131.255.83.58 | attackbotsspam | Unauthorized connection attempt from IP address 131.255.83.58 on Port 445(SMB) |
2019-11-25 04:55:07 |