必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Gurugram

省份(region): Haryana

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.249.64.0 - 49.249.127.255'

% Abuse contact for '49.249.64.0 - 49.249.127.255' is 'ip.abuse@tatatel.co.in'

inetnum:        49.249.64.0 - 49.249.127.255
netname:        TATA-DOCOMO-IN
descr:          Tata Teleservices Limited -GSM Division
descr:          D 26/2 TTC INDUSTRIAL AREA MIDC SANPADA
descr:          PO TURBHE
descr:          NAVI MUMBAI
country:        IN
org:            ORG-TTLD1-AP
admin-c:        TTLN2-AP
tech-c:         TTLN2-AP
abuse-c:        AT1066-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TATA-DOCOMO-IN
mnt-routes:     MAINT-TATA-DOCOMO-IN
mnt-irt:        IRT-TATA-DOCOMO-IN
last-modified:  2020-08-11T13:06:54Z
source:         APNIC

irt:            IRT-TATA-DOCOMO-IN
address:        TATA TELESERVICES, D26, TTC IND AREA,
address:        MIDC SANPADA, TURBHE, NAVI MUMBAI
e-mail:         ip.abuse@tatatel.co.in
abuse-mailbox:  ip.abuse@tatatel.co.in
admin-c:        TTLN2-AP
tech-c:         TTLN2-AP
auth:           # Filtered
remarks:        ip.abuse@tatatel.co.in was validated on 2025-08-21
mnt-by:         MAINT-TATA-DOCOMO-IN
last-modified:  2025-11-18T00:26:19Z
source:         APNIC

organisation:   ORG-TTLD1-AP
org-name:       Tata Teleservices Limited -GSM Division
org-type:       LIR
country:        IN
address:        D-26, TTC INDUSTRIAL AREA MIDC SANPADA
address:        PO TURBHE
address:        NAVI MUMBAI
phone:          +91-22-66615168
e-mail:         karamjeet.singh@tatatel.co.in
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-10-17T12:56:14Z
source:         APNIC

role:           ABUSE TATADOCOMOIN
country:        ZZ
address:        TATA TELESERVICES, D26, TTC IND AREA,
address:        MIDC SANPADA, TURBHE, NAVI MUMBAI
phone:          +000000000
e-mail:         ip.abuse@tatatel.co.in
admin-c:        TTLN2-AP
tech-c:         TTLN2-AP
nic-hdl:        AT1066-AP
remarks:        Generated from irt object IRT-TATA-DOCOMO-IN
remarks:        ip.abuse@tatatel.co.in was validated on 2025-08-21
abuse-mailbox:  ip.abuse@tatatel.co.in
mnt-by:         APNIC-ABUSE
last-modified:  2025-08-21T14:46:48Z
source:         APNIC

role:           TATA TELESERVICES LIMITED    - Network Administrat
address:        D 26/2 TTC INDUSTRIAL AREA MIDC SANPADA PO TURBHE NAVI MUMBAI 400703
country:        IN
phone:          +91-22-67498428
fax-no:         +91 22 674838752
e-mail:         ip.abuse@tatatel.co.in
admin-c:        TTLN2-AP
tech-c:         TTLN2-AP
nic-hdl:        TTLN2-AP
mnt-by:         MAINT-TATA-DOCOMO-IN1
last-modified:  2016-10-21T05:26:36Z
source:         APNIC

% Information related to '49.249.77.0/24AS45820'

route:          49.249.77.0/24
origin:         AS45820
descr:          Tata Teleservices Limited -GSM Division
                D-26, TTC INDUSTRIAL AREA MIDC SANPADA
                PO TURBHE
                NAVI MUMBAI
mnt-by:         MAINT-TATA-DOCOMO-IN
last-modified:  2022-08-09T15:03:07Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.249.77.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.249.77.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012602 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 27 12:30:15 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
86.77.249.49.in-addr.arpa domain name pointer static-86.77.249.49-tataidc.co.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.77.249.49.in-addr.arpa	name = static-86.77.249.49-tataidc.co.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.0.225.34 attackspambots
X-Originating-IP: [193.0.225.34]
Received: from 10.220.163.139  (EHLO nessie.cs.ubbcluj.ro) (193.0.225.34)
  by mta4170.mail.ne1.yahoo.com with SMTP; Thu, 20 Feb 2020 11:31:37 +0000
Received: by nessie.cs.ubbcluj.ro (Postfix, from userid 48)
	id 722F2481781; Thu, 20 Feb 2020 13:31:20 +0200 (EET)
Received: from 86.98.216.234
        (SquirrelMail authenticated user pblaga)
        by www.cs.ubbcluj.ro with HTTP;
        Thu, 20 Feb 2020 13:31:20 +0200
Message-ID: <63e27939c016b7ce39c9fd6816f5e619.squirrel@www.cs.ubbcluj.ro>
Date: Thu, 20 Feb 2020 13:31:20 +0200
Subject: Hello Beautiful
From: "WILFRED" <7838@scarlet.be>
Reply-To: atiworks@yeah.net
User-Agent: SquirrelMail/1.4.22-5.el6
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
To: undisclosed-recipients:;
Content-Length: 225
2020-02-21 03:18:14
106.13.78.180 attack
Feb 20 14:23:14 mail sshd\[12348\]: Invalid user dev from 106.13.78.180
Feb 20 14:23:14 mail sshd\[12348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.180
Feb 20 14:23:15 mail sshd\[12348\]: Failed password for invalid user dev from 106.13.78.180 port 47746 ssh2
...
2020-02-21 03:22:31
59.56.226.180 attackbotsspam
Unauthorized connection attempt detected from IP address 59.56.226.180 to port 1433
2020-02-21 03:10:29
120.76.147.210 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-21 03:39:19
47.103.149.122 attackspam
Unauthorized IMAP connection attempt
2020-02-21 03:47:02
71.6.167.142 attack
Port 4782 scan denied
2020-02-21 03:32:15
185.176.27.98 attack
02/20/2020-13:57:56.080798 185.176.27.98 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-21 03:33:08
81.218.162.85 attackbotsspam
DATE:2020-02-20 14:20:37, IP:81.218.162.85, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-21 03:46:01
64.225.45.204 attack
suspicious action Thu, 20 Feb 2020 10:23:39 -0300
2020-02-21 03:08:42
220.249.48.242 attack
Feb 20 18:42:47 lnxmysql61 sshd[13433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.48.242
2020-02-21 03:43:03
61.32.154.211 attackbots
suspicious action Thu, 20 Feb 2020 10:23:33 -0300
2020-02-21 03:12:02
118.24.40.136 attackspambots
Feb 20 19:02:05 web1 sshd\[3332\]: Invalid user nx from 118.24.40.136
Feb 20 19:02:05 web1 sshd\[3332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.136
Feb 20 19:02:07 web1 sshd\[3332\]: Failed password for invalid user nx from 118.24.40.136 port 45524 ssh2
Feb 20 19:03:46 web1 sshd\[3358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.136  user=proxy
Feb 20 19:03:48 web1 sshd\[3358\]: Failed password for proxy from 118.24.40.136 port 53526 ssh2
2020-02-21 03:13:52
65.49.20.82 attackspambots
suspicious action Thu, 20 Feb 2020 10:22:54 -0300
2020-02-21 03:35:01
89.173.141.137 attackbotsspam
Feb 20 18:53:29 ift sshd\[42376\]: Invalid user server from 89.173.141.137Feb 20 18:53:31 ift sshd\[42376\]: Failed password for invalid user server from 89.173.141.137 port 59492 ssh2Feb 20 18:57:08 ift sshd\[43109\]: Invalid user HTTP from 89.173.141.137Feb 20 18:57:11 ift sshd\[43109\]: Failed password for invalid user HTTP from 89.173.141.137 port 60598 ssh2Feb 20 19:00:51 ift sshd\[44239\]: Failed password for daemon from 89.173.141.137 port 33472 ssh2
...
2020-02-21 03:28:42
223.196.161.79 attackbotsspam
1582204945 - 02/20/2020 14:22:25 Host: 223.196.161.79/223.196.161.79 Port: 445 TCP Blocked
2020-02-21 03:48:23

最近上报的IP列表

62.171.164.240 209.142.100.37 159.223.101.127 204.76.203.69
152.59.8.1 66.249.84.194 74.7.242.0 43.203.118.199
113.183.64.237 106.55.196.94 121.127.253.161 196.189.37.112
14.103.170.8 183.197.42.75 113.215.188.85 158.94.211.101
93.158.91.35 117.107.129.194 172.21.8.118 45.55.41.19