城市(city): Gurugram
省份(region): Haryana
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '49.249.64.0 - 49.249.127.255'
% Abuse contact for '49.249.64.0 - 49.249.127.255' is 'ip.abuse@tatatel.co.in'
inetnum: 49.249.64.0 - 49.249.127.255
netname: TATA-DOCOMO-IN
descr: Tata Teleservices Limited -GSM Division
descr: D 26/2 TTC INDUSTRIAL AREA MIDC SANPADA
descr: PO TURBHE
descr: NAVI MUMBAI
country: IN
org: ORG-TTLD1-AP
admin-c: TTLN2-AP
tech-c: TTLN2-AP
abuse-c: AT1066-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-TATA-DOCOMO-IN
mnt-routes: MAINT-TATA-DOCOMO-IN
mnt-irt: IRT-TATA-DOCOMO-IN
last-modified: 2020-08-11T13:06:54Z
source: APNIC
irt: IRT-TATA-DOCOMO-IN
address: TATA TELESERVICES, D26, TTC IND AREA,
address: MIDC SANPADA, TURBHE, NAVI MUMBAI
e-mail: ip.abuse@tatatel.co.in
abuse-mailbox: ip.abuse@tatatel.co.in
admin-c: TTLN2-AP
tech-c: TTLN2-AP
auth: # Filtered
remarks: ip.abuse@tatatel.co.in was validated on 2025-08-21
mnt-by: MAINT-TATA-DOCOMO-IN
last-modified: 2025-11-18T00:26:19Z
source: APNIC
organisation: ORG-TTLD1-AP
org-name: Tata Teleservices Limited -GSM Division
org-type: LIR
country: IN
address: D-26, TTC INDUSTRIAL AREA MIDC SANPADA
address: PO TURBHE
address: NAVI MUMBAI
phone: +91-22-66615168
e-mail: karamjeet.singh@tatatel.co.in
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-10-17T12:56:14Z
source: APNIC
role: ABUSE TATADOCOMOIN
country: ZZ
address: TATA TELESERVICES, D26, TTC IND AREA,
address: MIDC SANPADA, TURBHE, NAVI MUMBAI
phone: +000000000
e-mail: ip.abuse@tatatel.co.in
admin-c: TTLN2-AP
tech-c: TTLN2-AP
nic-hdl: AT1066-AP
remarks: Generated from irt object IRT-TATA-DOCOMO-IN
remarks: ip.abuse@tatatel.co.in was validated on 2025-08-21
abuse-mailbox: ip.abuse@tatatel.co.in
mnt-by: APNIC-ABUSE
last-modified: 2025-08-21T14:46:48Z
source: APNIC
role: TATA TELESERVICES LIMITED - Network Administrat
address: D 26/2 TTC INDUSTRIAL AREA MIDC SANPADA PO TURBHE NAVI MUMBAI 400703
country: IN
phone: +91-22-67498428
fax-no: +91 22 674838752
e-mail: ip.abuse@tatatel.co.in
admin-c: TTLN2-AP
tech-c: TTLN2-AP
nic-hdl: TTLN2-AP
mnt-by: MAINT-TATA-DOCOMO-IN1
last-modified: 2016-10-21T05:26:36Z
source: APNIC
% Information related to '49.249.77.0/24AS45820'
route: 49.249.77.0/24
origin: AS45820
descr: Tata Teleservices Limited -GSM Division
D-26, TTC INDUSTRIAL AREA MIDC SANPADA
PO TURBHE
NAVI MUMBAI
mnt-by: MAINT-TATA-DOCOMO-IN
last-modified: 2022-08-09T15:03:07Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.249.77.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.249.77.86. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012602 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 27 12:30:15 CST 2026
;; MSG SIZE rcvd: 105
86.77.249.49.in-addr.arpa domain name pointer static-86.77.249.49-tataidc.co.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
86.77.249.49.in-addr.arpa name = static-86.77.249.49-tataidc.co.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.0.225.34 | attackspambots | X-Originating-IP: [193.0.225.34]
Received: from 10.220.163.139 (EHLO nessie.cs.ubbcluj.ro) (193.0.225.34)
by mta4170.mail.ne1.yahoo.com with SMTP; Thu, 20 Feb 2020 11:31:37 +0000
Received: by nessie.cs.ubbcluj.ro (Postfix, from userid 48)
id 722F2481781; Thu, 20 Feb 2020 13:31:20 +0200 (EET)
Received: from 86.98.216.234
(SquirrelMail authenticated user pblaga)
by www.cs.ubbcluj.ro with HTTP;
Thu, 20 Feb 2020 13:31:20 +0200
Message-ID: <63e27939c016b7ce39c9fd6816f5e619.squirrel@www.cs.ubbcluj.ro>
Date: Thu, 20 Feb 2020 13:31:20 +0200
Subject: Hello Beautiful
From: "WILFRED" <7838@scarlet.be>
Reply-To: atiworks@yeah.net
User-Agent: SquirrelMail/1.4.22-5.el6
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
To: undisclosed-recipients:;
Content-Length: 225 |
2020-02-21 03:18:14 |
| 106.13.78.180 | attack | Feb 20 14:23:14 mail sshd\[12348\]: Invalid user dev from 106.13.78.180 Feb 20 14:23:14 mail sshd\[12348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.180 Feb 20 14:23:15 mail sshd\[12348\]: Failed password for invalid user dev from 106.13.78.180 port 47746 ssh2 ... |
2020-02-21 03:22:31 |
| 59.56.226.180 | attackbotsspam | Unauthorized connection attempt detected from IP address 59.56.226.180 to port 1433 |
2020-02-21 03:10:29 |
| 120.76.147.210 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-21 03:39:19 |
| 47.103.149.122 | attackspam | Unauthorized IMAP connection attempt |
2020-02-21 03:47:02 |
| 71.6.167.142 | attack | Port 4782 scan denied |
2020-02-21 03:32:15 |
| 185.176.27.98 | attack | 02/20/2020-13:57:56.080798 185.176.27.98 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-21 03:33:08 |
| 81.218.162.85 | attackbotsspam | DATE:2020-02-20 14:20:37, IP:81.218.162.85, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-02-21 03:46:01 |
| 64.225.45.204 | attack | suspicious action Thu, 20 Feb 2020 10:23:39 -0300 |
2020-02-21 03:08:42 |
| 220.249.48.242 | attack | Feb 20 18:42:47 lnxmysql61 sshd[13433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.249.48.242 |
2020-02-21 03:43:03 |
| 61.32.154.211 | attackbots | suspicious action Thu, 20 Feb 2020 10:23:33 -0300 |
2020-02-21 03:12:02 |
| 118.24.40.136 | attackspambots | Feb 20 19:02:05 web1 sshd\[3332\]: Invalid user nx from 118.24.40.136 Feb 20 19:02:05 web1 sshd\[3332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.136 Feb 20 19:02:07 web1 sshd\[3332\]: Failed password for invalid user nx from 118.24.40.136 port 45524 ssh2 Feb 20 19:03:46 web1 sshd\[3358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.136 user=proxy Feb 20 19:03:48 web1 sshd\[3358\]: Failed password for proxy from 118.24.40.136 port 53526 ssh2 |
2020-02-21 03:13:52 |
| 65.49.20.82 | attackspambots | suspicious action Thu, 20 Feb 2020 10:22:54 -0300 |
2020-02-21 03:35:01 |
| 89.173.141.137 | attackbotsspam | Feb 20 18:53:29 ift sshd\[42376\]: Invalid user server from 89.173.141.137Feb 20 18:53:31 ift sshd\[42376\]: Failed password for invalid user server from 89.173.141.137 port 59492 ssh2Feb 20 18:57:08 ift sshd\[43109\]: Invalid user HTTP from 89.173.141.137Feb 20 18:57:11 ift sshd\[43109\]: Failed password for invalid user HTTP from 89.173.141.137 port 60598 ssh2Feb 20 19:00:51 ift sshd\[44239\]: Failed password for daemon from 89.173.141.137 port 33472 ssh2 ... |
2020-02-21 03:28:42 |
| 223.196.161.79 | attackbotsspam | 1582204945 - 02/20/2020 14:22:25 Host: 223.196.161.79/223.196.161.79 Port: 445 TCP Blocked |
2020-02-21 03:48:23 |