City: Jagdīshpur
Region: Uttar Pradesh
Country: India
Internet Service Provider: AirTel
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '106.205.64.0 - 106.205.127.255'
% Abuse contact for '106.205.64.0 - 106.205.127.255' is 'ip.misuse@airtel.com'
inetnum: 106.205.64.0 - 106.205.127.255
netname: JammuGPRS
descr: Bharti Airtel Jammu
country: IN
admin-c: NA40-AP
tech-c: NA40-AP
abuse-c: AB1077-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-IN-MOBILITY
mnt-irt: IRT-BHARTI-MO-IN
last-modified: 2021-01-06T04:45:24Z
source: APNIC
irt: IRT-BHARTI-MO-IN
address: Bharti Airtel Ltd.
address: Airtel Center, Plot No. 16 Udhyog Vihar
address: Gurgaon, India
e-mail: Rahul3.Jain@airtel.com
abuse-mailbox: ip.misuse@airtel.com
admin-c: RJ777-AP
tech-c: RJ777-AP
auth: # Filtered
remarks: ip.misuse@airtel.com is invalid
remarks: rahul3.jain@airtel.com was validated on 2025-09-05
mnt-by: MAINT-IN-MOBILITY
last-modified: 2025-11-18T00:26:32Z
source: APNIC
role: ABUSE BHARTIMOIN
country: ZZ
address: Bharti Airtel Ltd.
address: Airtel Center, Plot No. 16 Udhyog Vihar
address: Gurgaon, India
phone: +000000000
e-mail: Rahul3.Jain@airtel.com
admin-c: RJ777-AP
tech-c: RJ777-AP
nic-hdl: AB1077-AP
remarks: Generated from irt object IRT-BHARTI-MO-IN
remarks: ip.misuse@airtel.com is invalid
remarks: rahul3.jain@airtel.com was validated on 2025-09-05
abuse-mailbox: ip.misuse@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-05T03:38:28Z
source: APNIC
person: Network Administrator
nic-hdl: NA40-AP
e-mail: noc-dataprov@airtel.com
address: Bharti Airtel Ltd.
address: ISP Division - Transport Network Group
address: Plot no.16 , Udyog Vihar , Phase -IV , Gurgaon - 122015 , Haryana , INDIA
address: Phase III, New Delhi-110020, INDIA
phone: +91-0124 4282528
fax-no: +91-124-4244017
country: IN
mnt-by: MAINT-IN-BBIL
last-modified: 2026-03-19T10:53:18Z
source: APNIC
% Information related to '106.205.64.0/18AS45609'
route: 106.205.64.0/18
descr: GPRS-Subscribers-Jammu-Airtel
origin: AS45609
mnt-by: MAINT-IN-MOBILITY
last-modified: 2019-03-14T05:37:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.205.85.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.205.85.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032702 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 08:27:39 CST 2026
;; MSG SIZE rcvd: 106
Host 21.85.205.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.85.205.106.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.77.192.200 | attackbots | Chat Spam |
2019-09-23 19:21:54 |
| 221.227.0.125 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-09-23 18:07:55 |
| 51.77.156.240 | attack | Sep 22 19:55:36 wbs sshd\[3926\]: Invalid user oracle from 51.77.156.240 Sep 22 19:55:36 wbs sshd\[3926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=240.ip-51-77-156.eu Sep 22 19:55:38 wbs sshd\[3926\]: Failed password for invalid user oracle from 51.77.156.240 port 57134 ssh2 Sep 22 20:00:17 wbs sshd\[4392\]: Invalid user tester from 51.77.156.240 Sep 22 20:00:17 wbs sshd\[4392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=240.ip-51-77-156.eu |
2019-09-23 18:08:26 |
| 124.165.84.181 | attackspambots | $f2bV_matches |
2019-09-23 18:12:52 |
| 46.39.67.8 | attackspambots | Configuration snooping (/cgi-bin/ViewLog.asp): "POST 127.0.0.1:80/cgi-bin/ViewLog.asp" |
2019-09-23 18:55:27 |
| 131.196.7.234 | attackbotsspam | Sep 23 10:18:42 venus sshd\[5296\]: Invalid user moodle from 131.196.7.234 port 44677 Sep 23 10:18:42 venus sshd\[5296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.196.7.234 Sep 23 10:18:45 venus sshd\[5296\]: Failed password for invalid user moodle from 131.196.7.234 port 44677 ssh2 ... |
2019-09-23 18:23:00 |
| 78.128.113.77 | attackbots | Sep 23 10:13:14 relay postfix/smtpd\[7391\]: warning: unknown\[78.128.113.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 10:17:26 relay postfix/smtpd\[7391\]: warning: unknown\[78.128.113.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 10:17:35 relay postfix/smtpd\[7937\]: warning: unknown\[78.128.113.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 10:32:38 relay postfix/smtpd\[7937\]: warning: unknown\[78.128.113.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 10:32:49 relay postfix/smtpd\[7419\]: warning: unknown\[78.128.113.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-23 17:50:17 |
| 165.22.194.137 | attackspam | Sep 22 23:32:43 lcprod sshd\[16452\]: Invalid user wladis from 165.22.194.137 Sep 22 23:32:43 lcprod sshd\[16452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.194.137 Sep 22 23:32:45 lcprod sshd\[16452\]: Failed password for invalid user wladis from 165.22.194.137 port 50884 ssh2 Sep 22 23:37:16 lcprod sshd\[16826\]: Invalid user nasec from 165.22.194.137 Sep 22 23:37:16 lcprod sshd\[16826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.194.137 |
2019-09-23 18:03:08 |
| 196.41.122.39 | attackbotsspam | WordPress login Brute force / Web App Attack on client site. |
2019-09-23 18:51:48 |
| 85.110.139.144 | attack | Honeypot attack, port: 23, PTR: 85.110.139.144.static.ttnet.com.tr. |
2019-09-23 18:31:06 |
| 157.245.3.144 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-09-23 19:24:13 |
| 157.147.152.8 | attackbots | " " |
2019-09-23 19:26:14 |
| 153.35.123.27 | attackspam | Sep 23 02:25:10 TORMINT sshd\[13378\]: Invalid user vbox from 153.35.123.27 Sep 23 02:25:10 TORMINT sshd\[13378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.123.27 Sep 23 02:25:12 TORMINT sshd\[13378\]: Failed password for invalid user vbox from 153.35.123.27 port 60070 ssh2 ... |
2019-09-23 19:12:24 |
| 193.232.45.151 | attack | Sep 23 01:03:27 aiointranet sshd\[5601\]: Invalid user marketing from 193.232.45.151 Sep 23 01:03:27 aiointranet sshd\[5601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.232.45.151 Sep 23 01:03:29 aiointranet sshd\[5601\]: Failed password for invalid user marketing from 193.232.45.151 port 41286 ssh2 Sep 23 01:09:43 aiointranet sshd\[6239\]: Invalid user violeta from 193.232.45.151 Sep 23 01:09:43 aiointranet sshd\[6239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.232.45.151 |
2019-09-23 19:23:30 |
| 111.231.85.239 | attack | Sep 23 13:08:56 mail postfix/smtpd[31800]: warning: unknown[111.231.85.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 13:09:05 mail postfix/smtpd[31800]: warning: unknown[111.231.85.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 23 13:09:18 mail postfix/smtpd[31800]: warning: unknown[111.231.85.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-23 19:28:39 |