City: Noida
Region: Uttar Pradesh
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.161.0.0 - 122.161.255.255'
% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'
inetnum: 122.161.0.0 - 122.161.255.255
netname: ABTS-DSl-DEL
descr: Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr: Contact Person: DSL TAC
descr: Email: DSLTAC2NORTH.UNOC@airtel.com
descr: Phone:011-41612222
descr: Date of allocation:15-JAN-07
country: IN
geoloc: 28.549038 77.268795
admin-c: DEL2-AP
tech-c: DEL2-AP
abuse-c: AB914-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-IN-TELEMEDIA
mnt-irt: IRT-BHARTI-TELEMEDIA-IN
last-modified: 2021-03-31T13:02:48Z
source: APNIC
irt: IRT-BHARTI-TELEMEDIA-IN
address: Bharti Airtel Ltd.
e-mail: shankar.B@airtel.com
abuse-mailbox: dsltac2north.unoc@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
auth: # Filtered
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2026-02-03T23:14:59Z
source: APNIC
role: ABUSE BHARTITELEMEDIAIN
country: ZZ
address: Bharti Airtel Ltd.
phone: +000000000
e-mail: shankar.B@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
nic-hdl: AB914-AP
remarks: Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox: dsltac2north.unoc@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-03T23:15:15Z
source: APNIC
person: Network Administrator for ABTS DEL
address: Bharti Airtel Ltd. - TELEMEDIA Services
address: 224, Okhla Industrial Estate
address: Phase III, New Delhi-110020
country: IN
phone: +91-11-41615533
e-mail: dsl.noc@airtel.com
nic-hdl: DEL2-AP
remarks: --------------------------------------
remarks: Send abuse reports to
remarks: DSLTAC2NORTH.UNOC@airtel.com
remarks: --------------------------------------
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2015-11-05T05:17:08Z
source: APNIC
% Information related to '122.161.69.0/24AS24560'
route: 122.161.69.0/24
descr: BHARTI-IN
descr: Bharti Tele-Ventures Limited
descr: Class A ISP in INDIA .
descr: 234 , OKHLA PHASE III ,
descr: NEW DELHI
descr: INDIA
country: IN
origin: AS24560
mnt-by: MAINT-IN-BBIL
last-modified: 2008-09-04T07:55:18Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.69.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.161.69.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 08:00:19 CST 2026
;; MSG SIZE rcvd: 106
92.69.161.122.in-addr.arpa domain name pointer abts-north-dynamic-092.69.161.122.airtelbroadband.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
92.69.161.122.in-addr.arpa name = abts-north-dynamic-092.69.161.122.airtelbroadband.in.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 206.189.149.9 | attackbotsspam | Feb 20 01:43:16 plusreed sshd[23482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.9 user=mysql Feb 20 01:43:18 plusreed sshd[23482]: Failed password for mysql from 206.189.149.9 port 45348 ssh2 ... |
2020-02-20 19:47:36 |
| 43.230.207.225 | attack | Invalid user allan from 43.230.207.225 port 16264 |
2020-02-20 19:34:24 |
| 27.79.11.253 | attackspam | firewall-block, port(s): 1433/tcp |
2020-02-20 19:46:49 |
| 114.234.183.136 | attackbots | Email rejected due to spam filtering |
2020-02-20 19:26:13 |
| 202.141.230.122 | attackbotsspam | Honeypot attack, port: 445, PTR: 202-141-230-122.multi.net.pk. |
2020-02-20 19:31:42 |
| 14.232.152.1 | attackspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-20 19:43:38 |
| 203.107.133.228 | attackbots | trying to access non-authorized port |
2020-02-20 19:24:15 |
| 14.229.174.222 | attackbots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-20 19:48:12 |
| 185.122.97.14 | attackspambots | Unauthorized connection attempt detected from IP address 185.122.97.14 to port 445 |
2020-02-20 19:35:23 |
| 103.29.69.96 | attackspambots | SIP/5060 Probe, BF, Hack - |
2020-02-20 19:31:07 |
| 85.95.211.125 | attackspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-20 19:20:38 |
| 178.33.254.29 | attack | 02/20/2020-05:50:09.842809 178.33.254.29 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-02-20 19:36:12 |
| 185.153.196.80 | attackspam | 02/20/2020-02:47:19.261345 185.153.196.80 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-20 19:41:12 |
| 138.197.189.136 | attackspam | Feb 20 12:12:49 ArkNodeAT sshd\[4782\]: Invalid user first from 138.197.189.136 Feb 20 12:12:49 ArkNodeAT sshd\[4782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136 Feb 20 12:12:51 ArkNodeAT sshd\[4782\]: Failed password for invalid user first from 138.197.189.136 port 33704 ssh2 |
2020-02-20 19:41:54 |
| 103.107.93.90 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-20 19:38:32 |