Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Noida

Region: Uttar Pradesh

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.161.0.0 - 122.161.255.255'

% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'

inetnum:        122.161.0.0 - 122.161.255.255
netname:        ABTS-DSl-DEL
descr:          Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr:          Contact Person: DSL TAC
descr:          Email: DSLTAC2NORTH.UNOC@airtel.com
descr:          Phone:011-41612222
descr:          Date of allocation:15-JAN-07
country:        IN
geoloc:         28.549038 77.268795
admin-c:        DEL2-AP
tech-c:         DEL2-AP
abuse-c:        AB914-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-IN-TELEMEDIA
mnt-irt:        IRT-BHARTI-TELEMEDIA-IN
last-modified:  2021-03-31T13:02:48Z
source:         APNIC

irt:            IRT-BHARTI-TELEMEDIA-IN
address:        Bharti Airtel Ltd.
e-mail:         shankar.B@airtel.com
abuse-mailbox:  dsltac2north.unoc@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
auth:           # Filtered
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2026-02-03T23:14:59Z
source:         APNIC

role:           ABUSE BHARTITELEMEDIAIN
country:        ZZ
address:        Bharti Airtel Ltd.
phone:          +000000000
e-mail:         shankar.B@airtel.com
admin-c:        NS282-AP
tech-c:         NS282-AP
nic-hdl:        AB914-AP
remarks:        Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks:        dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks:        shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox:  dsltac2north.unoc@airtel.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-03T23:15:15Z
source:         APNIC

person:         Network Administrator for ABTS DEL
address:        Bharti Airtel Ltd. - TELEMEDIA Services
address:        224, Okhla Industrial Estate
address:        Phase III, New Delhi-110020
country:        IN
phone:          +91-11-41615533
e-mail:         dsl.noc@airtel.com
nic-hdl:        DEL2-AP
remarks:        --------------------------------------
remarks:        Send abuse reports to
remarks:        DSLTAC2NORTH.UNOC@airtel.com
remarks:        --------------------------------------
mnt-by:         MAINT-IN-TELEMEDIA
last-modified:  2015-11-05T05:17:08Z
source:         APNIC

% Information related to '122.161.69.0/24AS24560'

route:          122.161.69.0/24
descr:          BHARTI-IN
descr:          Bharti Tele-Ventures Limited
descr:          Class A ISP in INDIA .
descr:          234 , OKHLA PHASE III ,
descr:          NEW DELHI
descr:          INDIA
country:        IN
origin:         AS24560
mnt-by:         MAINT-IN-BBIL
last-modified:  2008-09-04T07:55:18Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.69.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.161.69.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 08:00:19 CST 2026
;; MSG SIZE  rcvd: 106
Host info
92.69.161.122.in-addr.arpa domain name pointer abts-north-dynamic-092.69.161.122.airtelbroadband.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.69.161.122.in-addr.arpa	name = abts-north-dynamic-092.69.161.122.airtelbroadband.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.149.9 attackbotsspam
Feb 20 01:43:16 plusreed sshd[23482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.9  user=mysql
Feb 20 01:43:18 plusreed sshd[23482]: Failed password for mysql from 206.189.149.9 port 45348 ssh2
...
2020-02-20 19:47:36
43.230.207.225 attack
Invalid user allan from 43.230.207.225 port 16264
2020-02-20 19:34:24
27.79.11.253 attackspam
firewall-block, port(s): 1433/tcp
2020-02-20 19:46:49
114.234.183.136 attackbots
Email rejected due to spam filtering
2020-02-20 19:26:13
202.141.230.122 attackbotsspam
Honeypot attack, port: 445, PTR: 202-141-230-122.multi.net.pk.
2020-02-20 19:31:42
14.232.152.1 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-20 19:43:38
203.107.133.228 attackbots
trying to access non-authorized port
2020-02-20 19:24:15
14.229.174.222 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-20 19:48:12
185.122.97.14 attackspambots
Unauthorized connection attempt detected from IP address 185.122.97.14 to port 445
2020-02-20 19:35:23
103.29.69.96 attackspambots
SIP/5060 Probe, BF, Hack -
2020-02-20 19:31:07
85.95.211.125 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-20 19:20:38
178.33.254.29 attack
02/20/2020-05:50:09.842809 178.33.254.29 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-20 19:36:12
185.153.196.80 attackspam
02/20/2020-02:47:19.261345 185.153.196.80 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-20 19:41:12
138.197.189.136 attackspam
Feb 20 12:12:49 ArkNodeAT sshd\[4782\]: Invalid user first from 138.197.189.136
Feb 20 12:12:49 ArkNodeAT sshd\[4782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136
Feb 20 12:12:51 ArkNodeAT sshd\[4782\]: Failed password for invalid user first from 138.197.189.136 port 33704 ssh2
2020-02-20 19:41:54
103.107.93.90 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 19:38:32

Recently Reported IPs

121.134.95.195 107.172.58.36 2606:4700:10::6814:4913 2606:4700:10::6814:5523
2606:4700:10::6814:9699 2606:4700:10::6816:2733 2606:4700:10::ac43:2818 164.155.74.159
211.104.7.243 110.78.158.147 2606:4700:10::6814:4878 2606:4700:10::6816:4922
2606:4700:10::6816:4268 2606:4700:10::6814:5606 2606:4700:10::6816:862 2606:4700:10::6814:7437
2606:4700:10::6814:4957 23.249.153.175 131.64.176.255 47.128.123.132