City: Noida
Region: Uttar Pradesh
Country: India
Internet Service Provider: AirTel
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.161.0.0 - 122.161.255.255'
% Abuse contact for '122.161.0.0 - 122.161.255.255' is 'dsltac2north.unoc@airtel.com'
inetnum: 122.161.0.0 - 122.161.255.255
netname: ABTS-DSl-DEL
descr: Bharti Airtel Ltd.,224, Okhla industrial Area Phase III New Delhi
descr: Contact Person: DSL TAC
descr: Email: DSLTAC2NORTH.UNOC@airtel.com
descr: Phone:011-41612222
descr: Date of allocation:15-JAN-07
country: IN
geoloc: 28.549038 77.268795
admin-c: DEL2-AP
tech-c: DEL2-AP
abuse-c: AB914-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-IN-TELEMEDIA
mnt-irt: IRT-BHARTI-TELEMEDIA-IN
last-modified: 2021-03-31T13:02:48Z
source: APNIC
irt: IRT-BHARTI-TELEMEDIA-IN
address: Bharti Airtel Ltd.
e-mail: shankar.B@airtel.com
abuse-mailbox: dsltac2north.unoc@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
auth: # Filtered
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2026-02-03T23:14:59Z
source: APNIC
role: ABUSE BHARTITELEMEDIAIN
country: ZZ
address: Bharti Airtel Ltd.
phone: +000000000
e-mail: shankar.B@airtel.com
admin-c: NS282-AP
tech-c: NS282-AP
nic-hdl: AB914-AP
remarks: Generated from irt object IRT-BHARTI-TELEMEDIA-IN
remarks: dsltac2north.unoc@airtel.com was validated on 2025-12-04
remarks: shankar.b@airtel.com was validated on 2026-02-03
abuse-mailbox: dsltac2north.unoc@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-03T23:15:15Z
source: APNIC
person: Network Administrator for ABTS DEL
address: Bharti Airtel Ltd. - TELEMEDIA Services
address: 224, Okhla Industrial Estate
address: Phase III, New Delhi-110020
country: IN
phone: +91-11-41615533
e-mail: dsl.noc@airtel.com
nic-hdl: DEL2-AP
remarks: --------------------------------------
remarks: Send abuse reports to
remarks: DSLTAC2NORTH.UNOC@airtel.com
remarks: --------------------------------------
mnt-by: MAINT-IN-TELEMEDIA
last-modified: 2015-11-05T05:17:08Z
source: APNIC
% Information related to '122.161.78.0/24AS24560'
route: 122.161.78.0/24
descr: BHARTI-IN
descr: Bharti Tele-Ventures Limited
descr: Class A ISP in INDIA .
descr: 234 , OKHLA PHASE III ,
descr: NEW DELHI
descr: INDIA
country: IN
origin: AS24560
mnt-by: MAINT-IN-BBIL
last-modified: 2008-09-04T07:55:18Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.78.251
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.161.78.251. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 10:30:20 CST 2026
;; MSG SIZE rcvd: 107
251.78.161.122.in-addr.arpa domain name pointer abts-north-dynamic-251.78.161.122.airtelbroadband.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
251.78.161.122.in-addr.arpa name = abts-north-dynamic-251.78.161.122.airtelbroadband.in.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.88.112.69 | attack | Jun 15 03:50:01 dns1 sshd[6263]: Failed password for root from 49.88.112.69 port 22754 ssh2 Jun 15 03:50:06 dns1 sshd[6263]: Failed password for root from 49.88.112.69 port 22754 ssh2 Jun 15 03:50:10 dns1 sshd[6263]: Failed password for root from 49.88.112.69 port 22754 ssh2 |
2020-06-15 14:53:52 |
| 181.59.252.136 | attackspambots | SSH Bruteforce attack |
2020-06-15 15:28:21 |
| 119.235.19.66 | attack | (sshd) Failed SSH login from 119.235.19.66 (ID/Indonesia/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 15 08:45:14 ubnt-55d23 sshd[28513]: Invalid user alfredo from 119.235.19.66 port 33151 Jun 15 08:45:16 ubnt-55d23 sshd[28513]: Failed password for invalid user alfredo from 119.235.19.66 port 33151 ssh2 |
2020-06-15 15:09:20 |
| 49.145.196.254 | attack | Unauthorized connection attempt from IP address 49.145.196.254 on Port 445(SMB) |
2020-06-15 15:17:30 |
| 218.92.0.220 | attackspambots | Jun 15 09:24:37 v22018053744266470 sshd[17320]: Failed password for root from 218.92.0.220 port 20171 ssh2 Jun 15 09:24:47 v22018053744266470 sshd[17330]: Failed password for root from 218.92.0.220 port 51646 ssh2 ... |
2020-06-15 15:38:25 |
| 117.34.99.31 | attack | Jun 15 05:53:11 cp sshd[4411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.99.31 |
2020-06-15 15:23:32 |
| 192.42.116.27 | attackspam | Jun 15 08:20:13 mout sshd[19333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.27 Jun 15 08:20:13 mout sshd[19333]: Invalid user oracle from 192.42.116.27 port 34570 Jun 15 08:20:15 mout sshd[19333]: Failed password for invalid user oracle from 192.42.116.27 port 34570 ssh2 |
2020-06-15 15:15:53 |
| 122.51.214.44 | attackspambots | Jun 15 06:48:41 mail sshd[7941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.214.44 Jun 15 06:48:43 mail sshd[7941]: Failed password for invalid user oracle from 122.51.214.44 port 50890 ssh2 ... |
2020-06-15 14:58:21 |
| 138.68.106.62 | attack | Jun 14 23:36:58 pixelmemory sshd[1485085]: Failed password for root from 138.68.106.62 port 48970 ssh2 Jun 14 23:40:12 pixelmemory sshd[1491073]: Invalid user niki from 138.68.106.62 port 50206 Jun 14 23:40:12 pixelmemory sshd[1491073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.106.62 Jun 14 23:40:12 pixelmemory sshd[1491073]: Invalid user niki from 138.68.106.62 port 50206 Jun 14 23:40:14 pixelmemory sshd[1491073]: Failed password for invalid user niki from 138.68.106.62 port 50206 ssh2 ... |
2020-06-15 15:11:14 |
| 144.217.77.27 | attackspambots | [2020-06-15 02:46:12] NOTICE[1273][C-000011a0] chan_sip.c: Call from '' (144.217.77.27:8384) to extension '96000441519460088' rejected because extension not found in context 'public'. [2020-06-15 02:46:12] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-15T02:46:12.263-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="96000441519460088",SessionID="0x7f31c02f7128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/144.217.77.27/8384",ACLName="no_extension_match" [2020-06-15 02:48:59] NOTICE[1273][C-000011a2] chan_sip.c: Call from '' (144.217.77.27:8623) to extension '961441519460088' rejected because extension not found in context 'public'. [2020-06-15 02:48:59] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-15T02:48:59.834-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="961441519460088",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP ... |
2020-06-15 15:04:14 |
| 175.172.178.59 | attackspambots | Jun 15 09:10:12 server sshd[23137]: Failed password for root from 175.172.178.59 port 47504 ssh2 Jun 15 09:12:49 server sshd[23253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.172.178.59 Jun 15 09:12:51 server sshd[23253]: Failed password for invalid user pgsql from 175.172.178.59 port 52842 ssh2 ... |
2020-06-15 15:20:35 |
| 200.73.130.241 | attack | Jun 15 07:26:19 rush sshd[21253]: Failed password for root from 200.73.130.241 port 39172 ssh2 Jun 15 07:28:18 rush sshd[21294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.130.241 Jun 15 07:28:20 rush sshd[21294]: Failed password for invalid user webadmin from 200.73.130.241 port 38850 ssh2 ... |
2020-06-15 15:31:37 |
| 104.248.71.7 | attackspambots | 2020-06-15T03:49:31.150940dmca.cloudsearch.cf sshd[9593]: Invalid user wp from 104.248.71.7 port 54534 2020-06-15T03:49:31.156537dmca.cloudsearch.cf sshd[9593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 2020-06-15T03:49:31.150940dmca.cloudsearch.cf sshd[9593]: Invalid user wp from 104.248.71.7 port 54534 2020-06-15T03:49:33.708434dmca.cloudsearch.cf sshd[9593]: Failed password for invalid user wp from 104.248.71.7 port 54534 ssh2 2020-06-15T03:53:05.382633dmca.cloudsearch.cf sshd[10077]: Invalid user ec2-user from 104.248.71.7 port 52528 2020-06-15T03:53:05.388026dmca.cloudsearch.cf sshd[10077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 2020-06-15T03:53:05.382633dmca.cloudsearch.cf sshd[10077]: Invalid user ec2-user from 104.248.71.7 port 52528 2020-06-15T03:53:07.317751dmca.cloudsearch.cf sshd[10077]: Failed password for invalid user ec2-user from 104.248.71.7 port 525 ... |
2020-06-15 15:27:00 |
| 113.161.25.9 | attackspam | Unauthorized IMAP connection attempt |
2020-06-15 15:03:09 |
| 51.38.65.175 | attack | Invalid user yoshiaki from 51.38.65.175 port 36576 |
2020-06-15 14:55:08 |