Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mumbai

Region: Maharashtra

Country: India

Internet Service Provider: AirTel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '122.184.0.0 - 122.187.255.255'

% Abuse contact for '122.184.0.0 - 122.187.255.255' is 'ip.misuse@airtel.com'

inetnum:        122.184.0.0 - 122.187.255.255
netname:        BHARTI-IN
descr:          BHARTI Airtel Ltd.
descr:          ISP Division ,AES - Carrier
descr:          234 , Okhala Phase III
descr:          NEW DELHI
descr:          INDIA
country:        IN
org:            ORG-BAL1-AP
admin-c:        NA40-AP
tech-c:         NA40-AP
abuse-c:        AB913-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-IN-BBIL
mnt-routes:     MAINT-IN-BBIL
mnt-irt:        IRT-BHARTI-IN
last-modified:  2020-07-07T05:22:00Z
source:         APNIC

irt:            IRT-BHARTI-IN
address:        Bharti Airtel Ltd.
address:        ISP Division - Transport Network Group
address:        234 , Okhla Industrial Estate,
address:        Phase III, New Delhi-110020, INDIA
e-mail:         ip.misuse@airtel.com
abuse-mailbox:  ip.misuse@airtel.com
admin-c:        NA40-AP
tech-c:         NA40-AP
auth:           # Filtered
remarks:        ip.misuse@airtel.com
remarks:        ip.misuse@airtel.com is invalid
mnt-by:         MAINT-IN-BBIL
last-modified:  2025-09-04T01:01:41Z
source:         APNIC

organisation:   ORG-BAL1-AP
org-name:       Bharti Airtel Limited
org-type:       LIR
country:        IN
address:        Transport Network Group
address:        234, Okhla Phase III
phone:          +911244282398
e-mail:         apnic@airtel.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:45Z
source:         APNIC

role:           ABUSE BHARTIIN
country:        ZZ
address:        Bharti Airtel Ltd.
address:        ISP Division - Transport Network Group
address:        234 , Okhla Industrial Estate,
address:        Phase III, New Delhi-110020, INDIA
phone:          +000000000
e-mail:         ip.misuse@airtel.com
admin-c:        NA40-AP
tech-c:         NA40-AP
nic-hdl:        AB913-AP
remarks:        Generated from irt object IRT-BHARTI-IN
remarks:        ip.misuse@airtel.com is invalid
abuse-mailbox:  ip.misuse@airtel.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T17:25:50Z
source:         APNIC

person:         Network Administrator
nic-hdl:        NA40-AP
e-mail:         noc-dataprov@airtel.com
address:        Bharti Airtel Ltd.
address:        ISP Division - Transport Network Group
address:        Plot no.16 , Udyog Vihar , Phase -IV , Gurgaon - 122015 , Haryana , INDIA
address:        Phase III, New Delhi-110020, INDIA
phone:          +91-124-4222222
fax-no:         +91-124-4244017
country:        IN
mnt-by:         MAINT-IN-BBIL
last-modified:  2018-12-18T12:52:19Z
source:         APNIC

% Information related to '122.185.229.0/24AS9498'

route:          122.185.229.0/24
origin:         AS9498
descr:          Bharti Airtel Limited
                Transport Network Group
                234, Okhla Phase III
mnt-by:         MAINT-IN-BBIL
last-modified:  2020-07-20T06:49:38Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.185.229.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.185.229.219.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 29 14:12:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'219.229.185.122.in-addr.arpa domain name pointer nsg-corporate-219.229.185.122.airtel.in.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.229.185.122.in-addr.arpa	name = nsg-corporate-219.229.185.122.airtel.in.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
220.142.59.87 attackbotsspam
Port Scan detected!
...
2020-06-14 01:10:57
218.90.138.98 attackspam
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-14 01:37:45
115.153.15.12 attackbotsspam
[Sat Jun 13 04:01:28 2020 GMT] gghbv@hotmail.com [RDNS_NONE], Subject: モミカ脆ア
2020-06-14 01:36:04
96.8.121.32 attackbots
2020-06-13T10:25:14.0037031495-001 sshd[21832]: Failed password for invalid user admin from 96.8.121.32 port 56672 ssh2
2020-06-13T10:29:49.5246381495-001 sshd[22043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.8.121.32  user=root
2020-06-13T10:29:51.0997911495-001 sshd[22043]: Failed password for root from 96.8.121.32 port 52306 ssh2
2020-06-13T10:34:26.2167741495-001 sshd[22188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.8.121.32  user=root
2020-06-13T10:34:28.1530981495-001 sshd[22188]: Failed password for root from 96.8.121.32 port 47946 ssh2
2020-06-13T10:39:05.0757751495-001 sshd[22409]: Invalid user Iqadmin from 96.8.121.32 port 43590
...
2020-06-14 01:49:12
106.13.227.19 attackspam
Unauthorized connection attempt detected from IP address 106.13.227.19 to port 4460
2020-06-14 01:53:46
200.8.44.42 attackbots
Invalid user uvc from 200.8.44.42 port 38620
2020-06-14 01:43:03
137.74.197.94 attackbotsspam
Automatic report - Banned IP Access
2020-06-14 01:34:33
138.68.226.234 attackspambots
sshd
2020-06-14 01:43:34
201.148.87.82 attackbots
2020-06-13T17:03:57.145109shield sshd\[28283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx  user=root
2020-06-13T17:03:58.982186shield sshd\[28283\]: Failed password for root from 201.148.87.82 port 1127 ssh2
2020-06-13T17:05:27.258105shield sshd\[28553\]: Invalid user zhengpinwen from 201.148.87.82 port 1993
2020-06-13T17:05:27.261789shield sshd\[28553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx
2020-06-13T17:05:29.799865shield sshd\[28553\]: Failed password for invalid user zhengpinwen from 201.148.87.82 port 1993 ssh2
2020-06-14 01:11:25
222.186.173.215 attack
Jun 13 19:01:30 vmi345603 sshd[27121]: Failed password for root from 222.186.173.215 port 14708 ssh2
Jun 13 19:01:33 vmi345603 sshd[27121]: Failed password for root from 222.186.173.215 port 14708 ssh2
...
2020-06-14 01:13:15
89.187.178.203 attackspam
(From lafleur.della@msn.com) Interested in the latest fitness , wellness, nutrition trends?

Check out my blog here: https://bit.ly/www-fitnessismystatussymbol-com

And my Instagram page @ziptofitness
2020-06-14 01:16:35
35.243.184.92 attackbotsspam
10 attempts against mh-misc-ban on heat
2020-06-14 01:28:10
37.49.224.230 attackbotsspam
[Sat Jun 13 04:51:01 2020 GMT] John Kearley Esq  [RDNS_NONE,FREEMAIL_FORGED_REPLYTO], Subject: xxxx@xxxx.com Formal Notice 06/09/2020
2020-06-14 01:23:48
51.255.173.222 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-06-14 01:12:00
138.197.89.212 attackbots
Brute force attempt
2020-06-14 01:32:59

Recently Reported IPs

47.103.155.228 109.199.114.251 159.138.183.180 159.138.183.49
79.165.122.41 194.187.176.149 183.7.150.159 85.208.84.67
183.7.150.191 176.65.148.188 183.232.57.242 87.121.84.24
60.255.228.170 106.225.155.159 125.42.64.40 115.60.149.80
113.2.156.208 10.93.106.236 101.24.136.11 115.171.23.107