City: Mumbai
Region: Maharashtra
Country: India
Internet Service Provider: AirTel
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '122.184.0.0 - 122.187.255.255'
% Abuse contact for '122.184.0.0 - 122.187.255.255' is 'ip.misuse@airtel.com'
inetnum: 122.184.0.0 - 122.187.255.255
netname: BHARTI-IN
descr: BHARTI Airtel Ltd.
descr: ISP Division ,AES - Carrier
descr: 234 , Okhala Phase III
descr: NEW DELHI
descr: INDIA
country: IN
org: ORG-BAL1-AP
admin-c: NA40-AP
tech-c: NA40-AP
abuse-c: AB913-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-IN-BBIL
mnt-routes: MAINT-IN-BBIL
mnt-irt: IRT-BHARTI-IN
last-modified: 2020-07-07T05:22:00Z
source: APNIC
irt: IRT-BHARTI-IN
address: Bharti Airtel Ltd.
address: ISP Division - Transport Network Group
address: 234 , Okhla Industrial Estate,
address: Phase III, New Delhi-110020, INDIA
e-mail: ip.misuse@airtel.com
abuse-mailbox: ip.misuse@airtel.com
admin-c: NA40-AP
tech-c: NA40-AP
auth: # Filtered
remarks: ip.misuse@airtel.com
remarks: ip.misuse@airtel.com is invalid
mnt-by: MAINT-IN-BBIL
last-modified: 2025-09-04T01:01:41Z
source: APNIC
organisation: ORG-BAL1-AP
org-name: Bharti Airtel Limited
org-type: LIR
country: IN
address: Transport Network Group
address: 234, Okhla Phase III
phone: +911244282398
e-mail: apnic@airtel.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:45Z
source: APNIC
role: ABUSE BHARTIIN
country: ZZ
address: Bharti Airtel Ltd.
address: ISP Division - Transport Network Group
address: 234 , Okhla Industrial Estate,
address: Phase III, New Delhi-110020, INDIA
phone: +000000000
e-mail: ip.misuse@airtel.com
admin-c: NA40-AP
tech-c: NA40-AP
nic-hdl: AB913-AP
remarks: Generated from irt object IRT-BHARTI-IN
remarks: ip.misuse@airtel.com is invalid
abuse-mailbox: ip.misuse@airtel.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-04T17:25:50Z
source: APNIC
person: Network Administrator
nic-hdl: NA40-AP
e-mail: noc-dataprov@airtel.com
address: Bharti Airtel Ltd.
address: ISP Division - Transport Network Group
address: Plot no.16 , Udyog Vihar , Phase -IV , Gurgaon - 122015 , Haryana , INDIA
address: Phase III, New Delhi-110020, INDIA
phone: +91-124-4222222
fax-no: +91-124-4244017
country: IN
mnt-by: MAINT-IN-BBIL
last-modified: 2018-12-18T12:52:19Z
source: APNIC
% Information related to '122.185.229.0/24AS9498'
route: 122.185.229.0/24
origin: AS9498
descr: Bharti Airtel Limited
Transport Network Group
234, Okhla Phase III
mnt-by: MAINT-IN-BBIL
last-modified: 2020-07-20T06:49:38Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.185.229.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.185.229.219. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092900 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 29 14:12:04 CST 2025
;; MSG SIZE rcvd: 108
b'219.229.185.122.in-addr.arpa domain name pointer nsg-corporate-219.229.185.122.airtel.in.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
219.229.185.122.in-addr.arpa name = nsg-corporate-219.229.185.122.airtel.in.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
220.142.59.87 | attackbotsspam | Port Scan detected! ... |
2020-06-14 01:10:57 |
218.90.138.98 | attackspam | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-14 01:37:45 |
115.153.15.12 | attackbotsspam | [Sat Jun 13 04:01:28 2020 GMT] gghbv@hotmail.com [RDNS_NONE], Subject: モミカ脆ア |
2020-06-14 01:36:04 |
96.8.121.32 | attackbots | 2020-06-13T10:25:14.0037031495-001 sshd[21832]: Failed password for invalid user admin from 96.8.121.32 port 56672 ssh2 2020-06-13T10:29:49.5246381495-001 sshd[22043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.8.121.32 user=root 2020-06-13T10:29:51.0997911495-001 sshd[22043]: Failed password for root from 96.8.121.32 port 52306 ssh2 2020-06-13T10:34:26.2167741495-001 sshd[22188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.8.121.32 user=root 2020-06-13T10:34:28.1530981495-001 sshd[22188]: Failed password for root from 96.8.121.32 port 47946 ssh2 2020-06-13T10:39:05.0757751495-001 sshd[22409]: Invalid user Iqadmin from 96.8.121.32 port 43590 ... |
2020-06-14 01:49:12 |
106.13.227.19 | attackspam | Unauthorized connection attempt detected from IP address 106.13.227.19 to port 4460 |
2020-06-14 01:53:46 |
200.8.44.42 | attackbots | Invalid user uvc from 200.8.44.42 port 38620 |
2020-06-14 01:43:03 |
137.74.197.94 | attackbotsspam | Automatic report - Banned IP Access |
2020-06-14 01:34:33 |
138.68.226.234 | attackspambots | sshd |
2020-06-14 01:43:34 |
201.148.87.82 | attackbots | 2020-06-13T17:03:57.145109shield sshd\[28283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx user=root 2020-06-13T17:03:58.982186shield sshd\[28283\]: Failed password for root from 201.148.87.82 port 1127 ssh2 2020-06-13T17:05:27.258105shield sshd\[28553\]: Invalid user zhengpinwen from 201.148.87.82 port 1993 2020-06-13T17:05:27.261789shield sshd\[28553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx 2020-06-13T17:05:29.799865shield sshd\[28553\]: Failed password for invalid user zhengpinwen from 201.148.87.82 port 1993 ssh2 |
2020-06-14 01:11:25 |
222.186.173.215 | attack | Jun 13 19:01:30 vmi345603 sshd[27121]: Failed password for root from 222.186.173.215 port 14708 ssh2 Jun 13 19:01:33 vmi345603 sshd[27121]: Failed password for root from 222.186.173.215 port 14708 ssh2 ... |
2020-06-14 01:13:15 |
89.187.178.203 | attackspam | (From lafleur.della@msn.com) Interested in the latest fitness , wellness, nutrition trends? Check out my blog here: https://bit.ly/www-fitnessismystatussymbol-com And my Instagram page @ziptofitness |
2020-06-14 01:16:35 |
35.243.184.92 | attackbotsspam | 10 attempts against mh-misc-ban on heat |
2020-06-14 01:28:10 |
37.49.224.230 | attackbotsspam | [Sat Jun 13 04:51:01 2020 GMT] John Kearley Esq |
2020-06-14 01:23:48 |
51.255.173.222 | attackbotsspam | SSH Brute-Force. Ports scanning. |
2020-06-14 01:12:00 |
138.197.89.212 | attackbots | Brute force attempt |
2020-06-14 01:32:59 |