City: unknown
Region: unknown
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.64.0.0 - 219.65.255.255'
% Abuse contact for '219.64.0.0 - 219.65.255.255' is '4755abuse@tatacommunications.com'
inetnum: 219.64.0.0 - 219.65.255.255
netname: TATACOMM-IN
descr: Internet Service Provider
descr: TATA Communications formerly VSNL is Leading ISP,
descr: Data and Voice Carrier in India
country: IN
org: ORG-TCL6-AP
admin-c: TC651-AP
tech-c: TC651-AP
abuse-c: AT1356-AP
status: ALLOCATED PORTABLE
remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be modified by APNIC hostmaster
remarks: If you wish to modify this object details please
remarks: send email to hostmaster@apnic.net with your organisation
remarks: account name in the subject line.
remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by: APNIC-HM
mnt-lower: MAINT-TATACOMM-IN
mnt-routes: MAINT-TATACOMM-IN
mnt-irt: IRT-TATACOMM-IN
last-modified: 2020-12-08T14:35:53Z
source: APNIC
irt: IRT-TATACOMM-IN
address: 6th Floor, LVSB, VSNL
address: Kashinath Dhuru marg, Prabhadevi
address: Dadar(W), Mumbai 400028
address: India
e-mail: ip.admin@tatacommunications.com
abuse-mailbox: 4755abuse@tatacommunications.com
admin-c: IA15-AP
tech-c: IA15-AP
auth: # Filtered
remarks: ip.admin@tatacommunications.com was validated on 2026-02-17
remarks: 4755abuse@tatacommunications.com was validated on 2026-02-17
mnt-by: MAINT-TATACOMM-IN
last-modified: 2026-02-17T10:21:33Z
source: APNIC
organisation: ORG-TCL6-AP
org-name: Tata Communications Limited
org-type: LIR
country: IN
address: Customer Service & Operations
address: Plot Nos. C-21 & C-36
address: 'G' Block, Bandra Kurla Complex,
phone: +91-22-66502826
fax-no: +91-22-66502039
e-mail: ip-addr@tatacommunications.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:43Z
source: APNIC
role: ABUSE TATACOMMIN
country: ZZ
address: 6th Floor, LVSB, VSNL
address: Kashinath Dhuru marg, Prabhadevi
address: Dadar(W), Mumbai 400028
address: India
phone: +000000000
e-mail: ip.admin@tatacommunications.com
admin-c: IA15-AP
tech-c: IA15-AP
nic-hdl: AT1356-AP
remarks: Generated from irt object IRT-TATACOMM-IN
remarks: ip.admin@tatacommunications.com was validated on 2026-02-17
remarks: 4755abuse@tatacommunications.com was validated on 2026-02-17
abuse-mailbox: 4755abuse@tatacommunications.com
mnt-by: APNIC-ABUSE
last-modified: 2026-02-17T10:21:44Z
source: APNIC
role: TATA Communications
nic-hdl: TC651-AP
address: 6th Floor,A Tower, BKC
address: Plot Nos. C-21 & C-36
address: 'G' Block, Bandra Kurla Complex, Mumbai
phone: +91-020-66357160
country: IN
e-mail: ip.admin@tatacommunications.com
admin-c: IA15-AP
tech-c: VT43-AP
mnt-by: MAINT-TATACOMM-IN
last-modified: 2024-10-25T08:12:54Z
source: APNIC
% Information related to '219.65.245.0/24AS17908'
route: 219.65.245.0/24
descr: Route to TCISL
origin: AS17908
mnt-by: MAINT-TATACOMM-IN
last-modified: 2008-10-20T08:45:51Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.65.245.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.65.245.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041402 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 07:21:17 CST 2026
;; MSG SIZE rcvd: 107
130.245.65.219.in-addr.arpa domain name pointer 219.65.245.130.static.vsnl.net.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.245.65.219.in-addr.arpa name = 219.65.245.130.static.vsnl.net.in.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.220 | attack | Jul 6 20:53:13 itv-usvr-02 sshd[12794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=root Jul 6 20:53:15 itv-usvr-02 sshd[12794]: Failed password for root from 218.92.0.220 port 55791 ssh2 |
2020-07-06 21:56:13 |
| 222.186.190.14 | attackbotsspam | $f2bV_matches |
2020-07-06 22:33:52 |
| 222.186.180.41 | attackbots | Jul 6 16:10:40 vps sshd[535016]: Failed password for root from 222.186.180.41 port 52552 ssh2 Jul 6 16:10:44 vps sshd[535016]: Failed password for root from 222.186.180.41 port 52552 ssh2 Jul 6 16:10:47 vps sshd[535016]: Failed password for root from 222.186.180.41 port 52552 ssh2 Jul 6 16:10:51 vps sshd[535016]: Failed password for root from 222.186.180.41 port 52552 ssh2 Jul 6 16:10:54 vps sshd[535016]: Failed password for root from 222.186.180.41 port 52552 ssh2 ... |
2020-07-06 22:14:15 |
| 45.125.65.52 | attack | 2020-07-06 17:14:59 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=sistemas\)2020-07-06 17:20:33 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=smtp\)2020-07-06 17:21:55 dovecot_login authenticator failed for \(User\) \[45.125.65.52\]: 535 Incorrect authentication data \(set_id=sports@ift.org.ua\) ... |
2020-07-06 22:26:02 |
| 152.136.189.81 | attackspambots | Jul 6 10:02:51 ny01 sshd[26821]: Failed password for invalid user chen from 152.136.189.81 port 50860 ssh2 Jul 6 10:07:50 ny01 sshd[27946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.189.81 Jul 6 10:07:52 ny01 sshd[27946]: Failed password for invalid user grafana from 152.136.189.81 port 39494 ssh2 |
2020-07-06 22:21:29 |
| 37.187.73.206 | attackspambots | Automatic report - Banned IP Access |
2020-07-06 22:02:57 |
| 51.254.220.61 | attack | Jul 6 15:31:27 ns382633 sshd\[9560\]: Invalid user a1 from 51.254.220.61 port 46464 Jul 6 15:31:27 ns382633 sshd\[9560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.61 Jul 6 15:31:29 ns382633 sshd\[9560\]: Failed password for invalid user a1 from 51.254.220.61 port 46464 ssh2 Jul 6 15:40:54 ns382633 sshd\[11266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.61 user=root Jul 6 15:40:56 ns382633 sshd\[11266\]: Failed password for root from 51.254.220.61 port 38809 ssh2 |
2020-07-06 22:01:56 |
| 182.61.27.149 | attack | Jul 6 15:42:59 lnxweb62 sshd[3077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149 |
2020-07-06 22:17:02 |
| 75.88.133.135 | attack | Automatic report - Port Scan Attack |
2020-07-06 21:55:11 |
| 93.107.187.162 | attackspam | Jul 6 13:59:20 bchgang sshd[2374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162 Jul 6 13:59:22 bchgang sshd[2374]: Failed password for invalid user marketing from 93.107.187.162 port 43282 ssh2 Jul 6 14:02:37 bchgang sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162 ... |
2020-07-06 22:15:32 |
| 196.52.84.27 | attackspambots | Russian criminal botnet. |
2020-07-06 22:05:26 |
| 193.186.15.35 | attack | Jul 6 14:10:59 rush sshd[20577]: Failed password for root from 193.186.15.35 port 38259 ssh2 Jul 6 14:14:15 rush sshd[20634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.186.15.35 Jul 6 14:14:17 rush sshd[20634]: Failed password for invalid user tobias from 193.186.15.35 port 35983 ssh2 ... |
2020-07-06 22:35:42 |
| 5.135.177.5 | attack | WordPress login Brute force / Web App Attack on client site. |
2020-07-06 22:17:25 |
| 223.247.219.165 | attackbotsspam | Jul 6 14:10:39 game-panel sshd[13827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.219.165 user=ftpuser Jul 6 14:10:41 game-panel sshd[13827]: Failed password for invalid user ftpuser from 223.247.219.165 port 57220 ssh2 Jul 6 14:13:39 game-panel sshd[13987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.219.165 |
2020-07-06 22:16:18 |
| 222.186.175.215 | attack | Jul 6 16:29:04 piServer sshd[23545]: Failed password for root from 222.186.175.215 port 6848 ssh2 Jul 6 16:29:09 piServer sshd[23545]: Failed password for root from 222.186.175.215 port 6848 ssh2 Jul 6 16:29:13 piServer sshd[23545]: Failed password for root from 222.186.175.215 port 6848 ssh2 Jul 6 16:29:18 piServer sshd[23545]: Failed password for root from 222.186.175.215 port 6848 ssh2 ... |
2020-07-06 22:30:14 |