City: Chennai
Region: Tamil Nadu
Country: India
Internet Service Provider: Vi India
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '42.108.0.0 - 42.111.255.255'
% Abuse contact for '42.108.0.0 - 42.111.255.255' is 'vilapnicspoc@vodafoneidea.com'
inetnum: 42.108.0.0 - 42.111.255.255
netname: VIL-IN
descr: Vodafone Idea Ltd
country: IN
org: ORG-VIL2-AP
admin-c: VAS1-AP
tech-c: VAS1-AP
status: ALLOCATED PORTABLE
abuse-c: AV319-AP
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-VIL-IN
mnt-routes: MAINT-VIL-IN
mnt-irt: IRT-VIL-IN
last-modified: 2023-03-22T04:44:16Z
source: APNIC
irt: IRT-VIL-IN
address: Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone: +919619218372
e-mail: saji.samuel@vodafoneidea.com
abuse-mailbox: vilapnicspoc@vodafoneidea.com
admin-c: VAS1-AP
tech-c: VAS1-AP
auth: # Filtered
remarks: saji.samuel@vodafoneidea.com
remarks: saji.samuel@vodafoneidea.com
remarks: saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks: vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
mnt-by: MAINT-VIL-IN
last-modified: 2026-01-21T10:29:12Z
source: APNIC
organisation: ORG-VIL2-AP
org-name: Vodafone Idea Ltd. (VIL)
org-type: LIR
country: IN
address: 10th Flr,Birla Centurion,Pandurkar Bhudkar Marg,Prabhadevi
phone: +91-9819-81-83-79
e-mail: snoctx.helpdesk@vodafoneidea.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:17:42Z
source: APNIC
role: ABUSE VILIN
country: ZZ
address: Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone: +919619218372
e-mail: saji.samuel@vodafoneidea.com
admin-c: VAS1-AP
tech-c: VAS1-AP
nic-hdl: AV319-AP
remarks: Generated from irt object IRT-VIL-IN
remarks: saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks: vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
abuse-mailbox: vilapnicspoc@vodafoneidea.com
mnt-by: APNIC-ABUSE
last-modified: 2026-01-21T10:41:35Z
source: APNIC
person: VIL APNIC SCOPE
address: 10th Flr,Birla Centurion,Pandurkar Bhudkar Marg,Prabhadevi, Mumbai Maharashtra 400030
country: IN
phone: +912071102509
e-mail: vilapnicspoc@vodafoneidea.com
nic-hdl: VAS1-AP
mnt-by: MAINT-VIL-IN
last-modified: 2024-01-31T10:08:35Z
source: APNIC
% Information related to '42.111.136.0/22AS38266'
route: 42.111.136.0/22
origin: AS38266
descr: Hutchison Max Telecom Limited
Vodafone India Ltd.
414/2, Sahas Building
Off Veer Savarkar Marg,
Prabhadevi,
mnt-by: MAINT-VIL-IN
last-modified: 2023-03-22T05:27:44Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.111.136.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.111.136.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040802 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 08:36:09 CST 2026
;; MSG SIZE rcvd: 106
Host 71.136.111.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 71.136.111.42.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.142.120.89 | attackspambots | 2020-09-04 08:27:08 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=accounts@org.ua\)2020-09-04 08:27:40 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=purchase@org.ua\)2020-09-04 08:28:17 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=thumbs@org.ua\) ... |
2020-09-04 13:32:08 |
| 49.235.147.233 | attackspam | Sep 3 23:48:57 rancher-0 sshd[1429337]: Invalid user avinash from 49.235.147.233 port 45244 Sep 3 23:49:00 rancher-0 sshd[1429337]: Failed password for invalid user avinash from 49.235.147.233 port 45244 ssh2 ... |
2020-09-04 13:02:56 |
| 134.175.129.58 | attack | Invalid user courses from 134.175.129.58 port 28565 |
2020-09-04 13:27:58 |
| 147.91.31.52 | attack | As always with Serbia /Wp-login.php /wp-admin.php |
2020-09-04 13:17:53 |
| 112.85.42.94 | attack | Sep 4 08:08:37 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep 4 08:08:39 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep 4 08:08:41 pkdns2 sshd\[63392\]: Failed password for root from 112.85.42.94 port 45113 ssh2Sep 4 08:11:23 pkdns2 sshd\[63606\]: Failed password for root from 112.85.42.94 port 44530 ssh2Sep 4 08:13:13 pkdns2 sshd\[63715\]: Failed password for root from 112.85.42.94 port 27455 ssh2Sep 4 08:14:09 pkdns2 sshd\[63771\]: Failed password for root from 112.85.42.94 port 54553 ssh2 ... |
2020-09-04 13:15:35 |
| 51.210.44.194 | attack | Sep 3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194 Sep 3 21:32:59 h2646465 sshd[20786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194 Sep 3 21:32:59 h2646465 sshd[20786]: Invalid user test from 51.210.44.194 Sep 3 21:33:01 h2646465 sshd[20786]: Failed password for invalid user test from 51.210.44.194 port 57892 ssh2 Sep 3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194 Sep 3 21:49:12 h2646465 sshd[22852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.44.194 Sep 3 21:49:12 h2646465 sshd[22852]: Invalid user zhs from 51.210.44.194 Sep 3 21:49:13 h2646465 sshd[22852]: Failed password for invalid user zhs from 51.210.44.194 port 59090 ssh2 Sep 3 21:53:57 h2646465 sshd[23463]: Invalid user praveen from 51.210.44.194 ... |
2020-09-04 12:59:25 |
| 112.116.155.205 | attackbots |
|
2020-09-04 12:53:00 |
| 177.102.239.107 | attackbotsspam | Sep 3 18:49:39 mellenthin postfix/smtpd[20369]: NOQUEUE: reject: RCPT from unknown[177.102.239.107]: 554 5.7.1 Service unavailable; Client host [177.102.239.107] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/177.102.239.107; from= |
2020-09-04 13:25:41 |
| 185.220.101.203 | attackbots | $lgm |
2020-09-04 13:11:50 |
| 164.132.44.218 | attack | Invalid user magno from 164.132.44.218 port 46769 |
2020-09-04 13:08:08 |
| 117.211.192.70 | attack | *Port Scan* detected from 117.211.192.70 (IN/India/Karnataka/Bengaluru/-). 4 hits in the last 140 seconds |
2020-09-04 12:53:28 |
| 201.209.143.220 | attackbots | 1599151790 - 09/03/2020 18:49:50 Host: 201.209.143.220/201.209.143.220 Port: 445 TCP Blocked |
2020-09-04 13:11:30 |
| 222.186.190.2 | attackspambots | 2020-09-04T07:13:23.717660ns386461 sshd\[19565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2020-09-04T07:13:25.506337ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2 2020-09-04T07:13:28.902061ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2 2020-09-04T07:13:33.378647ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2 2020-09-04T07:13:36.568508ns386461 sshd\[19565\]: Failed password for root from 222.186.190.2 port 21566 ssh2 ... |
2020-09-04 13:19:57 |
| 106.13.165.247 | attackspam | $f2bV_matches |
2020-09-04 13:34:21 |
| 103.147.10.222 | attackbots | 103.147.10.222 - - [04/Sep/2020:02:35:51 +0200] "POST /wp-login.php HTTP/1.0" 200 4800 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-04 13:26:09 |