City: Amritsar
Region: Punjab
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '59.176.0.0 - 59.185.255.255'
% Abuse contact for '59.176.0.0 - 59.185.255.255' is 'abusemtnl@bol.net.in'
inetnum: 59.176.0.0 - 59.185.255.255
netname: MTNL
descr: Mahanagar Telephone Nigam Limited
country: IN
admin-c: AB782-AP
tech-c: SM2089-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-IN-IRINN
mnt-lower: MAINT-IN-MTNL
mnt-lower: MAINT-IN-IRINN
mnt-routes: MAINT-IN-MTNL
mnt-routes: MAINT-IN-IRINN
mnt-irt: IRT-MTNL-IN
last-modified: 2025-08-11T22:48:30Z
source: APNIC
irt: IRT-MTNL-IN
address: Jeevan Bharati Building
address: Tower 1, 12th Floor, 124, Connaught Circus, New Delhi
e-mail: dgmitco@bol.net.in
abuse-mailbox: abusemtnl@bol.net.in
admin-c: AB782-AP
tech-c: SM2089-AP
auth: # Filtered
mnt-by: MAINT-IN-MTNL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-11-04T04:59:59Z
source: APNIC
role: Senior Manager
address: Mahanagar Doorsanchar Sadan, 5th Floor, 9 CGO Complex, Lodhi Road, New Delhi ,New Delhi,Delhi-110003
country: IN
phone: +91 01124325185
e-mail: mgritco@bol.net.in
admin-c: AB782-AP
tech-c: AB782-AP
nic-hdl: SM2089-AP
mnt-by: MAINT-IN-MTNL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T09:35:01Z
source: APNIC
person: Amarjeetkaur Bedi
address: Mahanagar Doorsanchar Sadan, 5th Floor, 9 CGO Complex, Lodhi Road, New Delhi ,New Delhi,Delhi-110003
country: IN
phone: +91 01124325185
e-mail: dgmitco@bol.net.in
nic-hdl: AB782-AP
mnt-by: MAINT-IN-MTNL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T09:35:01Z
source: APNIC
% Information related to '59.183.112.0/20AS17813'
route: 59.183.112.0/20
descr: MTNL Mumbai Route
descr: Mahanagar Telephone Nigam Limited, New Delhi
country: IN
origin: AS17813
mnt-by: MAINT-IN-MTNL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T09:39:14Z
source: APNIC
% Information related to '59.183.112.0/20AS9829'
route: 59.183.112.0/20
descr: MTNL Pool ROUTE OBJECT Through BSNL
origin: AS9829
mnt-by: MAINT-IN-MTNL
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T09:39:14Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.183.127.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.183.127.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 11 04:31:41 CST 2025
;; MSG SIZE rcvd: 107
b'134.127.183.59.in-addr.arpa domain name pointer triband-mum-59.183.127.134.mtnl.net.in.
'
b'134.127.183.59.in-addr.arpa name = triband-mum-59.183.127.134.mtnl.net.in.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.179.131.113 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.179.131.113 to port 6656 [T] |
2020-01-26 09:11:14 |
| 121.56.36.205 | attackbotsspam | Unauthorized connection attempt detected from IP address 121.56.36.205 to port 6656 [T] |
2020-01-26 09:15:14 |
| 114.237.63.177 | attackbotsspam | Unauthorized connection attempt detected from IP address 114.237.63.177 to port 6656 [T] |
2020-01-26 09:40:32 |
| 211.152.35.9 | attackspam | Unauthorized connection attempt detected from IP address 211.152.35.9 to port 445 [T] |
2020-01-26 09:08:38 |
| 150.95.153.82 | attackspambots | Jan 25 18:51:48 eddieflores sshd\[22491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-153-82.a092.g.tyo1.static.cnode.io user=root Jan 25 18:51:49 eddieflores sshd\[22491\]: Failed password for root from 150.95.153.82 port 57740 ssh2 Jan 25 18:55:14 eddieflores sshd\[22962\]: Invalid user test from 150.95.153.82 Jan 25 18:55:14 eddieflores sshd\[22962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-153-82.a092.g.tyo1.static.cnode.io Jan 25 18:55:16 eddieflores sshd\[22962\]: Failed password for invalid user test from 150.95.153.82 port 60050 ssh2 |
2020-01-26 13:03:26 |
| 42.112.125.16 | attack | Unauthorized connection attempt detected from IP address 42.112.125.16 to port 23 [J] |
2020-01-26 09:06:06 |
| 180.119.156.165 | attack | Unauthorized connection attempt detected from IP address 180.119.156.165 to port 6656 [T] |
2020-01-26 09:31:20 |
| 222.220.153.94 | attackbots | Unauthorized connection attempt detected from IP address 222.220.153.94 to port 6656 [T] |
2020-01-26 09:24:56 |
| 218.91.122.229 | attack | Unauthorized connection attempt detected from IP address 218.91.122.229 to port 6656 [T] |
2020-01-26 09:08:25 |
| 117.69.149.250 | attack | Unauthorized connection attempt detected from IP address 117.69.149.250 to port 6656 [T] |
2020-01-26 09:36:43 |
| 115.151.21.78 | attackspambots | Unauthorized connection attempt detected from IP address 115.151.21.78 to port 6656 [T] |
2020-01-26 09:39:20 |
| 1.198.7.61 | attack | Unauthorized connection attempt detected from IP address 1.198.7.61 to port 6379 [J] |
2020-01-26 09:06:23 |
| 182.105.200.74 | attack | Unauthorized connection attempt detected from IP address 182.105.200.74 to port 6656 [T] |
2020-01-26 09:29:49 |
| 182.108.168.118 | attackbots | Unauthorized connection attempt detected from IP address 182.108.168.118 to port 6656 [T] |
2020-01-26 09:29:16 |
| 123.179.131.124 | attack | Unauthorized connection attempt detected from IP address 123.179.131.124 to port 6656 [T] |
2020-01-26 09:10:54 |