Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Thrissur

Region: Kerala

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '117.193.0.0 - 117.193.71.255'

% Abuse contact for '117.193.0.0 - 117.193.71.255' is 'abuse1@bsnl.co.in'

inetnum:        117.193.0.0 - 117.193.71.255
netname:        BB-Multiplay
descr:          Broadband Multiplay Project, O/o DGM BB, NOC BSNL Bangalore
country:        IN
admin-c:        BH155-AP
tech-c:         DB374-AP
abuse-c:        AB1061-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-IN-DOT
mnt-irt:        IRT-BSNL-IN
last-modified:  2021-07-15T07:18:14Z
source:         APNIC

irt:            IRT-BSNL-IN
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
e-mail:         abuse1@bsnl.co.in
abuse-mailbox:  abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
auth:           # Filtered
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by:         MAINT-IN-DOT
last-modified:  2025-11-18T00:26:22Z
source:         APNIC

role:           ABUSE BSNLIN
country:        ZZ
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
phone:          +000000000
e-mail:         abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
nic-hdl:        AB1061-AP
remarks:        Generated from irt object IRT-BSNL-IN
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox:  abuse1@bsnl.co.in
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-02T04:54:12Z
source:         APNIC

person:         BSNL Hostmaster
nic-hdl:        BH155-AP
e-mail:         hostmaster@bsnl.co.in
address:        Broadband Networks
address:        Bharat Sanchar Nigam Limited
address:        2nd Floor, Telephone Exchange, Sector 62
address:        Noida
phone:          +91-120-2404243
fax-no:         +91-120-2404241
country:        IN
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2021-12-08T10:52:18Z
source:         APNIC

person:         DGM Broadband
address:        BSNL NOC Bangalore
country:        IN
phone:          +91-080-25805800
fax-no:         +91-080-25800022
e-mail:         dnwplg@bsnl.in
nic-hdl:        DB374-AP
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2011-02-19T10:03:44Z
source:         APNIC

% Information related to '117.193.32.0/20AS9829'

route:          117.193.32.0/20
descr:          BSNL Internet
country:        IN
origin:         AS9829
mnt-lower:      MAINT-IN-DOT
mnt-routes:     MAINT-IN-DOT
mnt-by:         MAINT-IN-AS9829
last-modified:  2008-09-04T07:55:05Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.193.40.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.193.40.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 19:53:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 218.40.193.117.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 117.193.40.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.14.150.103 attackbotsspam
May 26 16:45:58 localhost sshd\[10548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.103  user=root
May 26 16:46:00 localhost sshd\[10548\]: Failed password for root from 45.14.150.103 port 49224 ssh2
May 26 16:52:32 localhost sshd\[10627\]: Invalid user test from 45.14.150.103 port 49024
...
2020-05-27 05:21:17
185.220.101.251 attack
0,55-01/02 [bc01/m19] PostRequest-Spammer scoring: essen
2020-05-27 05:28:33
129.204.19.9 attackspam
May 26 23:02:50 * sshd[12363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.19.9
May 26 23:02:53 * sshd[12363]: Failed password for invalid user toor from 129.204.19.9 port 56258 ssh2
2020-05-27 05:24:45
106.253.177.150 attack
May 26 23:07:06 * sshd[12777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
May 26 23:07:08 * sshd[12777]: Failed password for invalid user dearden from 106.253.177.150 port 56766 ssh2
2020-05-27 05:13:54
112.85.42.94 attackbotsspam
May 26 21:12:59 game-panel sshd[22366]: Failed password for root from 112.85.42.94 port 27344 ssh2
May 26 21:13:01 game-panel sshd[22366]: Failed password for root from 112.85.42.94 port 27344 ssh2
May 26 21:13:04 game-panel sshd[22366]: Failed password for root from 112.85.42.94 port 27344 ssh2
2020-05-27 05:38:17
177.10.192.30 attack
1590508169 - 05/26/2020 17:49:29 Host: 177.10.192.30/177.10.192.30 Port: 445 TCP Blocked
2020-05-27 05:35:15
94.200.197.86 attackspambots
Failed password for invalid user guest from 94.200.197.86 port 47044 ssh2
2020-05-27 05:18:25
155.94.146.201 attackbotsspam
May 26 22:51:34 abendstille sshd\[27638\]: Invalid user PSEAdmin from 155.94.146.201
May 26 22:51:34 abendstille sshd\[27638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.146.201
May 26 22:51:36 abendstille sshd\[27638\]: Failed password for invalid user PSEAdmin from 155.94.146.201 port 43948 ssh2
May 26 22:59:57 abendstille sshd\[3300\]: Invalid user dredlord from 155.94.146.201
May 26 22:59:57 abendstille sshd\[3300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.146.201
...
2020-05-27 05:05:23
190.111.143.36 attackspam
Automatic report - Port Scan Attack
2020-05-27 05:31:12
185.179.188.32 attackbots
" "
2020-05-27 05:37:21
181.31.101.35 attack
May 26 22:27:30 vpn01 sshd[8543]: Failed password for root from 181.31.101.35 port 54273 ssh2
...
2020-05-27 04:57:41
202.107.226.3 attackbotsspam
port scans
2020-05-27 05:22:39
34.96.203.141 attackbotsspam
2020-05-26T18:34:11.326485abusebot-7.cloudsearch.cf sshd[29372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.203.96.34.bc.googleusercontent.com  user=root
2020-05-26T18:34:13.294352abusebot-7.cloudsearch.cf sshd[29372]: Failed password for root from 34.96.203.141 port 56044 ssh2
2020-05-26T18:39:39.565005abusebot-7.cloudsearch.cf sshd[29652]: Invalid user test from 34.96.203.141 port 37908
2020-05-26T18:39:39.570555abusebot-7.cloudsearch.cf sshd[29652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.203.96.34.bc.googleusercontent.com
2020-05-26T18:39:39.565005abusebot-7.cloudsearch.cf sshd[29652]: Invalid user test from 34.96.203.141 port 37908
2020-05-26T18:39:41.200768abusebot-7.cloudsearch.cf sshd[29652]: Failed password for invalid user test from 34.96.203.141 port 37908 ssh2
2020-05-26T18:43:46.746093abusebot-7.cloudsearch.cf sshd[29999]: pam_unix(sshd:auth): authentication failure; lognam
...
2020-05-27 05:00:29
192.144.129.98 attackbots
Invalid user kfranklin from 192.144.129.98 port 52866
2020-05-27 05:01:34
111.67.194.59 attackbotsspam
May 26 21:57:56 server sshd[14339]: Failed password for invalid user serge from 111.67.194.59 port 39212 ssh2
May 26 22:21:39 server sshd[6489]: Failed password for invalid user named from 111.67.194.59 port 59822 ssh2
May 26 22:25:18 server sshd[10077]: Failed password for invalid user Leo from 111.67.194.59 port 44428 ssh2
2020-05-27 05:06:32

Recently Reported IPs

14.212.72.218 154.206.87.190 172.18.44.220 114.122.255.243
42.200.230.26 10.12.13.36 115.231.172.86 120.36.254.58
35.203.210.127 192.170.0.105 192.170.0.30 57.141.2.58
98.84.70.201 10.3.112.3 2409:893d:5c32:1c1:8462:c567:d79f:43a3 103.130.215.154
64.62.156.95 240e:468:6108:ae65:e93c:8821:a1b5:fa7 113.88.88.42 113.88.88.4