Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Imphāl

Region: Manipur

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '117.209.0.0 - 117.209.127.255'

% Abuse contact for '117.209.0.0 - 117.209.127.255' is 'abuse1@bsnl.co.in'

inetnum:        117.209.0.0 - 117.209.127.255
netname:        Multiplay-Prepaid
descr:          Broadband Multiplay Prepaid , O/o DGM BB, NOC BSNL Bangalore
country:        IN
admin-c:        BH155-AP
tech-c:         DB374-AP
abuse-c:        AB1061-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-IN-DOT
mnt-irt:        IRT-BSNL-IN
last-modified:  2021-07-15T07:16:41Z
source:         APNIC

irt:            IRT-BSNL-IN
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
e-mail:         abuse1@bsnl.co.in
abuse-mailbox:  abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
auth:           # Filtered
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by:         MAINT-IN-DOT
last-modified:  2025-09-04T01:01:13Z
source:         APNIC

role:           ABUSE BSNLIN
country:        ZZ
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
phone:          +000000000
e-mail:         abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
nic-hdl:        AB1061-AP
remarks:        Generated from irt object IRT-BSNL-IN
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox:  abuse1@bsnl.co.in
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-02T04:54:12Z
source:         APNIC

person:         BSNL Hostmaster
nic-hdl:        BH155-AP
e-mail:         hostmaster@bsnl.co.in
address:        Broadband Networks
address:        Bharat Sanchar Nigam Limited
address:        2nd Floor, Telephone Exchange, Sector 62
address:        Noida
phone:          +91-120-2404243
fax-no:         +91-120-2404241
country:        IN
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2021-12-08T10:52:18Z
source:         APNIC

person:         DGM Broadband
address:        BSNL NOC Bangalore
country:        IN
phone:          +91-080-25805800
fax-no:         +91-080-25800022
e-mail:         dnwplg@bsnl.in
nic-hdl:        DB374-AP
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2011-02-19T10:03:44Z
source:         APNIC

% Information related to '117.209.120.0/21AS9829'

route:          117.209.120.0/21
origin:         AS9829
descr:          Bharat Sanchar Nigam Ltd
                O/o Chief General Manager, Data Networks, BSNL
                CTS Compond, Netaji Nagar
mnt-by:         MAINT-IN-DOT
last-modified:  2021-10-13T15:51:36Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.209.125.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.209.125.111.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 02:30:31 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 111.125.209.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 117.209.125.111.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.52.249.52 attack
Brute force SMTP login attempts.
2019-10-18 01:38:21
193.70.81.201 attackbots
Oct 17 13:37:05 pornomens sshd\[15396\]: Invalid user qq from 193.70.81.201 port 47688
Oct 17 13:37:05 pornomens sshd\[15396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201
Oct 17 13:37:07 pornomens sshd\[15396\]: Failed password for invalid user qq from 193.70.81.201 port 47688 ssh2
...
2019-10-18 01:56:44
200.61.187.49 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/200.61.187.49/ 
 AR - 1H : (57)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN16814 
 
 IP : 200.61.187.49 
 
 CIDR : 200.61.186.0/23 
 
 PREFIX COUNT : 187 
 
 UNIQUE IP COUNT : 158976 
 
 
 WYKRYTE ATAKI Z ASN16814 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-17 13:38:12 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 01:22:45
91.134.240.73 attackbotsspam
$f2bV_matches_ltvn
2019-10-18 01:16:15
217.170.197.89 attackbotsspam
Oct 17 14:34:26 rotator sshd\[29948\]: Invalid user ftpuser1 from 217.170.197.89Oct 17 14:34:28 rotator sshd\[29948\]: Failed password for invalid user ftpuser1 from 217.170.197.89 port 16861 ssh2Oct 17 14:34:31 rotator sshd\[29951\]: Invalid user ftpuser from 217.170.197.89Oct 17 14:34:33 rotator sshd\[29951\]: Failed password for invalid user ftpuser from 217.170.197.89 port 17587 ssh2Oct 17 14:34:38 rotator sshd\[29955\]: Invalid user ftpuser2 from 217.170.197.89Oct 17 14:34:40 rotator sshd\[29955\]: Failed password for invalid user ftpuser2 from 217.170.197.89 port 18296 ssh2
...
2019-10-18 01:39:05
212.21.66.6 attack
Oct 17 19:45:46 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:49 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:51 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:53 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:56 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:59 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2
...
2019-10-18 01:49:10
67.55.92.88 attack
*Port Scan* detected from 67.55.92.88 (US/United States/-). 4 hits in the last 120 seconds
2019-10-18 01:47:57
68.183.184.7 attackbots
Automatic report - XMLRPC Attack
2019-10-18 01:26:58
14.134.191.51 attackbotsspam
Oct 17 16:10:27 lnxmail61 sshd[11081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.134.191.51
2019-10-18 01:42:16
163.47.214.158 attack
Oct 17 19:10:36 ArkNodeAT sshd\[19901\]: Invalid user 123456 from 163.47.214.158
Oct 17 19:10:36 ArkNodeAT sshd\[19901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158
Oct 17 19:10:38 ArkNodeAT sshd\[19901\]: Failed password for invalid user 123456 from 163.47.214.158 port 48116 ssh2
2019-10-18 01:26:41
152.136.26.44 attackspambots
Oct 17 18:16:16 v22019058497090703 sshd[23927]: Failed password for root from 152.136.26.44 port 41352 ssh2
Oct 17 18:21:49 v22019058497090703 sshd[24320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.26.44
Oct 17 18:21:51 v22019058497090703 sshd[24320]: Failed password for invalid user oracle from 152.136.26.44 port 52034 ssh2
...
2019-10-18 01:23:42
106.12.108.90 attackspambots
2019-10-17T10:44:32.342066mizuno.rwx.ovh sshd[1677140]: Connection from 106.12.108.90 port 41756 on 78.46.61.178 port 22 rdomain ""
2019-10-17T10:44:34.461076mizuno.rwx.ovh sshd[1677140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.90  user=root
2019-10-17T10:44:36.670227mizuno.rwx.ovh sshd[1677140]: Failed password for root from 106.12.108.90 port 41756 ssh2
2019-10-17T10:51:39.769393mizuno.rwx.ovh sshd[1677980]: Connection from 106.12.108.90 port 55944 on 78.46.61.178 port 22 rdomain ""
2019-10-17T10:51:41.158758mizuno.rwx.ovh sshd[1677980]: Invalid user ovidiu from 106.12.108.90 port 55944
...
2019-10-18 01:20:31
186.122.149.38 attackbotsspam
Oct 17 19:36:15 markkoudstaal sshd[11595]: Failed password for root from 186.122.149.38 port 56778 ssh2
Oct 17 19:41:31 markkoudstaal sshd[12221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.38
Oct 17 19:41:33 markkoudstaal sshd[12221]: Failed password for invalid user nagios from 186.122.149.38 port 40588 ssh2
2019-10-18 01:46:41
200.196.247.110 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-18 01:51:07
196.192.110.64 attackbots
Oct 17 18:27:01 MK-Soft-VM4 sshd[18312]: Failed password for root from 196.192.110.64 port 41904 ssh2
...
2019-10-18 01:39:42

Recently Reported IPs

117.181.61.101 42.236.17.231 162.179.0.153 138.2.37.85
20.106.48.199 138.68.142.2 117.200.148.133 2601:19c:8100:5190:3cea:bda5:7366:b8bb
209.97.138.50 8.10.75.51 124.238.31.225 156.253.15.251
2620:18c::209 35.203.211.20 46.30.213.183 49.7.227.204
2001:8a0:7f44:1400:3859:4338:143e:5753 176.11.51.212 20.169.107.208 117.31.157.228