City: Imphāl
Region: Manipur
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '117.209.0.0 - 117.209.127.255'
% Abuse contact for '117.209.0.0 - 117.209.127.255' is 'abuse1@bsnl.co.in'
inetnum: 117.209.0.0 - 117.209.127.255
netname: Multiplay-Prepaid
descr: Broadband Multiplay Prepaid , O/o DGM BB, NOC BSNL Bangalore
country: IN
admin-c: BH155-AP
tech-c: DB374-AP
abuse-c: AB1061-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-IN-DOT
mnt-irt: IRT-BSNL-IN
last-modified: 2021-07-15T07:16:41Z
source: APNIC
irt: IRT-BSNL-IN
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
e-mail: abuse1@bsnl.co.in
abuse-mailbox: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
auth: # Filtered
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by: MAINT-IN-DOT
last-modified: 2025-09-04T01:01:13Z
source: APNIC
role: ABUSE BSNLIN
country: ZZ
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
phone: +000000000
e-mail: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
nic-hdl: AB1061-AP
remarks: Generated from irt object IRT-BSNL-IN
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox: abuse1@bsnl.co.in
mnt-by: APNIC-ABUSE
last-modified: 2025-07-02T04:54:12Z
source: APNIC
person: BSNL Hostmaster
nic-hdl: BH155-AP
e-mail: hostmaster@bsnl.co.in
address: Broadband Networks
address: Bharat Sanchar Nigam Limited
address: 2nd Floor, Telephone Exchange, Sector 62
address: Noida
phone: +91-120-2404243
fax-no: +91-120-2404241
country: IN
mnt-by: MAINT-IN-PER-DOT
last-modified: 2021-12-08T10:52:18Z
source: APNIC
person: DGM Broadband
address: BSNL NOC Bangalore
country: IN
phone: +91-080-25805800
fax-no: +91-080-25800022
e-mail: dnwplg@bsnl.in
nic-hdl: DB374-AP
mnt-by: MAINT-IN-PER-DOT
last-modified: 2011-02-19T10:03:44Z
source: APNIC
% Information related to '117.209.120.0/21AS9829'
route: 117.209.120.0/21
origin: AS9829
descr: Bharat Sanchar Nigam Ltd
O/o Chief General Manager, Data Networks, BSNL
CTS Compond, Netaji Nagar
mnt-by: MAINT-IN-DOT
last-modified: 2021-10-13T15:51:36Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.209.125.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.209.125.111. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092101 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 02:30:31 CST 2025
;; MSG SIZE rcvd: 108
Host 111.125.209.117.in-addr.arpa not found: 2(SERVFAIL)
server can't find 117.209.125.111.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
157.52.249.52 | attack | Brute force SMTP login attempts. |
2019-10-18 01:38:21 |
193.70.81.201 | attackbots | Oct 17 13:37:05 pornomens sshd\[15396\]: Invalid user qq from 193.70.81.201 port 47688 Oct 17 13:37:05 pornomens sshd\[15396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201 Oct 17 13:37:07 pornomens sshd\[15396\]: Failed password for invalid user qq from 193.70.81.201 port 47688 ssh2 ... |
2019-10-18 01:56:44 |
200.61.187.49 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/200.61.187.49/ AR - 1H : (57) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : AR NAME ASN : ASN16814 IP : 200.61.187.49 CIDR : 200.61.186.0/23 PREFIX COUNT : 187 UNIQUE IP COUNT : 158976 WYKRYTE ATAKI Z ASN16814 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-17 13:38:12 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-18 01:22:45 |
91.134.240.73 | attackbotsspam | $f2bV_matches_ltvn |
2019-10-18 01:16:15 |
217.170.197.89 | attackbotsspam | Oct 17 14:34:26 rotator sshd\[29948\]: Invalid user ftpuser1 from 217.170.197.89Oct 17 14:34:28 rotator sshd\[29948\]: Failed password for invalid user ftpuser1 from 217.170.197.89 port 16861 ssh2Oct 17 14:34:31 rotator sshd\[29951\]: Invalid user ftpuser from 217.170.197.89Oct 17 14:34:33 rotator sshd\[29951\]: Failed password for invalid user ftpuser from 217.170.197.89 port 17587 ssh2Oct 17 14:34:38 rotator sshd\[29955\]: Invalid user ftpuser2 from 217.170.197.89Oct 17 14:34:40 rotator sshd\[29955\]: Failed password for invalid user ftpuser2 from 217.170.197.89 port 18296 ssh2 ... |
2019-10-18 01:39:05 |
212.21.66.6 | attack | Oct 17 19:45:46 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:49 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:51 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:53 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:56 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:59 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2 ... |
2019-10-18 01:49:10 |
67.55.92.88 | attack | *Port Scan* detected from 67.55.92.88 (US/United States/-). 4 hits in the last 120 seconds |
2019-10-18 01:47:57 |
68.183.184.7 | attackbots | Automatic report - XMLRPC Attack |
2019-10-18 01:26:58 |
14.134.191.51 | attackbotsspam | Oct 17 16:10:27 lnxmail61 sshd[11081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.134.191.51 |
2019-10-18 01:42:16 |
163.47.214.158 | attack | Oct 17 19:10:36 ArkNodeAT sshd\[19901\]: Invalid user 123456 from 163.47.214.158 Oct 17 19:10:36 ArkNodeAT sshd\[19901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158 Oct 17 19:10:38 ArkNodeAT sshd\[19901\]: Failed password for invalid user 123456 from 163.47.214.158 port 48116 ssh2 |
2019-10-18 01:26:41 |
152.136.26.44 | attackspambots | Oct 17 18:16:16 v22019058497090703 sshd[23927]: Failed password for root from 152.136.26.44 port 41352 ssh2 Oct 17 18:21:49 v22019058497090703 sshd[24320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.26.44 Oct 17 18:21:51 v22019058497090703 sshd[24320]: Failed password for invalid user oracle from 152.136.26.44 port 52034 ssh2 ... |
2019-10-18 01:23:42 |
106.12.108.90 | attackspambots | 2019-10-17T10:44:32.342066mizuno.rwx.ovh sshd[1677140]: Connection from 106.12.108.90 port 41756 on 78.46.61.178 port 22 rdomain "" 2019-10-17T10:44:34.461076mizuno.rwx.ovh sshd[1677140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.90 user=root 2019-10-17T10:44:36.670227mizuno.rwx.ovh sshd[1677140]: Failed password for root from 106.12.108.90 port 41756 ssh2 2019-10-17T10:51:39.769393mizuno.rwx.ovh sshd[1677980]: Connection from 106.12.108.90 port 55944 on 78.46.61.178 port 22 rdomain "" 2019-10-17T10:51:41.158758mizuno.rwx.ovh sshd[1677980]: Invalid user ovidiu from 106.12.108.90 port 55944 ... |
2019-10-18 01:20:31 |
186.122.149.38 | attackbotsspam | Oct 17 19:36:15 markkoudstaal sshd[11595]: Failed password for root from 186.122.149.38 port 56778 ssh2 Oct 17 19:41:31 markkoudstaal sshd[12221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.38 Oct 17 19:41:33 markkoudstaal sshd[12221]: Failed password for invalid user nagios from 186.122.149.38 port 40588 ssh2 |
2019-10-18 01:46:41 |
200.196.247.110 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-18 01:51:07 |
196.192.110.64 | attackbots | Oct 17 18:27:01 MK-Soft-VM4 sshd[18312]: Failed password for root from 196.192.110.64 port 41904 ssh2 ... |
2019-10-18 01:39:42 |