Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.215.130.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.215.130.94.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 06:01:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
94.130.215.117.in-addr.arpa domain name pointer static.bb.vzm.117.215.130.94.bsnl.in.
94.130.215.117.in-addr.arpa domain name pointer static.ftth.vzm.117.215.130.94.bsnl.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.130.215.117.in-addr.arpa	name = static.ftth.vzm.117.215.130.94.bsnl.in.
94.130.215.117.in-addr.arpa	name = static.bb.vzm.117.215.130.94.bsnl.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.53.110.20 attackbotsspam
Unauthorized connection attempt detected from IP address 113.53.110.20 to port 8000 [T]
2020-03-24 21:43:08
114.80.116.184 attack
Unauthorized connection attempt detected from IP address 114.80.116.184 to port 1433 [T]
2020-03-24 21:41:49
120.24.215.154 attack
Unauthorized connection attempt detected from IP address 120.24.215.154 to port 6380 [T]
2020-03-24 21:36:10
123.206.103.166 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-24 21:31:25
124.119.135.111 attackbotsspam
Unauthorized connection attempt detected from IP address 124.119.135.111 to port 8443 [T]
2020-03-24 21:29:19
49.115.217.87 attackbots
Unauthorized connection attempt detected from IP address 49.115.217.87 to port 23 [T]
2020-03-24 21:06:44
58.119.5.214 attackspam
Unauthorized connection attempt detected from IP address 58.119.5.214 to port 1433 [T]
2020-03-24 21:54:50
42.116.175.137 attack
Unauthorized connection attempt detected from IP address 42.116.175.137 to port 9530 [T]
2020-03-24 21:08:40
113.25.166.82 attackbots
Unauthorized connection attempt detected from IP address 113.25.166.82 to port 23 [T]
2020-03-24 21:43:47
213.136.93.52 attack
22/tcp
[2020-03-24]1pkt
2020-03-24 21:19:41
60.186.239.88 attack
Unauthorized connection attempt detected from IP address 60.186.239.88 to port 23 [T]
2020-03-24 21:04:26
153.36.77.73 attackspambots
Unauthorized connection attempt detected from IP address 153.36.77.73 to port 2323 [T]
2020-03-24 21:28:11
91.230.153.121 attackspambots
Mar 24 12:51:32 debian-2gb-nbg1-2 kernel: \[7309776.908990\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=91.230.153.121 DST=195.201.40.59 LEN=40 TOS=0x10 PREC=0x60 TTL=245 ID=39255 PROTO=TCP SPT=40046 DPT=55895 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-24 21:52:01
211.97.132.125 attack
firewall-block, port(s): 1433/tcp
2020-03-24 21:20:15
60.189.25.242 attackbotsspam
Unauthorized connection attempt detected from IP address 60.189.25.242 to port 23 [T]
2020-03-24 21:53:15

Recently Reported IPs

117.215.128.85 117.215.144.247 117.214.211.239 117.215.166.88
117.215.200.56 117.215.200.227 117.215.200.184 117.215.200.77
117.215.200.147 117.215.201.128 117.215.201.161 117.215.201.49
117.215.201.64 117.215.201.9 117.215.202.15 117.215.202.225
117.215.203.131 117.215.202.92 117.215.203.251 117.215.204.146