Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pune

Region: Maharashtra

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '117.216.0.0 - 117.217.255.255'

% Abuse contact for '117.216.0.0 - 117.217.255.255' is 'abuse1@bsnl.co.in'

inetnum:        117.216.0.0 - 117.217.255.255
netname:        BB-Multiplay-General
descr:          Broadband Multiplay Project, O/o DGM BB, NOC BSNL Bangalore
country:        IN
admin-c:        BH155-AP
tech-c:         DB374-AP
abuse-c:        AB1061-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-IN-DOT
mnt-irt:        IRT-BSNL-IN
last-modified:  2021-07-15T07:18:34Z
source:         APNIC

irt:            IRT-BSNL-IN
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
e-mail:         abuse1@bsnl.co.in
abuse-mailbox:  abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
auth:           # Filtered
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by:         MAINT-IN-DOT
last-modified:  2025-09-04T01:01:13Z
source:         APNIC

role:           ABUSE BSNLIN
country:        ZZ
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
phone:          +000000000
e-mail:         abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
nic-hdl:        AB1061-AP
remarks:        Generated from irt object IRT-BSNL-IN
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox:  abuse1@bsnl.co.in
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-02T04:54:12Z
source:         APNIC

person:         BSNL Hostmaster
nic-hdl:        BH155-AP
e-mail:         hostmaster@bsnl.co.in
address:        Broadband Networks
address:        Bharat Sanchar Nigam Limited
address:        2nd Floor, Telephone Exchange, Sector 62
address:        Noida
phone:          +91-120-2404243
fax-no:         +91-120-2404241
country:        IN
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2021-12-08T10:52:18Z
source:         APNIC

person:         DGM Broadband
address:        BSNL NOC Bangalore
country:        IN
phone:          +91-080-25805800
fax-no:         +91-080-25800022
e-mail:         dnwplg@bsnl.in
nic-hdl:        DB374-AP
mnt-by:         MAINT-IN-PER-DOT
last-modified:  2011-02-19T10:03:44Z
source:         APNIC

% Information related to '117.217.16.0/20AS9829'

route:          117.217.16.0/20
descr:          BSNL Internet
country:        IN
origin:         AS9829
mnt-lower:      MAINT-IN-DOT
mnt-routes:     MAINT-IN-DOT
mnt-by:         MAINT-IN-AS9829
last-modified:  2008-09-04T07:55:06Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.217.22.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.217.22.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092201 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 23 07:00:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.22.217.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 117.217.22.214.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
176.31.182.125 attackspam
Invalid user server1 from 176.31.182.125 port 48726
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125
Failed password for invalid user server1 from 176.31.182.125 port 48726 ssh2
Invalid user chan from 176.31.182.125 port 46483
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125
2019-07-22 01:16:20
116.105.221.130 attack
Sun, 21 Jul 2019 07:35:08 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:49:18
58.186.107.67 attackbots
Sun, 21 Jul 2019 07:35:01 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:09:59
188.165.218.34 attackspam
Attempts to probe for or exploit installed web applications. -  UTC+3:2019:07:21-13:38:58 SCRIPT:/index.php?***:  PORT:443
2019-07-22 01:54:59
69.163.199.240 attackspam
GET /wp-login.php
2019-07-22 02:07:33
203.158.231.137 attackbotsspam
Sun, 21 Jul 2019 07:35:09 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:45:09
14.162.129.49 attackbots
Sun, 21 Jul 2019 07:35:01 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:10:20
118.174.65.29 attackspambots
Sun, 21 Jul 2019 07:35:20 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:18:22
157.55.39.252 attack
Automatic report - Banned IP Access
2019-07-22 01:44:14
113.181.66.175 attackbotsspam
Sun, 21 Jul 2019 07:35:01 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:06:22
223.207.247.101 attackspambots
Sun, 21 Jul 2019 07:35:18 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:22:03
171.243.9.124 attackspambots
Sun, 21 Jul 2019 07:35:06 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:55:55
123.21.168.244 attack
Sun, 21 Jul 2019 07:35:00 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:12:25
61.182.65.218 attack
Sun, 21 Jul 2019 07:35:01 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 02:09:24
175.140.249.56 attackbotsspam
Sun, 21 Jul 2019 07:35:05 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:58:04

Recently Reported IPs

2001:d08:d8:91e6:5cd:ca09:773a:e421 13.89.125.226 80.14.84.134 65.49.1.119
2402:3a80:92b:2f69:4d28:f6c8:ace6:e813 19.190.29.190 152.32.207.134 162.216.150.127
210.173.216.40 10.53.241.119 10.53.240.62 143.110.252.32
2a02:587:9b06:ee00:e974:a686:6619:dbdb 0.0.0.42 10.26.9.148 152.42.229.132
138.199.35.10 20.212.100.233 14.216.208.221 47.84.68.198