Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.141.0.0 - 202.141.127.255'

% Abuse contact for '202.141.0.0 - 202.141.127.255' is 'abuse@railtelindia.com'

inetnum:        202.141.0.0 - 202.141.127.255
netname:        RAILTEL-IN
descr:          RailTel Corporation is an Internet Service Provider.
country:        IN
admin-c:        NA1011-AP
tech-c:         NA1011-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-RAILTEL
mnt-lower:      MAINT-IN-IRINN
mnt-routes:     MAINT-IN-RAILTEL
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-RAILTEL-IN
last-modified:  2025-12-04T06:50:27Z
source:         APNIC

irt:            IRT-RAILTEL-IN
address:        Plot No, 143
address:        Sector 44 ,Gurugram
address:        Haryana ,122003
e-mail:         abuse@railtelindia.com
abuse-mailbox:  abuse@railtelindia.com
admin-c:        NA1011-AP
tech-c:         NA1011-AP
auth:           # Filtered
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-02-10T04:57:40Z
source:         APNIC

person:         Network Administrator
address:        Plate-A, 6th Floor, Office Block Tower-2,
address:        East Kidwai Nagar, New Delhi-110023
country:        IN
phone:          +91 11 22900600
e-mail:         ipadmin@railtel.in
nic-hdl:        NA1011-AP
mnt-by:         MAINT-IN-RAILTEL
mnt-by:         MAINT-IN-IRINN
fax-no:         +91 11 22900699
last-modified:  2025-09-27T09:36:11Z
source:         APNIC

% Information related to '202.141.39.0/24AS24186'

route:          202.141.39.0/24
origin:         AS24186
descr:          NIXI
                B-901, 9th Floor, Tower B,
                World Trade Centre,
                Nauroji nagar
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2026-01-08T22:44:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.141.39.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.141.39.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 16:31:09 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 29.39.141.202.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
b'29.39.141.202.in-addr.arpa	name = ws29-39.141.202.rcil.gov.in.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.201 attackspambots
Oct  7 09:10:32 itv-usvr-02 sshd[10302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Oct  7 09:10:34 itv-usvr-02 sshd[10302]: Failed password for root from 218.92.0.201 port 49129 ssh2
Oct  7 09:13:18 itv-usvr-02 sshd[10476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Oct  7 09:13:19 itv-usvr-02 sshd[10476]: Failed password for root from 218.92.0.201 port 37489 ssh2
Oct  7 09:13:18 itv-usvr-02 sshd[10476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Oct  7 09:13:19 itv-usvr-02 sshd[10476]: Failed password for root from 218.92.0.201 port 37489 ssh2
Oct  7 09:13:22 itv-usvr-02 sshd[10476]: Failed password for root from 218.92.0.201 port 37489 ssh2
2020-10-07 17:59:00
96.9.66.23 attackbotsspam
RDP Brute-Force (honeypot 8)
2020-10-07 17:27:20
134.17.94.55 attack
Oct  6 22:28:36 xeon sshd[4215]: Failed password for root from 134.17.94.55 port 2948 ssh2
2020-10-07 17:32:48
177.73.250.160 attackspambots
Dovecot Invalid User Login Attempt.
2020-10-07 17:49:06
104.36.254.231 attack
2020-10-06 15:37:03.618914-0500  localhost screensharingd[55834]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 104.36.254.231 :: Type: VNC DES
2020-10-07 17:24:24
118.69.183.237 attackspambots
sshd: Failed password for .... from 118.69.183.237 port 48481 ssh2 (12 attempts)
2020-10-07 17:37:44
82.196.0.108 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-07 17:43:04
188.166.232.4 attack
2020-10-06 UTC: (38x) - root(38x)
2020-10-07 17:46:50
192.241.239.183 attackbots
[portscan] tcp/143 [IMAP]
*(RWIN=65535)(10061547)
2020-10-07 17:36:20
200.100.14.65 attack
Oct  7 18:08:17 DL-Box sshd[33995]: Failed password for root from 200.100.14.65 port 32769 ssh2
Oct  7 18:10:34 DL-Box sshd[34069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.100.14.65  user=root
Oct  7 18:10:37 DL-Box sshd[34069]: Failed password for root from 200.100.14.65 port 51649 ssh2
Oct  7 18:12:55 DL-Box sshd[34134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.100.14.65  user=root
Oct  7 18:12:57 DL-Box sshd[34134]: Failed password for root from 200.100.14.65 port 7425 ssh2
...
2020-10-07 17:44:22
202.137.10.182 attackbotsspam
(sshd) Failed SSH login from 202.137.10.182 (ID/Indonesia/ln-static-202-137-10-182.link.net.id): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 01:33:17 server sshd[23882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.182  user=root
Oct  7 01:33:19 server sshd[23882]: Failed password for root from 202.137.10.182 port 49298 ssh2
Oct  7 01:37:09 server sshd[24997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.182  user=root
Oct  7 01:37:11 server sshd[24997]: Failed password for root from 202.137.10.182 port 37574 ssh2
Oct  7 01:39:05 server sshd[25438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.182  user=root
2020-10-07 17:49:44
59.95.103.13 attack
SSH login attempts.
2020-10-07 17:39:06
222.186.42.213 attackbots
Oct  7 11:50:07 santamaria sshd\[554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Oct  7 11:50:10 santamaria sshd\[554\]: Failed password for root from 222.186.42.213 port 64662 ssh2
Oct  7 11:50:16 santamaria sshd\[556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
...
2020-10-07 17:50:49
71.77.232.211 attack
CMS (WordPress or Joomla) login attempt.
2020-10-07 17:36:48
91.243.89.80 attackspam
suspicious query, attemp SQL injection log:/aero/meteo_aero.php?lang=en&recherche=ENBN%27%29+AND+1%3D1+UNION+ALL+SELECT+1%2CNULL%2C%27%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E%27%2Ctable_name+FROM+information_schema.tables+WHERE+2%3E1--%2F%2A%2A%2F%3B+EXEC+xp_cmdshell%28%27cat+..%2F..%2F..%2Fetc%2Fpasswd%27%29%23
2020-10-07 17:41:57

Recently Reported IPs

108.85.203.251 50.7.158.114 80.95.207.198 147.226.234.22
20.29.58.2 120.169.152.189 110.78.156.132 2606:4700:10::6816:1701
2606:4700:10::6814:9575 110.77.248.160 2606:4700:10::6816:4942 2606:4700:10::6814:8190
2606:4700:10::6816:1584 2606:4700:10::6816:998 121.234.219.138 2606:4700:10::6816:2140
164.155.74.48 2606:4700:10::ac43:823 109.162.246.59 2606:4700:10::6816:3935