城市(city): Dharwad
省份(region): Karnataka
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '117.205.16.0 - 117.205.255.255'
% Abuse contact for '117.205.16.0 - 117.205.255.255' is 'abuse1@bsnl.co.in'
inetnum: 117.205.16.0 - 117.205.255.255
netname: BB-Multiplay
descr: Broadband Multiplay Project, O/o DGM BB, NOC BSNL Bangalore
country: IN
admin-c: BH155-AP
tech-c: DB374-AP
abuse-c: AB1061-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-IN-DOT
mnt-irt: IRT-BSNL-IN
last-modified: 2021-07-15T07:16:59Z
source: APNIC
irt: IRT-BSNL-IN
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
e-mail: abuse1@bsnl.co.in
abuse-mailbox: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
auth: # Filtered
remarks: abuse1@bsnl.co.in is invalid
mnt-by: MAINT-IN-DOT
last-modified: 2026-01-21T13:08:51Z
source: APNIC
role: ABUSE BSNLIN
country: ZZ
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
phone: +000000000
e-mail: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
nic-hdl: AB1061-AP
remarks: Generated from irt object IRT-BSNL-IN
remarks: abuse1@bsnl.co.in is invalid
abuse-mailbox: abuse1@bsnl.co.in
mnt-by: APNIC-ABUSE
last-modified: 2026-01-21T13:09:52Z
source: APNIC
person: BSNL Hostmaster
nic-hdl: BH155-AP
e-mail: hostmaster@bsnl.co.in
address: Broadband Networks
address: Bharat Sanchar Nigam Limited
address: 2nd Floor, Telephone Exchange, Sector 62
address: Noida
phone: +91-120-2404243
fax-no: +91-120-2404241
country: IN
mnt-by: MAINT-IN-PER-DOT
last-modified: 2021-12-08T10:52:18Z
source: APNIC
person: DGM Broadband
address: BSNL NOC Bangalore
country: IN
phone: +91-080-25805800
fax-no: +91-080-25800022
e-mail: dnwplg@bsnl.in
nic-hdl: DB374-AP
mnt-by: MAINT-IN-PER-DOT
last-modified: 2011-02-19T10:03:44Z
source: APNIC
% Information related to '117.205.80.0/22AS9829'
route: 117.205.80.0/22
origin: AS9829
descr: Bharat Sanchar Nigam Ltd
Bharat Sanchar Nigam Limited
Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, New Delhi ?? 110 001
India
mnt-by: MAINT-IN-DOT
last-modified: 2025-09-22T07:23:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.205.80.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.205.80.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020200 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 02 22:01:25 CST 2026
;; MSG SIZE rcvd: 106
b'Host 98.80.205.117.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 117.205.80.98.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.0.175.220 | attackbotsspam | Unauthorized connection attempt detected from IP address 201.0.175.220 to port 82 |
2019-12-29 02:51:19 |
| 216.218.206.112 | attack | 3389BruteforceFW22 |
2019-12-29 02:48:50 |
| 201.201.208.26 | attack | Unauthorized connection attempt detected from IP address 201.201.208.26 to port 80 |
2019-12-29 02:34:31 |
| 80.210.34.214 | attackbotsspam | Unauthorized connection attempt detected from IP address 80.210.34.214 to port 23 |
2019-12-29 02:43:34 |
| 115.21.179.146 | attack | Unauthorized connection attempt detected from IP address 115.21.179.146 to port 81 |
2019-12-29 02:39:44 |
| 187.142.7.134 | attackspam | Unauthorized connection attempt detected from IP address 187.142.7.134 to port 81 |
2019-12-29 02:38:33 |
| 145.239.76.171 | attackbotsspam | 145.239.76.171 - - \[28/Dec/2019:15:27:59 +0100\] "POST /wp-login.php HTTP/1.0" 200 7672 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 145.239.76.171 - - \[28/Dec/2019:15:28:00 +0100\] "POST /wp-login.php HTTP/1.0" 200 7502 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 145.239.76.171 - - \[28/Dec/2019:15:28:02 +0100\] "POST /wp-login.php HTTP/1.0" 200 7496 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-12-29 02:22:27 |
| 193.188.22.182 | attackspambots | Unauthorized connection attempt detected from IP address 193.188.22.182 to port 10000 |
2019-12-29 02:56:22 |
| 54.193.101.194 | attack | Unauthorized connection attempt detected from IP address 54.193.101.194 to port 8984 |
2019-12-29 02:29:23 |
| 201.68.104.127 | attackbotsspam | Unauthorized connection attempt detected from IP address 201.68.104.127 to port 4567 |
2019-12-29 02:50:53 |
| 88.29.99.44 | attackspam | Unauthorized connection attempt detected from IP address 88.29.99.44 to port 23 |
2019-12-29 02:41:45 |
| 49.51.8.24 | attackbots | Unauthorized connection attempt detected from IP address 49.51.8.24 to port 2082 |
2019-12-29 02:30:33 |
| 184.105.139.70 | attack | Unauthorized connection attempt detected from IP address 184.105.139.70 to port 8443 |
2019-12-29 02:58:04 |
| 212.230.180.8 | attack | Unauthorized connection attempt detected from IP address 212.230.180.8 to port 1433 |
2019-12-29 02:49:05 |
| 195.206.38.83 | attackspam | Unauthorized connection attempt detected from IP address 195.206.38.83 to port 81 |
2019-12-29 02:37:13 |