城市(city): Sangrūr
省份(region): Punjab
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
117.245.139.98 | attackspambots | Unauthorized connection attempt from IP address 117.245.139.98 on Port 445(SMB) |
2020-09-01 02:22:53 |
117.245.137.170 | attackbotsspam | Unauthorized connection attempt from IP address 117.245.137.170 on Port 445(SMB) |
2020-05-26 20:24:58 |
117.245.145.192 | attackspam | 1589630895 - 05/16/2020 14:08:15 Host: 117.245.145.192/117.245.145.192 Port: 445 TCP Blocked |
2020-05-17 03:50:41 |
117.245.145.224 | attack | Unauthorized connection attempt from IP address 117.245.145.224 on Port 445(SMB) |
2020-05-06 21:48:40 |
117.245.137.170 | attack | Port scanning |
2020-04-24 17:34:50 |
117.245.139.98 | attackbots | Unauthorized connection attempt from IP address 117.245.139.98 on Port 445(SMB) |
2020-02-18 05:58:21 |
117.245.141.90 | attack | Unauthorized connection attempt detected from IP address 117.245.141.90 to port 445 [T] |
2020-01-09 04:18:40 |
117.245.137.9 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 28-10-2019 11:50:21. |
2019-10-29 00:32:25 |
117.245.145.48 | attackspam | Unauthorized connection attempt from IP address 117.245.145.48 on Port 445(SMB) |
2019-09-24 04:05:15 |
117.245.140.42 | attackbotsspam | Unauthorised access (Sep 9) SRC=117.245.140.42 LEN=52 PREC=0x20 TTL=112 ID=5584 DF TCP DPT=445 WINDOW=8192 SYN |
2019-09-10 04:17:31 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '117.245.0.0 - 117.245.67.255'
% Abuse contact for '117.245.0.0 - 117.245.67.255' is 'abuse1@bsnl.co.in'
inetnum: 117.245.0.0 - 117.245.67.255
netname: WiMAX-BB
descr: Wimax Project, BSNL New Delhi
country: IN
admin-c: BH155-AP
tech-c: DB374-AP
abuse-c: AB1061-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-IN-PER-DOT
mnt-irt: IRT-BSNL-IN
last-modified: 2021-07-15T07:17:15Z
source: APNIC
irt: IRT-BSNL-IN
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
e-mail: abuse1@bsnl.co.in
abuse-mailbox: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
auth: # Filtered
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by: MAINT-IN-DOT
last-modified: 2025-09-04T01:01:13Z
source: APNIC
role: ABUSE BSNLIN
country: ZZ
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
phone: +000000000
e-mail: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
nic-hdl: AB1061-AP
remarks: Generated from irt object IRT-BSNL-IN
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox: abuse1@bsnl.co.in
mnt-by: APNIC-ABUSE
last-modified: 2025-07-02T04:54:12Z
source: APNIC
person: BSNL Hostmaster
nic-hdl: BH155-AP
e-mail: hostmaster@bsnl.co.in
address: Broadband Networks
address: Bharat Sanchar Nigam Limited
address: 2nd Floor, Telephone Exchange, Sector 62
address: Noida
phone: +91-120-2404243
fax-no: +91-120-2404241
country: IN
mnt-by: MAINT-IN-PER-DOT
last-modified: 2021-12-08T10:52:18Z
source: APNIC
person: DGM Broadband
address: BSNL NOC Bangalore
country: IN
phone: +91-080-25805800
fax-no: +91-080-25800022
e-mail: dnwplg@bsnl.in
nic-hdl: DB374-AP
mnt-by: MAINT-IN-PER-DOT
last-modified: 2011-02-19T10:03:44Z
source: APNIC
% Information related to '117.245.0.0/20AS9829'
route: 117.245.0.0/20
descr: BSNL Internet
origin: AS9829
country: IN
mnt-by: MAINT-IN-DOT
last-modified: 2011-01-10T10:35:07Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.245.1.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.245.1.241. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101500 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 15 22:42:00 CST 2025
;; MSG SIZE rcvd: 106
b'Host 241.1.245.117.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 117.245.1.241.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
23.106.123.32 | attackbots | Spam_report |
2020-08-28 01:17:32 |
185.220.100.240 | attack | 400 BAD REQUEST |
2020-08-28 00:48:29 |
83.96.11.210 | attack | SMB Server BruteForce Attack |
2020-08-28 01:16:39 |
106.12.115.169 | attackbots | Aug 27 17:01:13 pornomens sshd\[17912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.115.169 user=root Aug 27 17:01:15 pornomens sshd\[17912\]: Failed password for root from 106.12.115.169 port 49414 ssh2 Aug 27 17:06:27 pornomens sshd\[17968\]: Invalid user ram from 106.12.115.169 port 49310 Aug 27 17:06:27 pornomens sshd\[17968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.115.169 ... |
2020-08-28 01:12:58 |
106.53.229.196 | attackspambots | Aug 27 12:57:29 XXX sshd[65423]: Invalid user operador from 106.53.229.196 port 47022 |
2020-08-28 01:07:47 |
223.111.157.138 | attackbotsspam | Port scanning [2 denied] |
2020-08-28 00:49:58 |
41.94.22.207 | attackspam | IP 41.94.22.207 attacked honeypot on port: 1433 at 8/27/2020 6:00:13 AM |
2020-08-28 00:46:23 |
178.128.242.233 | attackspambots | 2020-08-27T15:02:40.798947n23.at sshd[286717]: Failed password for invalid user jenifer from 178.128.242.233 port 40840 ssh2 2020-08-27T15:09:06.870460n23.at sshd[291802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233 user=root 2020-08-27T15:09:08.726032n23.at sshd[291802]: Failed password for root from 178.128.242.233 port 51858 ssh2 ... |
2020-08-28 01:11:53 |
218.92.0.133 | attackbotsspam | Aug 27 16:22:46 ip-172-31-61-156 sshd[16656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Aug 27 16:22:48 ip-172-31-61-156 sshd[16656]: Failed password for root from 218.92.0.133 port 27247 ssh2 ... |
2020-08-28 00:47:07 |
220.132.124.5 | attackspam | Auto Detect Rule! proto TCP (SYN), 220.132.124.5:63686->gjan.info:23, len 40 |
2020-08-28 00:56:00 |
202.153.33.50 | attack | Unauthorized connection attempt from IP address 202.153.33.50 on Port 445(SMB) |
2020-08-28 01:23:26 |
142.93.212.213 | attackspam | 2020-08-27T07:59:59.474218morrigan.ad5gb.com sshd[2086789]: Invalid user rodolfo from 142.93.212.213 port 57574 2020-08-27T08:00:01.577240morrigan.ad5gb.com sshd[2086789]: Failed password for invalid user rodolfo from 142.93.212.213 port 57574 ssh2 |
2020-08-28 01:18:13 |
68.132.136.198 | attack | Unwanted checking 80 or 443 port ... |
2020-08-28 01:08:51 |
49.156.32.184 | attackspambots | Automatic report - Banned IP Access |
2020-08-28 00:59:24 |
190.144.72.54 | attackbotsspam | Unauthorized connection attempt from IP address 190.144.72.54 on Port 445(SMB) |
2020-08-28 00:43:00 |