城市(city): unknown
省份(region): unknown
国家(country): Bangladesh
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '203.194.119.0 - 203.194.119.255'
% Abuse contact for '203.194.119.0 - 203.194.119.255' is 'abuse@adnsl.com'
inetnum: 203.194.119.0 - 203.194.119.255
netname: INGEN-BD-7
descr: ADN Telecom Ltd.
country: BD
admin-c: MK604-AP
tech-c: MK604-AP
abuse-c: AI459-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-INGEN-BD
mnt-irt: IRT-INGEN-BD
last-modified: 2021-05-25T08:22:46Z
source: APNIC
irt: IRT-INGEN-BD
address: Red Crescent Concord Tower (4th Floor),, 17, Mohakhali C/A, Dhaka 1212
e-mail: abuse@adnsl.com
abuse-mailbox: abuse@adnsl.com
admin-c: MK604-AP
tech-c: MK604-AP
auth: # Filtered
remarks: abuse@adnsl.com was validated on 2025-11-05
mnt-by: MAINT-INGEN-BD
last-modified: 2025-11-18T00:31:19Z
source: APNIC
role: ABUSE INGENBD
country: ZZ
address: Red Crescent Concord Tower (4th Floor),, 17, Mohakhali C/A, Dhaka 1212
phone: +000000000
e-mail: abuse@adnsl.com
admin-c: MK604-AP
tech-c: MK604-AP
nic-hdl: AI459-AP
remarks: Generated from irt object IRT-INGEN-BD
remarks: abuse@adnsl.com was validated on 2025-11-05
abuse-mailbox: abuse@adnsl.com
mnt-by: APNIC-ABUSE
last-modified: 2025-11-05T04:25:42Z
source: APNIC
person: Myen Uddin Kamol
nic-hdl: MK604-AP
e-mail: muddin@adnsl.net
address: ADN Telecom Ltd.
address: Red Crescent Concord Tower (19th Floor)
17, Mohakhali Commercial Area
address: Dhaka-1213
address: Bangladesh.
phone: +8802 9841234-8
country: BD
mnt-by: MAINT-ADNTELECOMLTD-BD
last-modified: 2017-10-05T04:06:34Z
source: APNIC
% Information related to '203.194.119.0/24AS38203'
route: 203.194.119.0/24
origin: AS38203
descr: InGen Technology Ltd.
Red Crescent Concord Tower (4th Floor),
17, Mohakhali C/A
mnt-by: MAINT-INGEN-BD
last-modified: 2026-04-12T09:08:12Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.194.119.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.194.119.121. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 13:15:32 CST 2026
;; MSG SIZE rcvd: 108
121.119.194.203.in-addr.arpa domain name pointer ASSIGNED-FOR-CLIENT.adnsl.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
121.119.194.203.in-addr.arpa name = ASSIGNED-FOR-CLIENT.adnsl.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 145.239.73.103 | attackbots | Nov 24 00:32:11 OPSO sshd\[15481\]: Invalid user venjohn from 145.239.73.103 port 58376 Nov 24 00:32:11 OPSO sshd\[15481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103 Nov 24 00:32:13 OPSO sshd\[15481\]: Failed password for invalid user venjohn from 145.239.73.103 port 58376 ssh2 Nov 24 00:38:15 OPSO sshd\[16456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103 user=root Nov 24 00:38:17 OPSO sshd\[16456\]: Failed password for root from 145.239.73.103 port 38038 ssh2 |
2019-11-24 08:05:41 |
| 59.148.173.231 | attack | ssh failed login |
2019-11-24 08:36:18 |
| 182.61.163.126 | attackspam | 2019-11-24T00:22:54.690765shield sshd\[6747\]: Invalid user bardet from 182.61.163.126 port 51188 2019-11-24T00:22:54.697137shield sshd\[6747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126 2019-11-24T00:22:56.786670shield sshd\[6747\]: Failed password for invalid user bardet from 182.61.163.126 port 51188 ssh2 2019-11-24T00:30:03.619835shield sshd\[8915\]: Invalid user vz from 182.61.163.126 port 59696 2019-11-24T00:30:03.624054shield sshd\[8915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126 |
2019-11-24 08:30:36 |
| 178.66.62.53 | attack | 'IP reached maximum auth failures for a one day block' |
2019-11-24 08:08:13 |
| 199.116.115.138 | attackspambots | Automatic report - Banned IP Access |
2019-11-24 08:17:10 |
| 77.125.105.6 | attackspam | Fail2Ban Ban Triggered |
2019-11-24 08:15:18 |
| 123.129.9.16 | attack | badbot |
2019-11-24 08:11:53 |
| 117.50.65.217 | attackspam | 2019-11-23T23:49:36.695916abusebot.cloudsearch.cf sshd\[29229\]: Invalid user ftpuser from 117.50.65.217 port 52120 |
2019-11-24 08:15:02 |
| 112.10.194.16 | attackspambots | badbot |
2019-11-24 08:00:41 |
| 122.3.172.89 | attackspam | Nov 23 19:45:18 XXX sshd[34165]: Invalid user melander from 122.3.172.89 port 48468 |
2019-11-24 08:25:44 |
| 51.75.160.215 | attack | Sep 28 17:14:41 vtv3 sshd[14678]: Invalid user trinity123456789 from 51.75.160.215 port 39384 Sep 28 17:14:41 vtv3 sshd[14678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Sep 28 17:26:33 vtv3 sshd[20732]: Invalid user 1qaz2wsx from 51.75.160.215 port 45672 Sep 28 17:26:33 vtv3 sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Sep 28 17:26:34 vtv3 sshd[20732]: Failed password for invalid user 1qaz2wsx from 51.75.160.215 port 45672 ssh2 Sep 28 17:30:32 vtv3 sshd[22876]: Invalid user jbox from 51.75.160.215 port 57178 Sep 28 17:30:32 vtv3 sshd[22876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Sep 28 17:42:07 vtv3 sshd[28689]: Invalid user dh from 51.75.160.215 port 35240 Sep 28 17:42:07 vtv3 sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Sep 28 17:42:09 vtv3 sshd[2 |
2019-11-24 08:24:00 |
| 51.77.233.163 | attackspam | Unauthorized access detected from banned ip |
2019-11-24 08:19:49 |
| 54.37.136.87 | attackspambots | Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010 Nov 23 23:37:24 srv01 sshd[9553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.87 Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010 Nov 23 23:37:26 srv01 sshd[9553]: Failed password for invalid user guest from 54.37.136.87 port 56010 ssh2 Nov 23 23:43:27 srv01 sshd[10117]: Invalid user guest from 54.37.136.87 port 35026 ... |
2019-11-24 08:37:23 |
| 60.160.143.78 | attackbots | badbot |
2019-11-24 08:35:00 |
| 74.82.215.70 | attack | 2019-11-23T23:48:30.818011abusebot-4.cloudsearch.cf sshd\[11547\]: Invalid user admin from 74.82.215.70 port 49112 |
2019-11-24 08:01:03 |