必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.194.119.0 - 203.194.119.255'

% Abuse contact for '203.194.119.0 - 203.194.119.255' is 'abuse@adnsl.com'

inetnum:        203.194.119.0 - 203.194.119.255
netname:        INGEN-BD-7
descr:          ADN Telecom Ltd.
country:        BD
admin-c:        MK604-AP
tech-c:         MK604-AP
abuse-c:        AI459-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-INGEN-BD
mnt-irt:        IRT-INGEN-BD
last-modified:  2021-05-25T08:22:46Z
source:         APNIC

irt:            IRT-INGEN-BD
address:        Red Crescent Concord Tower (4th Floor),, 17, Mohakhali C/A, Dhaka 1212
e-mail:         abuse@adnsl.com
abuse-mailbox:  abuse@adnsl.com
admin-c:        MK604-AP
tech-c:         MK604-AP
auth:           # Filtered
remarks:        abuse@adnsl.com was validated on 2025-11-05
mnt-by:         MAINT-INGEN-BD
last-modified:  2025-11-18T00:31:19Z
source:         APNIC

role:           ABUSE INGENBD
country:        ZZ
address:        Red Crescent Concord Tower (4th Floor),, 17, Mohakhali C/A, Dhaka 1212
phone:          +000000000
e-mail:         abuse@adnsl.com
admin-c:        MK604-AP
tech-c:         MK604-AP
nic-hdl:        AI459-AP
remarks:        Generated from irt object IRT-INGEN-BD
remarks:        abuse@adnsl.com was validated on 2025-11-05
abuse-mailbox:  abuse@adnsl.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-05T04:25:42Z
source:         APNIC

person:         Myen Uddin Kamol
nic-hdl:        MK604-AP
e-mail:         muddin@adnsl.net
address:        ADN Telecom Ltd.
address:        Red Crescent Concord Tower (19th Floor)
                17, Mohakhali Commercial Area
address:        Dhaka-1213
address:        Bangladesh.
phone:          +8802 9841234-8
country:        BD
mnt-by:         MAINT-ADNTELECOMLTD-BD
last-modified:  2017-10-05T04:06:34Z
source:         APNIC

% Information related to '203.194.119.0/24AS38203'

route:          203.194.119.0/24
origin:         AS38203
descr:          InGen Technology Ltd.
                Red Crescent Concord Tower (4th Floor),
                17, Mohakhali C/A
mnt-by:         MAINT-INGEN-BD
last-modified:  2026-04-12T09:08:12Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.194.119.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.194.119.121.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051501 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 13:15:32 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
121.119.194.203.in-addr.arpa domain name pointer ASSIGNED-FOR-CLIENT.adnsl.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.119.194.203.in-addr.arpa	name = ASSIGNED-FOR-CLIENT.adnsl.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.239.73.103 attackbots
Nov 24 00:32:11 OPSO sshd\[15481\]: Invalid user venjohn from 145.239.73.103 port 58376
Nov 24 00:32:11 OPSO sshd\[15481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103
Nov 24 00:32:13 OPSO sshd\[15481\]: Failed password for invalid user venjohn from 145.239.73.103 port 58376 ssh2
Nov 24 00:38:15 OPSO sshd\[16456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103  user=root
Nov 24 00:38:17 OPSO sshd\[16456\]: Failed password for root from 145.239.73.103 port 38038 ssh2
2019-11-24 08:05:41
59.148.173.231 attack
ssh failed login
2019-11-24 08:36:18
182.61.163.126 attackspam
2019-11-24T00:22:54.690765shield sshd\[6747\]: Invalid user bardet from 182.61.163.126 port 51188
2019-11-24T00:22:54.697137shield sshd\[6747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126
2019-11-24T00:22:56.786670shield sshd\[6747\]: Failed password for invalid user bardet from 182.61.163.126 port 51188 ssh2
2019-11-24T00:30:03.619835shield sshd\[8915\]: Invalid user vz from 182.61.163.126 port 59696
2019-11-24T00:30:03.624054shield sshd\[8915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126
2019-11-24 08:30:36
178.66.62.53 attack
'IP reached maximum auth failures for a one day block'
2019-11-24 08:08:13
199.116.115.138 attackspambots
Automatic report - Banned IP Access
2019-11-24 08:17:10
77.125.105.6 attackspam
Fail2Ban Ban Triggered
2019-11-24 08:15:18
123.129.9.16 attack
badbot
2019-11-24 08:11:53
117.50.65.217 attackspam
2019-11-23T23:49:36.695916abusebot.cloudsearch.cf sshd\[29229\]: Invalid user ftpuser from 117.50.65.217 port 52120
2019-11-24 08:15:02
112.10.194.16 attackspambots
badbot
2019-11-24 08:00:41
122.3.172.89 attackspam
Nov 23 19:45:18 XXX sshd[34165]: Invalid user melander from 122.3.172.89 port 48468
2019-11-24 08:25:44
51.75.160.215 attack
Sep 28 17:14:41 vtv3 sshd[14678]: Invalid user trinity123456789 from 51.75.160.215 port 39384
Sep 28 17:14:41 vtv3 sshd[14678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:26:33 vtv3 sshd[20732]: Invalid user 1qaz2wsx from 51.75.160.215 port 45672
Sep 28 17:26:33 vtv3 sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:26:34 vtv3 sshd[20732]: Failed password for invalid user 1qaz2wsx from 51.75.160.215 port 45672 ssh2
Sep 28 17:30:32 vtv3 sshd[22876]: Invalid user jbox from 51.75.160.215 port 57178
Sep 28 17:30:32 vtv3 sshd[22876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:42:07 vtv3 sshd[28689]: Invalid user dh from 51.75.160.215 port 35240
Sep 28 17:42:07 vtv3 sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
Sep 28 17:42:09 vtv3 sshd[2
2019-11-24 08:24:00
51.77.233.163 attackspam
Unauthorized access detected from banned ip
2019-11-24 08:19:49
54.37.136.87 attackspambots
Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010
Nov 23 23:37:24 srv01 sshd[9553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.87
Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010
Nov 23 23:37:26 srv01 sshd[9553]: Failed password for invalid user guest from 54.37.136.87 port 56010 ssh2
Nov 23 23:43:27 srv01 sshd[10117]: Invalid user guest from 54.37.136.87 port 35026
...
2019-11-24 08:37:23
60.160.143.78 attackbots
badbot
2019-11-24 08:35:00
74.82.215.70 attack
2019-11-23T23:48:30.818011abusebot-4.cloudsearch.cf sshd\[11547\]: Invalid user admin from 74.82.215.70 port 49112
2019-11-24 08:01:03

最近上报的IP列表

2606:4700:10::ac43:2378 121.204.209.130 43.248.102.159 176.65.139.229
2606:4700:10::6814:8543 2606:4700:10::ac43:2169 2606:4700:10::6816:2213 91.79.146.72
34.156.121.237 130.211.60.111 121.234.219.99 192.168.178.179
193.185.140.118 192.154.143.254 43.163.4.179 10.164.101.139
180.93.128.189 103.173.7.239 2606:4700:10::6814:7129 2606:4700:10::6814:8804