城市(city): Vadodara
省份(region): Gujarat
国家(country): India
运营商(isp): Reliance
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 152.59.0.0 - 152.59.255.255
CIDR: 152.59.0.0/16
NetName: APNIC
NetHandle: NET-152-59-0-0-1
Parent: NET152 (NET-152-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2016-12-19
Updated: 2016-12-19
Ref: https://rdap.arin.net/registry/ip/152.59.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '152.56.0.0 - 152.59.255.255'
% Abuse contact for '152.56.0.0 - 152.59.255.255' is 'ip.abuse@ril.com'
inetnum: 152.56.0.0 - 152.59.255.255
netname: RELIANCEJIO-IN
descr: Reliance Jio Infocomm Limited
country: IN
org: ORG-RJIL1-AP
admin-c: RJIL1-AP
tech-c: RJIL1-AP
abuse-c: AR1022-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-IN-RELIANCEJIO
mnt-routes: MAINT-IN-RELIANCEJIO
mnt-irt: IRT-RELIANCEJIO-IN
last-modified: 2020-08-19T13:07:29Z
source: APNIC
irt: IRT-RELIANCEJIO-IN
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
e-mail: ip.abuse@ril.com
abuse-mailbox: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
auth: # Filtered
remarks: ip.abuse@ril.com was validated on 2025-08-01
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2025-11-18T00:30:41Z
source: APNIC
organisation: ORG-RJIL1-AP
org-name: Reliance Jio Infocomm Limited
org-type: LIR
country: IN
address: Reliance Coporate IT park LTD
address: Ghansoli NaviMumbai
phone: +912279670000
fax-no: +912279610099
e-mail: ip.management@ril.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:41Z
source: APNIC
role: ABUSE RELIANCEJIOIN
country: ZZ
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
phone: +000000000
e-mail: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
nic-hdl: AR1022-AP
remarks: Generated from irt object IRT-RELIANCEJIO-IN
remarks: ip.abuse@ril.com was validated on 2025-08-01
abuse-mailbox: ip.abuse@ril.com
mnt-by: APNIC-ABUSE
last-modified: 2025-08-01T07:19:54Z
source: APNIC
role: Reliance Jio Infocomm Limited
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country: IN
phone: +91-44770000
e-mail: ip.management@ril.com
admin-c: RJIL1-AP
tech-c: RJIL1-AP
nic-hdl: RJIL1-AP
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2016-03-09T23:55:07Z
source: APNIC
% Information related to '152.59.8.0/24AS55836'
route: 152.59.8.0/24
origin: AS55836
descr: Reliance Jio Infocomm Limited
Reliance Coporate IT park LTD
Ghansoli NaviMumbai
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2024-01-12T07:05:39Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.59.8.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;152.59.8.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012602 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 27 09:13:45 CST 2026
;; MSG SIZE rcvd: 103
b'Host 1.8.59.152.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 152.59.8.1.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.61.39.254 | attackbots | Dec 1 15:31:32 h2177944 sshd\[7800\]: Invalid user secorra from 182.61.39.254 port 51602 Dec 1 15:31:32 h2177944 sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254 Dec 1 15:31:34 h2177944 sshd\[7800\]: Failed password for invalid user secorra from 182.61.39.254 port 51602 ssh2 Dec 1 15:45:41 h2177944 sshd\[8188\]: Invalid user ax400 from 182.61.39.254 port 53202 ... |
2019-12-01 23:10:10 |
| 222.186.175.155 | attack | Dec 1 15:53:17 MK-Soft-Root1 sshd[20483]: Failed password for root from 222.186.175.155 port 33730 ssh2 Dec 1 15:53:22 MK-Soft-Root1 sshd[20483]: Failed password for root from 222.186.175.155 port 33730 ssh2 ... |
2019-12-01 23:01:32 |
| 122.199.152.114 | attack | IP blocked |
2019-12-01 23:00:23 |
| 136.232.176.30 | attack | Unauthorized connection attempt from IP address 136.232.176.30 on Port 445(SMB) |
2019-12-01 23:01:56 |
| 119.29.2.157 | attack | Dec 1 15:45:48 serwer sshd\[12672\]: Invalid user claude from 119.29.2.157 port 52733 Dec 1 15:45:48 serwer sshd\[12672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157 Dec 1 15:45:50 serwer sshd\[12672\]: Failed password for invalid user claude from 119.29.2.157 port 52733 ssh2 ... |
2019-12-01 23:00:37 |
| 200.202.246.178 | attackbots | Unauthorized connection attempt from IP address 200.202.246.178 on Port 445(SMB) |
2019-12-01 23:22:20 |
| 178.62.108.111 | attackbotsspam | Connection by 178.62.108.111 on port: 1045 got caught by honeypot at 12/1/2019 1:45:47 PM |
2019-12-01 23:17:05 |
| 222.186.175.183 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Failed password for root from 222.186.175.183 port 30400 ssh2 Failed password for root from 222.186.175.183 port 30400 ssh2 Failed password for root from 222.186.175.183 port 30400 ssh2 Failed password for root from 222.186.175.183 port 30400 ssh2 |
2019-12-01 22:38:50 |
| 59.57.78.84 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-12-01 22:49:11 |
| 46.191.140.52 | attackspam | Unauthorized connection attempt from IP address 46.191.140.52 on Port 445(SMB) |
2019-12-01 23:15:53 |
| 93.48.89.238 | attack | Automatic report - Banned IP Access |
2019-12-01 22:44:36 |
| 118.24.101.182 | attackbotsspam | Dec 1 15:08:55 mout sshd[15034]: Invalid user barc3lona from 118.24.101.182 port 44992 |
2019-12-01 22:39:37 |
| 181.40.81.198 | attackspambots | Dec 1 14:45:47 venus sshd\[32044\]: Invalid user yulissa from 181.40.81.198 port 41953 Dec 1 14:45:47 venus sshd\[32044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.81.198 Dec 1 14:45:49 venus sshd\[32044\]: Failed password for invalid user yulissa from 181.40.81.198 port 41953 ssh2 ... |
2019-12-01 23:05:40 |
| 49.231.247.62 | attackspambots | Unauthorized connection attempt from IP address 49.231.247.62 on Port 445(SMB) |
2019-12-01 23:05:07 |
| 187.44.106.12 | attackspambots | sshd jail - ssh hack attempt |
2019-12-01 22:41:42 |