必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Salem

省份(region): Tamil Nadu

国家(country): India

运营商(isp): Reliance

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       157.48.0.0 - 157.51.255.255
CIDR:           157.48.0.0/14
NetName:        APNIC
NetHandle:      NET-157-48-0-0-1
Parent:         NET157 (NET-157-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2016-03-21
Updated:        2016-03-21
Ref:            https://rdap.arin.net/registry/ip/157.48.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '157.51.0.0 - 157.51.255.255'

% Abuse contact for '157.51.0.0 - 157.51.255.255' is 'ip.abuse@ril.com'

inetnum:        157.51.0.0 - 157.51.255.255
netname:        RELIANCEJIO-IN
descr:          Reliance Jio infocomm ltd
country:        IN
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
abuse-c:        AI808-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-IN-RELIANCEJIO
mnt-irt:        IRT-INFOTELR4G-IN
last-modified:  2021-02-04T11:06:15Z
source:         APNIC

irt:            IRT-INFOTELR4G-IN
address:        Reliance Jio Infocomm Ltd RCP Ghansoli
e-mail:         ip.abuse@ril.com
abuse-mailbox:  ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
auth:           # Filtered
remarks:        ip.abuse@ril.com was validated on 2026-02-18
mnt-by:         MAINT-RELIANCE-INFOTEL-IN
last-modified:  2026-02-18T13:42:50Z
source:         APNIC

role:           ABUSE INFOTELR4GIN
country:        ZZ
address:        Reliance Jio Infocomm Ltd RCP Ghansoli
phone:          +000000000
e-mail:         ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
nic-hdl:        AI808-AP
remarks:        Generated from irt object IRT-INFOTELR4G-IN
remarks:        ip.abuse@ril.com was validated on 2026-02-18
abuse-mailbox:  ip.abuse@ril.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-18T13:43:20Z
source:         APNIC

role:           Reliance Jio Infocomm Limited
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country:        IN
phone:          +91-44770000
e-mail:         ip.management@ril.com
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
nic-hdl:        RJIL1-AP
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2016-03-09T23:55:07Z
source:         APNIC

% Information related to '157.51.104.0/21AS55836'

route:          157.51.104.0/21
origin:         AS55836
descr:          Reliance Jio Infocomm Limited
                Reliance Coporate IT park LTD
                Ghansoli NaviMumbai
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2025-04-15T14:10:48Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.51.106.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57163
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.51.106.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 01:41:38 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 117.106.51.157.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 157.51.106.117.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.99.75.174 attack
Jan 18 20:03:17 s1 sshd\[18124\]: Invalid user dummy from 167.99.75.174 port 59688
Jan 18 20:03:17 s1 sshd\[18124\]: Failed password for invalid user dummy from 167.99.75.174 port 59688 ssh2
Jan 18 20:04:13 s1 sshd\[18175\]: Invalid user webmaster from 167.99.75.174 port 41470
Jan 18 20:04:13 s1 sshd\[18175\]: Failed password for invalid user webmaster from 167.99.75.174 port 41470 ssh2
Jan 18 20:05:12 s1 sshd\[18892\]: Invalid user postgres from 167.99.75.174 port 51506
Jan 18 20:05:12 s1 sshd\[18892\]: Failed password for invalid user postgres from 167.99.75.174 port 51506 ssh2
...
2020-01-19 03:10:51
59.63.210.222 attackspambots
Unauthorized connection attempt detected from IP address 59.63.210.222 to port 2220 [J]
2020-01-19 02:47:42
212.64.29.199 attackspambots
Unauthorized connection attempt detected from IP address 212.64.29.199 to port 2220 [J]
2020-01-19 02:56:23
37.114.159.255 attack
Invalid user admin from 37.114.159.255 port 51180
2020-01-19 02:51:31
91.231.148.50 attack
Unauthorized connection attempt detected from IP address 91.231.148.50 to port 5555 [J]
2020-01-19 02:43:52
5.44.104.214 attackspambots
Invalid user admin from 5.44.104.214 port 51226
2020-01-19 02:53:34
202.137.155.220 attackspam
Invalid user admin from 202.137.155.220 port 35103
2020-01-19 02:58:48
49.234.179.127 attack
Unauthorized connection attempt detected from IP address 49.234.179.127 to port 2220 [J]
2020-01-19 02:49:01
89.144.47.32 attackspambots
Invalid user anonymous from 89.144.47.32 port 16410
2020-01-19 02:44:35
223.247.140.89 attack
Unauthorized connection attempt detected from IP address 223.247.140.89 to port 2220 [J]
2020-01-19 02:54:21
104.131.189.116 attackspam
Unauthorized connection attempt detected from IP address 104.131.189.116 to port 2220 [J]
2020-01-19 02:41:01
103.68.33.34 attack
Invalid user mick from 103.68.33.34 port 43304
2020-01-19 02:42:41
37.252.190.224 attack
Unauthorized connection attempt detected from IP address 37.252.190.224 to port 2220 [J]
2020-01-19 02:51:14
111.230.19.43 attackspambots
Jan 18 19:02:51 mout sshd[26281]: Invalid user db from 111.230.19.43 port 33522
Jan 18 19:02:53 mout sshd[26281]: Failed password for invalid user db from 111.230.19.43 port 33522 ssh2
Jan 18 19:24:25 mout sshd[28545]: Connection closed by 111.230.19.43 port 47300 [preauth]
2020-01-19 02:38:24
70.231.19.203 attackspambots
Invalid user ambari from 70.231.19.203 port 37590
2020-01-19 02:45:43

最近上报的IP列表

130.102.89.124 80.94.92.9 14.153.35.207 13.219.107.176
129.94.177.108 2606:4700:10::6816:2911 198.235.24.95 121.230.89.60
2606:4700:10::6816:3302 109.167.82.139 2606:4700:10::6816:1204 2606:4700:10::6814:4680
127.16.156.136 195.178.110.153 188.166.234.87 121.134.176.129
2606:4700:10::6814:4716 2606:4700:10::6814:6278 2606:4700:10::6814:8961 222.108.161.236