城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '218.248.0.0 - 218.248.255.255'
% Abuse contact for '218.248.0.0 - 218.248.255.255' is 'abuse1@bsnl.co.in'
inetnum: 218.248.0.0 - 218.248.255.255
netname: BSNLNET
descr: National Internet Backbone
descr: Bharat Sanchar Nigam Limited
descr: Sanchar Bhawan, 20, Ashoka Road, New Delhi-110001, India
country: IN
org: ORG-BSNL1-AP
admin-c: NC83-AP
tech-c: CDN1-AP
abuse-c: AB1061-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-IN-DOT
mnt-irt: IRT-BSNL-IN
last-modified: 2020-06-25T06:55:18Z
source: APNIC
irt: IRT-BSNL-IN
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
e-mail: abuse1@bsnl.co.in
abuse-mailbox: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
auth: # Filtered
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by: MAINT-IN-DOT
last-modified: 2025-09-04T01:01:13Z
source: APNIC
organisation: ORG-BSNL1-AP
org-name: Bharat Sanchar Nigam Ltd
org-type: LIR
country: IN
address: Bharat Sanchar Nigam Limited
address: Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, New Delhi ? 110 001
address: India
phone: +91-120-2404243
fax-no: +91-11-26116783
e-mail: hostmaster@bsnl.co.in
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2025-11-05T12:58:52Z
source: APNIC
role: ABUSE BSNLIN
country: ZZ
address: Internet Cell
address: Bharat Sanchar Nigam Limited.
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
phone: +000000000
e-mail: abuse1@bsnl.co.in
admin-c: NC83-AP
tech-c: CGMD1-AP
nic-hdl: AB1061-AP
remarks: Generated from irt object IRT-BSNL-IN
remarks: abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox: abuse1@bsnl.co.in
mnt-by: APNIC-ABUSE
last-modified: 2025-07-02T04:54:12Z
source: APNIC
role: CGM Data Networks
address: CTS Compound
address: Netaji Nagar
address: New Delhi- 110 023
country: IN
phone: +91-11-24106782
phone: +91-11-24102119
fax-no: +91-11-26116783
fax-no: +91-11-26887888
e-mail: dnwplg@bsnl.co.in
e-mail: hostmaster@bsnl.co.in
admin-c: CGMD1-AP
tech-c: DT197-AP
tech-c: BH155-AP
nic-hdl: CDN1-AP
mnt-by: MAINT-IN-DOT
last-modified: 2021-12-08T11:06:57Z
source: APNIC
role: NS Cell
address: Internet Cell
address: Bharat Sanchar Nigam Limited
address: 8th Floor,148-B Statesman House
address: Barakhamba Road, New Delhi - 110 001
country: IN
phone: +91-11-23734057
phone: +91-11-23710183
fax-no: +91-11-23734052
e-mail: hostmaster@bsnl.co.in
e-mail: abuse1@bsnl.co.in
admin-c: CGMD1-AP
tech-c: DT197-AP
nic-hdl: NC83-AP
mnt-by: MAINT-IN-DOT
last-modified: 2022-03-16T10:12:22Z
source: APNIC
% Information related to '218.248.90.0/24AS9829'
route: 218.248.90.0/24
origin: AS9829
descr: Bharat Sanchar Nigam Ltd
Bharat Sanchar Nigam Limited
Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, New Delhi ?? 110 001
India
mnt-by: MAINT-IN-DOT
last-modified: 2025-04-05T06:51:25Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.248.90.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;218.248.90.37. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 00:01:33 CST 2025
;; MSG SIZE rcvd: 106
37.90.248.218.in-addr.arpa domain name pointer static.ill.218.248.90.37/24.bsnl.in.
b'37.90.248.218.in-addr.arpa name = static.ill.218.248.90.37/24.bsnl.in.
Authoritative answers can be found from:
'
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.177.115.22 | attackspambots | Automatic report - Port Scan Attack |
2020-02-15 09:15:41 |
| 222.186.173.183 | attack | 2020-02-15T02:13:48.301169vps751288.ovh.net sshd\[22036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root 2020-02-15T02:13:50.514878vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2 2020-02-15T02:13:53.727778vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2 2020-02-15T02:13:57.020591vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2 2020-02-15T02:14:00.536756vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2 |
2020-02-15 09:25:22 |
| 222.186.15.91 | attack | Feb 15 02:21:28 h2177944 sshd\[13854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91 user=root Feb 15 02:21:31 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2 Feb 15 02:21:32 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2 Feb 15 02:21:34 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2 ... |
2020-02-15 09:24:03 |
| 82.209.236.212 | attack | IMAP brute force ... |
2020-02-15 08:50:09 |
| 213.32.22.239 | attackbots | Automatic report - Banned IP Access |
2020-02-15 09:14:42 |
| 1.201.140.126 | attack | Feb 14 12:19:27 web1 sshd\[7191\]: Invalid user uma from 1.201.140.126 Feb 14 12:19:27 web1 sshd\[7191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126 Feb 14 12:19:29 web1 sshd\[7191\]: Failed password for invalid user uma from 1.201.140.126 port 44884 ssh2 Feb 14 12:23:31 web1 sshd\[7550\]: Invalid user saidee from 1.201.140.126 Feb 14 12:23:31 web1 sshd\[7550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126 |
2020-02-15 08:57:52 |
| 203.57.208.117 | attackspambots | Automatic report - Port Scan Attack |
2020-02-15 09:21:35 |
| 116.233.98.60 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-15 09:24:49 |
| 159.65.158.30 | attackbotsspam | Fail2Ban Ban Triggered |
2020-02-15 09:02:33 |
| 13.69.128.56 | attack | 3389BruteforceStormFW22 |
2020-02-15 08:53:02 |
| 49.235.18.9 | attackbots | Feb 15 01:16:30 silence02 sshd[14338]: Failed password for root from 49.235.18.9 port 51436 ssh2 Feb 15 01:19:25 silence02 sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.18.9 Feb 15 01:19:28 silence02 sshd[14502]: Failed password for invalid user user15 from 49.235.18.9 port 48266 ssh2 |
2020-02-15 08:45:39 |
| 190.103.181.153 | attack | SSH Brute-Force reported by Fail2Ban |
2020-02-15 09:11:38 |
| 1.231.164.208 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 08:44:36 |
| 222.186.175.220 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root Failed password for root from 222.186.175.220 port 33246 ssh2 Failed password for root from 222.186.175.220 port 33246 ssh2 Failed password for root from 222.186.175.220 port 33246 ssh2 Failed password for root from 222.186.175.220 port 33246 ssh2 Failed password for root from 222.186.175.220 port 33246 ssh2 error: maximum authentication attempts exceeded for root from 222.186.175.220 port 33246 ssh2 \[preauth\] pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root |
2020-02-15 09:13:19 |
| 1.227.37.35 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 08:59:59 |