必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '218.248.0.0 - 218.248.255.255'

% Abuse contact for '218.248.0.0 - 218.248.255.255' is 'abuse1@bsnl.co.in'

inetnum:        218.248.0.0 - 218.248.255.255
netname:        BSNLNET
descr:          National Internet Backbone
descr:          Bharat Sanchar Nigam Limited
descr:          Sanchar Bhawan, 20, Ashoka Road, New Delhi-110001, India
country:        IN
org:            ORG-BSNL1-AP
admin-c:        NC83-AP
tech-c:         CDN1-AP
abuse-c:        AB1061-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-IN-DOT
mnt-irt:        IRT-BSNL-IN
last-modified:  2020-06-25T06:55:18Z
source:         APNIC

irt:            IRT-BSNL-IN
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
e-mail:         abuse1@bsnl.co.in
abuse-mailbox:  abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
auth:           # Filtered
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
mnt-by:         MAINT-IN-DOT
last-modified:  2025-09-04T01:01:13Z
source:         APNIC

organisation:   ORG-BSNL1-AP
org-name:       Bharat Sanchar Nigam Ltd
org-type:       LIR
country:        IN
address:        Bharat Sanchar Nigam Limited
address:        Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, New Delhi ? 110 001
address:        India
phone:          +91-120-2404243
fax-no:         +91-11-26116783
e-mail:         hostmaster@bsnl.co.in
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2025-11-05T12:58:52Z
source:         APNIC

role:           ABUSE BSNLIN
country:        ZZ
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited.
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
phone:          +000000000
e-mail:         abuse1@bsnl.co.in
admin-c:        NC83-AP
tech-c:         CGMD1-AP
nic-hdl:        AB1061-AP
remarks:        Generated from irt object IRT-BSNL-IN
remarks:        abuse1@bsnl.co.in was validated on 2025-07-02
abuse-mailbox:  abuse1@bsnl.co.in
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-02T04:54:12Z
source:         APNIC

role:           CGM Data Networks
address:        CTS Compound
address:        Netaji Nagar
address:        New Delhi- 110 023
country:        IN
phone:          +91-11-24106782
phone:          +91-11-24102119
fax-no:         +91-11-26116783
fax-no:         +91-11-26887888
e-mail:         dnwplg@bsnl.co.in
e-mail:         hostmaster@bsnl.co.in
admin-c:        CGMD1-AP
tech-c:         DT197-AP
tech-c:         BH155-AP
nic-hdl:        CDN1-AP
mnt-by:         MAINT-IN-DOT
last-modified:  2021-12-08T11:06:57Z
source:         APNIC

role:           NS Cell
address:        Internet Cell
address:        Bharat Sanchar Nigam Limited
address:        8th Floor,148-B Statesman House
address:        Barakhamba Road, New Delhi - 110 001
country:        IN
phone:          +91-11-23734057
phone:          +91-11-23710183
fax-no:         +91-11-23734052
e-mail:         hostmaster@bsnl.co.in
e-mail:         abuse1@bsnl.co.in
admin-c:        CGMD1-AP
tech-c:         DT197-AP
nic-hdl:        NC83-AP
mnt-by:         MAINT-IN-DOT
last-modified:  2022-03-16T10:12:22Z
source:         APNIC

% Information related to '218.248.90.0/24AS9829'

route:          218.248.90.0/24
origin:         AS9829
descr:          Bharat Sanchar Nigam Ltd
                Bharat Sanchar Nigam Limited
                Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, New Delhi ?? 110 001
                India
mnt-by:         MAINT-IN-DOT
last-modified:  2025-04-05T06:51:25Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.248.90.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.248.90.37.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 00:01:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
37.90.248.218.in-addr.arpa domain name pointer static.ill.218.248.90.37/24.bsnl.in.
NSLOOKUP信息:
b'37.90.248.218.in-addr.arpa	name = static.ill.218.248.90.37/24.bsnl.in.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.177.115.22 attackspambots
Automatic report - Port Scan Attack
2020-02-15 09:15:41
222.186.173.183 attack
2020-02-15T02:13:48.301169vps751288.ovh.net sshd\[22036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2020-02-15T02:13:50.514878vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2
2020-02-15T02:13:53.727778vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2
2020-02-15T02:13:57.020591vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2
2020-02-15T02:14:00.536756vps751288.ovh.net sshd\[22036\]: Failed password for root from 222.186.173.183 port 43740 ssh2
2020-02-15 09:25:22
222.186.15.91 attack
Feb 15 02:21:28 h2177944 sshd\[13854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Feb 15 02:21:31 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2
Feb 15 02:21:32 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2
Feb 15 02:21:34 h2177944 sshd\[13854\]: Failed password for root from 222.186.15.91 port 20108 ssh2
...
2020-02-15 09:24:03
82.209.236.212 attack
IMAP brute force
...
2020-02-15 08:50:09
213.32.22.239 attackbots
Automatic report - Banned IP Access
2020-02-15 09:14:42
1.201.140.126 attack
Feb 14 12:19:27 web1 sshd\[7191\]: Invalid user uma from 1.201.140.126
Feb 14 12:19:27 web1 sshd\[7191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126
Feb 14 12:19:29 web1 sshd\[7191\]: Failed password for invalid user uma from 1.201.140.126 port 44884 ssh2
Feb 14 12:23:31 web1 sshd\[7550\]: Invalid user saidee from 1.201.140.126
Feb 14 12:23:31 web1 sshd\[7550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126
2020-02-15 08:57:52
203.57.208.117 attackspambots
Automatic report - Port Scan Attack
2020-02-15 09:21:35
116.233.98.60 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-15 09:24:49
159.65.158.30 attackbotsspam
Fail2Ban Ban Triggered
2020-02-15 09:02:33
13.69.128.56 attack
3389BruteforceStormFW22
2020-02-15 08:53:02
49.235.18.9 attackbots
Feb 15 01:16:30 silence02 sshd[14338]: Failed password for root from 49.235.18.9 port 51436 ssh2
Feb 15 01:19:25 silence02 sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.18.9
Feb 15 01:19:28 silence02 sshd[14502]: Failed password for invalid user user15 from 49.235.18.9 port 48266 ssh2
2020-02-15 08:45:39
190.103.181.153 attack
SSH Brute-Force reported by Fail2Ban
2020-02-15 09:11:38
1.231.164.208 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 08:44:36
222.186.175.220 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Failed password for root from 222.186.175.220 port 33246 ssh2
Failed password for root from 222.186.175.220 port 33246 ssh2
Failed password for root from 222.186.175.220 port 33246 ssh2
Failed password for root from 222.186.175.220 port 33246 ssh2
Failed password for root from 222.186.175.220 port 33246 ssh2
error: maximum authentication attempts exceeded for root from 222.186.175.220 port 33246 ssh2 \[preauth\]
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-02-15 09:13:19
1.227.37.35 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 08:59:59

最近上报的IP列表

37.78.233.130 135.237.127.161 185.100.233.188 171.117.10.212
35.203.210.112 199.244.88.232 180.153.236.86 180.153.236.163
121.201.122.3 141.98.197.31 78.135.107.199 45.153.34.14
14.213.49.223 115.60.45.53 54.88.251.164 54.209.126.68
44.204.27.243 107.20.3.176 27.46.69.11 195.184.76.89