必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hyderabad

省份(region): Telangana

国家(country): India

运营商(isp): Reliance

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.32.0.0 - 49.47.255.255'

% Abuse contact for '49.32.0.0 - 49.47.255.255' is 'ip.abuse@ril.com'

inetnum:        49.32.0.0 - 49.47.255.255
netname:        RELIANCEJIO-IN
descr:          Reliance Jio Infocomm Limited
country:        IN
org:            ORG-RJIL1-AP
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
abuse-c:        AR1022-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-IN-RELIANCEJIO
mnt-routes:     MAINT-IN-RELIANCEJIO
mnt-irt:        IRT-RELIANCEJIO-IN
last-modified:  2020-08-19T13:07:30Z
source:         APNIC

irt:            IRT-RELIANCEJIO-IN
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
e-mail:         ip.abuse@ril.com
abuse-mailbox:  ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
auth:           # Filtered
remarks:        ip.abuse@ril.com was validated on 2026-02-18
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2026-02-18T13:42:51Z
source:         APNIC

organisation:   ORG-RJIL1-AP
org-name:       Reliance Jio Infocomm Limited
org-type:       LIR
country:        IN
address:        Reliance Coporate IT park LTD
address:        Ghansoli NaviMumbai
phone:          +912279670000
fax-no:         +912279610099
e-mail:         ip.management@ril.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:41Z
source:         APNIC

role:           ABUSE RELIANCEJIOIN
country:        ZZ
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
phone:          +000000000
e-mail:         ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
nic-hdl:        AR1022-AP
remarks:        Generated from irt object IRT-RELIANCEJIO-IN
remarks:        ip.abuse@ril.com was validated on 2026-02-18
abuse-mailbox:  ip.abuse@ril.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-18T13:43:21Z
source:         APNIC

role:           Reliance Jio Infocomm Limited
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country:        IN
phone:          +91-44770000
e-mail:         ip.management@ril.com
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
nic-hdl:        RJIL1-AP
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2016-03-09T23:55:07Z
source:         APNIC

% Information related to '49.43.228.0/22AS55836'

route:          49.43.228.0/22
origin:         AS55836
descr:          Reliance Jio Infocomm Limited
                Reliance Coporate IT park LTD
                Ghansoli NaviMumbai
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2024-01-12T08:25:04Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.43.231.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.43.231.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 21 22:31:10 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 6.231.43.49.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 49.43.231.6.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.204.11.179 attackbots
Sep  6 02:16:53 ArkNodeAT sshd\[26270\]: Invalid user Password from 221.204.11.179
Sep  6 02:16:53 ArkNodeAT sshd\[26270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.204.11.179
Sep  6 02:16:55 ArkNodeAT sshd\[26270\]: Failed password for invalid user Password from 221.204.11.179 port 46021 ssh2
2019-09-06 09:05:30
190.190.40.203 attackspam
Sep  5 11:10:12 hiderm sshd\[2282\]: Invalid user sdtdserver from 190.190.40.203
Sep  5 11:10:12 hiderm sshd\[2282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.190.40.203
Sep  5 11:10:14 hiderm sshd\[2282\]: Failed password for invalid user sdtdserver from 190.190.40.203 port 47688 ssh2
Sep  5 11:15:38 hiderm sshd\[2698\]: Invalid user insserver from 190.190.40.203
Sep  5 11:15:38 hiderm sshd\[2698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.190.40.203
2019-09-06 09:31:15
141.98.81.37 attackbots
Sep  6 02:35:51 vpn01 sshd\[6734\]: Invalid user ubnt from 141.98.81.37
Sep  6 02:35:51 vpn01 sshd\[6734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.37
Sep  6 02:35:53 vpn01 sshd\[6734\]: Failed password for invalid user ubnt from 141.98.81.37 port 33686 ssh2
2019-09-06 09:40:17
190.145.177.2 attackbotsspam
Unauthorized connection attempt from IP address 190.145.177.2 on Port 445(SMB)
2019-09-06 09:26:11
105.23.240.230 attackbotsspam
Unauthorized connection attempt from IP address 105.23.240.230 on Port 445(SMB)
2019-09-06 09:28:00
81.22.45.252 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-09-06 09:41:05
195.175.11.18 attackbotsspam
Port Scan: TCP/445
2019-09-06 09:49:36
89.248.174.201 attackbots
09/05/2019-19:29:19.941551 89.248.174.201 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-06 09:35:27
197.248.16.118 attack
Sep  5 15:06:43 eddieflores sshd\[10969\]: Invalid user deployerpass from 197.248.16.118
Sep  5 15:06:43 eddieflores sshd\[10969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
Sep  5 15:06:45 eddieflores sshd\[10969\]: Failed password for invalid user deployerpass from 197.248.16.118 port 59778 ssh2
Sep  5 15:11:27 eddieflores sshd\[11435\]: Invalid user nagios@123 from 197.248.16.118
Sep  5 15:11:27 eddieflores sshd\[11435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
2019-09-06 09:15:12
114.88.167.46 attackbots
Sep  6 02:21:31 minden010 sshd[24575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.167.46
Sep  6 02:21:33 minden010 sshd[24575]: Failed password for invalid user localadmin from 114.88.167.46 port 60564 ssh2
Sep  6 02:25:13 minden010 sshd[27427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.167.46
...
2019-09-06 09:22:12
212.87.9.155 attack
Sep  6 02:47:46 Ubuntu-1404-trusty-64-minimal sshd\[4648\]: Invalid user test from 212.87.9.155
Sep  6 02:47:46 Ubuntu-1404-trusty-64-minimal sshd\[4648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
Sep  6 02:47:48 Ubuntu-1404-trusty-64-minimal sshd\[4648\]: Failed password for invalid user test from 212.87.9.155 port 49322 ssh2
Sep  6 03:00:47 Ubuntu-1404-trusty-64-minimal sshd\[18598\]: Invalid user oracle from 212.87.9.155
Sep  6 03:00:47 Ubuntu-1404-trusty-64-minimal sshd\[18598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
2019-09-06 09:28:28
14.246.197.94 attackspambots
Unauthorized connection attempt from IP address 14.246.197.94 on Port 445(SMB)
2019-09-06 09:22:44
185.88.174.57 attackspam
Sep  6 04:29:47 our-server-hostname postfix/smtpd[4247]: connect from unknown[185.88.174.57]
Sep  6 04:29:49 our-server-hostname postfix/smtpd[4598]: connect from unknown[185.88.174.57]
Sep x@x
Sep x@x
Sep  6 04:29:49 our-server-hostname postfix/smtpd[4247]: D35B7A40080: client=unknown[185.88.174.57]
Sep x@x
Sep x@x
Sep  6 04:29:50 our-server-hostname postfix/smtpd[4598]: 6C42EA40098: client=unknown[185.88.174.57]
Sep  6 04:29:51 our-server-hostname postfix/smtpd[5291]: 1A21FA400D3: client=unknown[127.0.0.1], orig_client=unknown[185.88.174.57]
Sep  6 04:29:51 our-server-hostname amavis[25940]: (25940-08) Passed CLEAN, [185.88.174.57] [185.88.174.57] , mail_id: WrWLmz6mPLLj, Hhostnames: -, size: 30670, queued_as: 1A21FA400D3, 175 ms
Sep x@x
Sep x@x
Sep  6 04:29:51 our-server-hostname postfix/smtpd[4247]: 4DE56A40080: client=unknown[185.88.174.57]
Sep  6 04:29:51 our-server-hostname postfix/smtpd[30936]: B303BA400D3: client=unknown[127.0.0.1], orig_client=unknown[185........
-------------------------------
2019-09-06 09:25:23
1.189.85.163 attackspam
$f2bV_matches
2019-09-06 09:29:12
122.154.162.21 attackbotsspam
Unauthorized connection attempt from IP address 122.154.162.21 on Port 445(SMB)
2019-09-06 09:13:15

最近上报的IP列表

42.87.85.68 39.98.56.161 47.92.23.206 69.85.11.202
20.78.132.16 8.211.154.34 199.168.138.224 199.168.138.19
199.168.138.182 199.168.138.186 194.187.177.251 80.248.237.100
193.183.76.118 35.203.211.87 121.43.125.129 20.219.32.156
98.81.182.10 47.99.50.46 87.236.176.169 192.36.109.82