Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gurugram

Region: Haryana

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '115.240.0.0 - 115.247.255.255'

% Abuse contact for '115.240.0.0 - 115.247.255.255' is 'ip.abuse@ril.com'

inetnum:        115.240.0.0 - 115.247.255.255
netname:        RELIANCEJIO-IN
descr:          Reliance Jio Infocomm Limited
country:        IN
org:            ORG-RJIL1-AP
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
abuse-c:        AR1022-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-IN-RELIANCEJIO
mnt-routes:     MAINT-IN-RELIANCEJIO
mnt-irt:        IRT-RELIANCEJIO-IN
last-modified:  2020-08-19T13:07:29Z
source:         APNIC

irt:            IRT-RELIANCEJIO-IN
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
e-mail:         ip.abuse@ril.com
abuse-mailbox:  ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
auth:           # Filtered
remarks:        ip.abuse@ril.com was validated on 2026-02-18
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2026-02-18T13:42:51Z
source:         APNIC

organisation:   ORG-RJIL1-AP
org-name:       Reliance Jio Infocomm Limited
org-type:       LIR
country:        IN
address:        Reliance Coporate IT park LTD
address:        Ghansoli NaviMumbai
phone:          +912279670000
fax-no:         +912279610099
e-mail:         ip.management@ril.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:41Z
source:         APNIC

role:           ABUSE RELIANCEJIOIN
country:        ZZ
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
phone:          +000000000
e-mail:         ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
nic-hdl:        AR1022-AP
remarks:        Generated from irt object IRT-RELIANCEJIO-IN
remarks:        ip.abuse@ril.com was validated on 2026-02-18
abuse-mailbox:  ip.abuse@ril.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-18T13:43:21Z
source:         APNIC

role:           Reliance Jio Infocomm Limited
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country:        IN
phone:          +91-44770000
e-mail:         ip.management@ril.com
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
nic-hdl:        RJIL1-AP
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2016-03-09T23:55:07Z
source:         APNIC

% Information related to '115.241.0.0/17AS55836'

route:          115.241.0.0/17
origin:         AS55836
descr:          Reliance Jio Infocomm Limited
                Reliance Coporate IT park LTD
                Ghansoli NaviMumbai
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2020-08-14T09:39:18Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.241.83.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;115.241.83.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 16:58:13 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 2.83.241.115.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.83.241.115.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.24.178.224 attack
Jan  8 13:04:26 sshgateway sshd\[9765\]: Invalid user GardenUser from 118.24.178.224
Jan  8 13:04:26 sshgateway sshd\[9765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224
Jan  8 13:04:27 sshgateway sshd\[9765\]: Failed password for invalid user GardenUser from 118.24.178.224 port 40444 ssh2
2020-01-08 23:00:27
207.244.124.37 attack
Chat Spam
2020-01-08 23:09:58
186.67.248.8 attackbots
SSH Login Bruteforce
2020-01-08 22:32:48
5.62.34.14 attackspam
1578488698 - 01/08/2020 14:04:58 Host: 5.62.34.14/5.62.34.14 Port: 445 TCP Blocked
2020-01-08 22:41:05
69.94.158.122 attack
Jan  8 15:04:31 grey postfix/smtpd\[12562\]: NOQUEUE: reject: RCPT from wandering.swingthelamp.com\[69.94.158.122\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.122\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.122\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-08 22:58:40
92.118.37.86 attackspambots
Jan  8 15:58:53 debian-2gb-nbg1-2 kernel: \[754848.240454\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=36953 PROTO=TCP SPT=44243 DPT=4224 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-08 23:09:33
124.123.116.153 attackspambots
1578488641 - 01/08/2020 14:04:01 Host: 124.123.116.153/124.123.116.153 Port: 445 TCP Blocked
2020-01-08 23:21:54
206.189.149.9 attack
Jan  8 15:33:24 plex sshd[31492]: Invalid user mating from 206.189.149.9 port 36304
2020-01-08 23:17:18
190.2.106.78 attackspambots
Microsoft Windows Terminal server RDP over non-standard port attempt
2020-01-08 22:48:27
218.69.91.84 attackbotsspam
Jan  8 13:04:56 work-partkepr sshd\[17900\]: Invalid user tomcat4 from 218.69.91.84 port 42057
Jan  8 13:04:56 work-partkepr sshd\[17900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84
...
2020-01-08 22:43:43
31.5.234.238 attack
Jan  8 13:40:23 h2034429 postfix/smtpd[32173]: connect from unknown[31.5.234.238]
Jan x@x
Jan  8 13:40:25 h2034429 postfix/smtpd[32173]: lost connection after DATA from unknown[31.5.234.238]
Jan  8 13:40:25 h2034429 postfix/smtpd[32173]: disconnect from unknown[31.5.234.238] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jan  8 13:41:05 h2034429 postfix/smtpd[32175]: connect from unknown[31.5.234.238]
Jan x@x
Jan  8 13:41:06 h2034429 postfix/smtpd[32175]: lost connection after DATA from unknown[31.5.234.238]
Jan  8 13:41:06 h2034429 postfix/smtpd[32175]: disconnect from unknown[31.5.234.238] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jan  8 13:41:29 h2034429 postfix/smtpd[32196]: connect from unknown[31.5.234.238]
Jan x@x
Jan  8 13:41:30 h2034429 postfix/smtpd[32196]: lost connection after DATA from unknown[31.5.234.238]
Jan  8 13:41:30 h2034429 postfix/smtpd[32196]: disconnect from unknown[31.5.234.238] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
ht
2020-01-08 23:13:01
183.62.55.234 attackbots
Unauthorized connection attempt detected from IP address 183.62.55.234 to port 22 [T]
2020-01-08 22:53:14
125.83.105.182 attack
2020-01-08 07:04:07 dovecot_login authenticator failed for (hxgpp) [125.83.105.182]:57705 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaochao@lerctr.org)
2020-01-08 07:04:14 dovecot_login authenticator failed for (ixrrw) [125.83.105.182]:57705 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaochao@lerctr.org)
2020-01-08 07:04:26 dovecot_login authenticator failed for (hsoml) [125.83.105.182]:57705 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaochao@lerctr.org)
...
2020-01-08 23:02:11
42.101.64.106 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-08 22:33:35
222.186.173.142 attackspam
Jan  8 15:38:39 amit sshd\[5130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Jan  8 15:38:41 amit sshd\[5130\]: Failed password for root from 222.186.173.142 port 57856 ssh2
Jan  8 15:39:01 amit sshd\[5132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
...
2020-01-08 22:41:40

Recently Reported IPs

152.32.129.17 121.40.44.5 157.173.114.130 2606:4700:10::6816:1109
2606:4700:10::6814:5927 2606:4700:10::6816:4822 2606:4700:10::6814:9044 2606:4700:10::6814:7635
164.155.74.153 177.221.64.253 2606:4700:10::6816:119 2606:4700:10::6816:4706
2606:4700:10::6816:226 2606:4700:10::ac43:1878 2606:4700:10::6816:2057 2606:4700:10::6814:8853
2606:4700:10::ac43:1465 2606:4700:10::6816:673 2606:4700:10::6816:1959 2606:4700:10::6816:1759