City: Vadodara
Region: Gujarat
Country: India
Internet Service Provider: Reliance
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 152.59.0.0 - 152.59.255.255
CIDR: 152.59.0.0/16
NetName: APNIC
NetHandle: NET-152-59-0-0-1
Parent: NET152 (NET-152-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2016-12-19
Updated: 2016-12-19
Ref: https://rdap.arin.net/registry/ip/152.59.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '152.56.0.0 - 152.59.255.255'
% Abuse contact for '152.56.0.0 - 152.59.255.255' is 'ip.abuse@ril.com'
inetnum: 152.56.0.0 - 152.59.255.255
netname: RELIANCEJIO-IN
descr: Reliance Jio Infocomm Limited
country: IN
org: ORG-RJIL1-AP
admin-c: RJIL1-AP
tech-c: RJIL1-AP
abuse-c: AR1022-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-IN-RELIANCEJIO
mnt-routes: MAINT-IN-RELIANCEJIO
mnt-irt: IRT-RELIANCEJIO-IN
last-modified: 2020-08-19T13:07:29Z
source: APNIC
irt: IRT-RELIANCEJIO-IN
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
e-mail: ip.abuse@ril.com
abuse-mailbox: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
auth: # Filtered
remarks: ip.abuse@ril.com was validated on 2025-08-01
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2025-11-18T00:30:41Z
source: APNIC
organisation: ORG-RJIL1-AP
org-name: Reliance Jio Infocomm Limited
org-type: LIR
country: IN
address: Reliance Coporate IT park LTD
address: Ghansoli NaviMumbai
phone: +912279670000
fax-no: +912279610099
e-mail: ip.management@ril.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:41Z
source: APNIC
role: ABUSE RELIANCEJIOIN
country: ZZ
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
phone: +000000000
e-mail: ip.abuse@ril.com
admin-c: IBSP1-AP
tech-c: IBSP1-AP
nic-hdl: AR1022-AP
remarks: Generated from irt object IRT-RELIANCEJIO-IN
remarks: ip.abuse@ril.com was validated on 2025-08-01
abuse-mailbox: ip.abuse@ril.com
mnt-by: APNIC-ABUSE
last-modified: 2025-08-01T07:19:54Z
source: APNIC
role: Reliance Jio Infocomm Limited
address: Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country: IN
phone: +91-44770000
e-mail: ip.management@ril.com
admin-c: RJIL1-AP
tech-c: RJIL1-AP
nic-hdl: RJIL1-AP
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2016-03-09T23:55:07Z
source: APNIC
% Information related to '152.59.8.0/24AS55836'
route: 152.59.8.0/24
origin: AS55836
descr: Reliance Jio Infocomm Limited
Reliance Coporate IT park LTD
Ghansoli NaviMumbai
mnt-by: MAINT-IN-RELIANCEJIO
last-modified: 2024-01-12T07:05:39Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.59.8.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;152.59.8.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012602 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 27 09:13:45 CST 2026
;; MSG SIZE rcvd: 103
b'Host 1.8.59.152.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 152.59.8.1.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.176.128 | attackspambots | fail2ban |
2020-04-25 05:19:54 |
| 80.82.78.20 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 3234 proto: TCP cat: Misc Attack |
2020-04-25 04:58:28 |
| 106.12.189.2 | attackspam | DATE:2020-04-24 22:30:34, IP:106.12.189.2, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-25 05:04:11 |
| 125.25.57.33 | attack | 125.25.57.33 - - [24/Apr/2020:22:30:17 +0200] "GET /awstats.pl?config=www.haustechnikdialog.de%2Fredirect.ashx%3Furl%3Dhttps%3A%2F%2Fsouldja.de%2Fohrringe&lang=en&output=main HTTP/1.0" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.3) Gecko/20100101 Firefox/42.0" |
2020-04-25 05:23:59 |
| 141.98.81.99 | attackspambots | Apr 24 22:34:39 home sshd[26992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.99 Apr 24 22:34:41 home sshd[26992]: Failed password for invalid user Administrator from 141.98.81.99 port 39041 ssh2 Apr 24 22:35:04 home sshd[27065]: Failed password for root from 141.98.81.99 port 35171 ssh2 ... |
2020-04-25 04:57:24 |
| 103.255.4.4 | attack | Unauthorized connection attempt from IP address 103.255.4.4 on Port 445(SMB) |
2020-04-25 04:50:43 |
| 114.112.72.130 | attack | trying to access non-authorized port |
2020-04-25 04:51:33 |
| 142.93.195.15 | attackspambots | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2020-04-25 04:48:07 |
| 193.202.45.202 | attackbots | 193.202.45.202 was recorded 18 times by 10 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 18, 75, 1140 |
2020-04-25 05:25:54 |
| 104.236.142.89 | attack | Apr 24 22:28:56 PorscheCustomer sshd[5170]: Failed password for root from 104.236.142.89 port 38724 ssh2 Apr 24 22:30:43 PorscheCustomer sshd[5210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.89 Apr 24 22:30:45 PorscheCustomer sshd[5210]: Failed password for invalid user spark from 104.236.142.89 port 41644 ssh2 ... |
2020-04-25 04:52:02 |
| 90.189.117.121 | attack | Fail2Ban Ban Triggered (2) |
2020-04-25 05:24:51 |
| 85.172.98.94 | attackbotsspam | Draytek Vigor Remote Command Execution Vulnerability |
2020-04-25 05:04:40 |
| 92.207.180.50 | attackspam | Apr 24 23:01:05 server sshd[13397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 Apr 24 23:01:07 server sshd[13397]: Failed password for invalid user molodtsov from 92.207.180.50 port 57005 ssh2 Apr 24 23:05:22 server sshd[13690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 ... |
2020-04-25 05:14:15 |
| 106.53.94.190 | attackbotsspam | SSH bruteforce (Triggered fail2ban) |
2020-04-25 04:47:38 |
| 31.132.159.31 | attackspam | Unauthorized connection attempt from IP address 31.132.159.31 on Port 445(SMB) |
2020-04-25 04:54:37 |