Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nāthdwāra

Region: Rajasthan

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       157.48.0.0 - 157.51.255.255
CIDR:           157.48.0.0/14
NetName:        APNIC
NetHandle:      NET-157-48-0-0-1
Parent:         NET157 (NET-157-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2016-03-21
Updated:        2016-03-21
Ref:            https://rdap.arin.net/registry/ip/157.48.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '157.48.0.0 - 157.48.255.255'

% Abuse contact for '157.48.0.0 - 157.48.255.255' is 'ip.abuse@ril.com'

inetnum:        157.48.0.0 - 157.48.255.255
netname:        RELIANCEJIO-IN
descr:          Reliance Jio infocomm ltd
country:        IN
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
abuse-c:        AI808-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-IN-RELIANCEJIO
mnt-irt:        IRT-INFOTELR4G-IN
last-modified:  2021-02-04T11:06:14Z
source:         APNIC

irt:            IRT-INFOTELR4G-IN
address:        Reliance Jio Infocomm Ltd RCP Ghansoli
e-mail:         ip.abuse@ril.com
abuse-mailbox:  ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
auth:           # Filtered
remarks:        ip.abuse@ril.com was validated on 2025-08-01
mnt-by:         MAINT-RELIANCE-INFOTEL-IN
last-modified:  2025-11-18T00:27:50Z
source:         APNIC

role:           ABUSE INFOTELR4GIN
country:        ZZ
address:        Reliance Jio Infocomm Ltd RCP Ghansoli
phone:          +000000000
e-mail:         ip.abuse@ril.com
admin-c:        IBSP1-AP
tech-c:         IBSP1-AP
nic-hdl:        AI808-AP
remarks:        Generated from irt object IRT-INFOTELR4G-IN
remarks:        ip.abuse@ril.com was validated on 2025-08-01
abuse-mailbox:  ip.abuse@ril.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-08-01T07:19:54Z
source:         APNIC

role:           Reliance Jio Infocomm Limited
address:        Reliance JIO INFOCOMM LTD GHANSOLI INDIA
country:        IN
phone:          +91-44770000
e-mail:         ip.management@ril.com
admin-c:        RJIL1-AP
tech-c:         RJIL1-AP
nic-hdl:        RJIL1-AP
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2016-03-09T23:55:07Z
source:         APNIC

% Information related to '157.48.192.0/21AS55836'

route:          157.48.192.0/21
origin:         AS55836
descr:          Reliance Jio Infocomm Limited
                Reliance Coporate IT park LTD
                Ghansoli NaviMumbai
mnt-by:         MAINT-IN-RELIANCEJIO
last-modified:  2025-04-30T07:53:48Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.48.194.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.48.194.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020302 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 10:36:25 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 106.194.48.157.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 157.48.194.106.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.18 attackspambots
08/28/2019-14:21:38.273848 185.176.27.18 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-29 02:29:03
103.249.227.246 attack
Brute forcing RDP port 3389
2019-08-29 02:38:03
159.89.172.215 attackbotsspam
Aug 28 20:53:12 eventyay sshd[22107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.172.215
Aug 28 20:53:14 eventyay sshd[22107]: Failed password for invalid user video from 159.89.172.215 port 55678 ssh2
Aug 28 20:57:56 eventyay sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.172.215
...
2019-08-29 03:09:25
115.42.181.170 attack
Aug 28 13:23:31 oldtbh2 sshd[55234]: Failed unknown for invalid user devuser from 115.42.181.170 port 39458 ssh2
Aug 28 13:30:03 oldtbh2 sshd[55277]: Failed unknown for invalid user test from 115.42.181.170 port 55194 ssh2
Aug 28 13:38:23 oldtbh2 sshd[55316]: Failed unknown for invalid user teacher1 from 115.42.181.170 port 42688 ssh2
...
2019-08-29 02:59:02
222.186.15.110 attackbots
Aug 28 08:41:18 hcbb sshd\[30611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Aug 28 08:41:20 hcbb sshd\[30611\]: Failed password for root from 222.186.15.110 port 15455 ssh2
Aug 28 08:41:22 hcbb sshd\[30611\]: Failed password for root from 222.186.15.110 port 15455 ssh2
Aug 28 08:41:24 hcbb sshd\[30611\]: Failed password for root from 222.186.15.110 port 15455 ssh2
Aug 28 08:41:25 hcbb sshd\[30615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
2019-08-29 02:44:52
31.154.16.105 attackspam
Automatic report - Banned IP Access
2019-08-29 02:42:10
128.14.209.250 attackbotsspam
Microsoft Windows HTTP.sys Remote Code Execution Vulnerability, PTR: survey.internet-census.org.
2019-08-29 02:26:47
149.202.204.141 attack
Aug 28 08:43:01 lcprod sshd\[6862\]: Invalid user penis from 149.202.204.141
Aug 28 08:43:01 lcprod sshd\[6862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=core00.0k.io
Aug 28 08:43:03 lcprod sshd\[6862\]: Failed password for invalid user penis from 149.202.204.141 port 37984 ssh2
Aug 28 08:46:57 lcprod sshd\[7204\]: Invalid user hp from 149.202.204.141
Aug 28 08:46:57 lcprod sshd\[7204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=core00.0k.io
2019-08-29 02:48:05
148.70.35.109 attackbotsspam
2019-08-28T18:32:05.805603abusebot.cloudsearch.cf sshd\[20291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.35.109  user=root
2019-08-29 02:54:21
162.214.21.81 attackspam
Forged login request.
2019-08-29 03:07:46
104.236.72.182 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-29 02:30:32
181.120.217.244 attackspam
Aug 28 21:28:11 server sshd\[16956\]: Invalid user pico from 181.120.217.244 port 57430
Aug 28 21:28:11 server sshd\[16956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.217.244
Aug 28 21:28:12 server sshd\[16956\]: Failed password for invalid user pico from 181.120.217.244 port 57430 ssh2
Aug 28 21:33:41 server sshd\[23298\]: Invalid user sinus1 from 181.120.217.244 port 45624
Aug 28 21:33:41 server sshd\[23298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.217.244
2019-08-29 02:43:17
183.96.89.113 attackspam
proto=tcp  .  spt=33911  .  dpt=25  .     (listed on     Github Combined on 4 lists )     (770)
2019-08-29 02:49:49
177.237.158.47 attackspambots
Aug 28 19:57:37 v22018053744266470 sshd[32383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.237.158.47
Aug 28 19:57:39 v22018053744266470 sshd[32383]: Failed password for invalid user maundy from 177.237.158.47 port 45393 ssh2
Aug 28 20:01:49 v22018053744266470 sshd[32708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.237.158.47
...
2019-08-29 02:35:42
159.89.170.154 attackspambots
Aug 28 08:15:52 friendsofhawaii sshd\[26980\]: Invalid user backup1 from 159.89.170.154
Aug 28 08:15:52 friendsofhawaii sshd\[26980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154
Aug 28 08:15:54 friendsofhawaii sshd\[26980\]: Failed password for invalid user backup1 from 159.89.170.154 port 41834 ssh2
Aug 28 08:20:32 friendsofhawaii sshd\[27328\]: Invalid user archiv from 159.89.170.154
Aug 28 08:20:32 friendsofhawaii sshd\[27328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154
2019-08-29 02:34:18

Recently Reported IPs

54.227.131.131 174.138.20.6 207.6.29.167 104.248.187.215
204.48.31.188 74.249.177.184 35.149.183.157 134.122.68.94
35.149.183.143 69.5.7.169 10.188.33.52 182.141.248.78
254.238.255.201 20.169.106.8 18.139.175.6 117.48.193.133
91.230.168.102 195.184.76.144 116.76.38.239 35.203.211.14