城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 148.112.0.0 - 148.112.255.255
CIDR: 148.112.0.0/16
NetName: PWNET
NetHandle: NET-148-112-0-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: UBS AG (UBSAG)
RegDate: 1991-03-28
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/148.112.0.0
OrgName: UBS AG
OrgId: UBSAG
Address: 677 Washington Boulevard
City: Stamford
StateProv: CT
PostalCode: 06901
Country: US
RegDate: 2006-06-07
Updated: 2020-08-17
Ref: https://rdap.arin.net/registry/entity/UBSAG
OrgNOCHandle: UBSHO-ARIN
OrgNOCName: UBS Hostmaster
OrgNOCPhone: +41 1 23 61629
OrgNOCEmail: hostmaster@ubs.com
OrgNOCRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
OrgRoutingHandle: UBSHO-ARIN
OrgRoutingName: UBS Hostmaster
OrgRoutingPhone: +41 1 23 61629
OrgRoutingEmail: hostmaster@ubs.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
OrgDNSHandle: UBSHO-ARIN
OrgDNSName: UBS Hostmaster
OrgDNSPhone: +41 1 23 61629
OrgDNSEmail: hostmaster@ubs.com
OrgDNSRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
OrgTechHandle: UBSHO-ARIN
OrgTechName: UBS Hostmaster
OrgTechPhone: +41 1 23 61629
OrgTechEmail: hostmaster@ubs.com
OrgTechRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
OrgAbuseHandle: ABUSE5252-ARIN
OrgAbuseName: Abuse Team
OrgAbusePhone: +41442361629
OrgAbuseEmail: abuse-network@ubs.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5252-ARIN
RTechHandle: UBSHO-ARIN
RTechName: UBS Hostmaster
RTechPhone: +41 1 23 61629
RTechEmail: hostmaster@ubs.com
RTechRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
RNOCHandle: UBSHO-ARIN
RNOCName: UBS Hostmaster
RNOCPhone: +41 1 23 61629
RNOCEmail: hostmaster@ubs.com
RNOCRef: https://rdap.arin.net/registry/entity/UBSHO-ARIN
RAbuseHandle: ABUSE5252-ARIN
RAbuseName: Abuse Team
RAbusePhone: +41442361629
RAbuseEmail: abuse-network@ubs.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5252-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.112.165.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.112.165.46. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 14:48:17 CST 2026
;; MSG SIZE rcvd: 107
Host 46.165.112.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 46.165.112.148.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 144.217.12.194 | attack | SSH Invalid Login |
2020-09-04 07:20:30 |
| 200.21.174.58 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 07:47:22 |
| 85.18.98.208 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-03T20:05:18Z and 2020-09-03T20:12:32Z |
2020-09-04 07:38:09 |
| 81.68.118.120 | attack | Invalid user student from 81.68.118.120 port 43958 |
2020-09-04 07:45:30 |
| 51.89.14.136 | attackspam | 2020-09-03 17:21:43.427448-0500 localhost smtpd[43960]: NOQUEUE: reject: RCPT from unknown[51.89.14.136]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.89.14.136]; from= |
2020-09-04 07:15:13 |
| 212.70.149.83 | attackspambots | 2020-09-04 02:42:36 dovecot_login authenticator failed for \(User\) \[212.70.149.83\]: 535 Incorrect authentication data \(set_id=pelican@org.ua\)2020-09-04 02:43:03 dovecot_login authenticator failed for \(User\) \[212.70.149.83\]: 535 Incorrect authentication data \(set_id=pcc@org.ua\)2020-09-04 02:43:31 dovecot_login authenticator failed for \(User\) \[212.70.149.83\]: 535 Incorrect authentication data \(set_id=pc1@org.ua\) ... |
2020-09-04 07:47:06 |
| 222.186.31.166 | attackspambots | Sep 4 01:39:17 eventyay sshd[15367]: Failed password for root from 222.186.31.166 port 39440 ssh2 Sep 4 01:39:26 eventyay sshd[15369]: Failed password for root from 222.186.31.166 port 18914 ssh2 ... |
2020-09-04 07:43:34 |
| 74.56.131.113 | attackbots | SSH Login Bruteforce |
2020-09-04 07:39:17 |
| 106.12.26.160 | attackbots | Port scan: Attack repeated for 24 hours |
2020-09-04 07:18:30 |
| 192.241.221.249 | attackbots | Sep 3 09:47:31 propaganda sshd[2944]: Connection from 192.241.221.249 port 34394 on 10.0.0.161 port 22 rdomain "" Sep 3 09:47:41 propaganda sshd[2944]: error: kex_exchange_identification: Connection closed by remote host |
2020-09-04 07:31:26 |
| 61.91.57.150 | attackspam | Icarus honeypot on github |
2020-09-04 07:47:36 |
| 104.206.128.42 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 5060 proto: tcp cat: Misc Attackbytes: 60 |
2020-09-04 07:37:53 |
| 197.185.99.55 | attackspam | Sep 2 10:19:05 mxgate1 postfix/postscreen[17278]: CONNECT from [197.185.99.55]:40433 to [176.31.12.44]:25 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17284]: addr 197.185.99.55 listed by domain bl.spamcop.net as 127.0.0.2 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17285]: addr 197.185.99.55 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17283]: addr 197.185.99.55 listed by domain zen.spamhaus.org as 127.0.0.2 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17283]: addr 197.185.99.55 listed by domain zen.spamhaus.org as 127.0.0.11 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17283]: addr 197.185.99.55 listed by domain zen.spamhaus.org as 127.0.0.4 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17286]: addr 197.185.99.55 listed by domain cbl.abuseat.org as 127.0.0.2 Sep 2 10:19:05 mxgate1 postfix/dnsblog[17287]: addr 197.185.99.55 listed by domain b.barracudacentral.org as 127.0.0.2 Sep 2 10:19:11 mxgate1 postfix/postscreen[17278]: DNSBL rank 6 for [197........ ------------------------------- |
2020-09-04 07:19:10 |
| 81.68.95.246 | attack | 2020-09-03T22:31:12.273367dmca.cloudsearch.cf sshd[32569]: Invalid user vc from 81.68.95.246 port 39730 2020-09-03T22:31:12.277592dmca.cloudsearch.cf sshd[32569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.95.246 2020-09-03T22:31:12.273367dmca.cloudsearch.cf sshd[32569]: Invalid user vc from 81.68.95.246 port 39730 2020-09-03T22:31:14.300304dmca.cloudsearch.cf sshd[32569]: Failed password for invalid user vc from 81.68.95.246 port 39730 ssh2 2020-09-03T22:37:28.885367dmca.cloudsearch.cf sshd[353]: Invalid user logview from 81.68.95.246 port 56324 2020-09-03T22:37:28.890624dmca.cloudsearch.cf sshd[353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.95.246 2020-09-03T22:37:28.885367dmca.cloudsearch.cf sshd[353]: Invalid user logview from 81.68.95.246 port 56324 2020-09-03T22:37:31.530807dmca.cloudsearch.cf sshd[353]: Failed password for invalid user logview from 81.68.95.246 port 56324 ssh2 ... |
2020-09-04 07:34:24 |
| 116.103.168.253 | attackbots | 2020-09-03 11:41:08.585863-0500 localhost smtpd[17531]: NOQUEUE: reject: RCPT from unknown[116.103.168.253]: 554 5.7.1 Service unavailable; Client host [116.103.168.253] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/116.103.168.253; from= |
2020-09-04 07:14:54 |