必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mumbai

省份(region): Maharashtra

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       148.113.0.0 - 148.113.255.255
CIDR:           148.113.0.0/16
NetName:        HO-2
NetHandle:      NET-148-113-0-0-1
Parent:         NET148 (NET-148-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   OVH Hosting, Inc. (HO-2)
RegDate:        2021-09-14
Updated:        2021-09-14
Ref:            https://rdap.arin.net/registry/ip/148.113.0.0


OrgName:        OVH Hosting, Inc.
OrgId:          HO-2
Address:        800-1801 McGill College
City:           Montreal
StateProv:      QC
PostalCode:     H3A 2N4
Country:        CA
RegDate:        2011-06-22
Updated:        2025-09-04
Ref:            https://rdap.arin.net/registry/entity/HO-2


OrgAbuseHandle: ABUSE3956-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-855-684-5463 
OrgAbuseEmail:  abuse@ovh.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3956-ARIN

OrgTechHandle: NOC11876-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-855-684-5463 
OrgTechEmail:  noc@ovh.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC11876-ARIN

# end


# start

NetRange:       148.113.0.0 - 148.113.63.255
CIDR:           148.113.0.0/18
NetName:        OVHCLOUD-MUMBAI-01
NetHandle:      NET-148-113-0-0-2
Parent:         HO-2 (NET-148-113-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   OVHTECH R&D (INDIA) PRIVATE LIMITED (ORIPL)
RegDate:        2022-03-17
Updated:        2022-03-17
Ref:            https://rdap.arin.net/registry/ip/148.113.0.0


OrgName:        OVHTECH R&D (INDIA) PRIVATE LIMITED
OrgId:          ORIPL
Address:        YOTTA NM1 Hiranandani Fortune City, Survey No. 30, MH SH 76, Panvel
City:           Mumbai
StateProv:      
PostalCode:     
Country:        IN
RegDate:        2022-02-26
Updated:        2024-02-08
Ref:            https://rdap.arin.net/registry/entity/ORIPL


OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +18556845463 
OrgAbuseEmail:  abuse@ovhcloud.in
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8944-ARIN

OrgTechHandle: NOC11876-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-855-684-5463 
OrgTechEmail:  noc@ovh.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC11876-ARIN

# end


# start

NetRange:       148.113.14.192 - 148.113.14.207
CIDR:           148.113.14.192/28
NetName:        OVH-CUST-467443921
NetHandle:      NET-148-113-14-192-1
Parent:         OVHCLOUD-MUMBAI-01 (NET-148-113-0-0-2)
NetType:        Reassigned
OriginAS:       
Customer:       OVH (C11470105)
RegDate:        2026-01-07
Updated:        2026-01-07
Ref:            https://rdap.arin.net/registry/ip/148.113.14.192


CustName:       OVH
Address:        1801 McGill College Ave #800
City:           Montreal
StateProv:      QC
PostalCode:     H3A 1Z4
Country:        CA
RegDate:        2026-01-07
Updated:        2026-01-07
Ref:            https://rdap.arin.net/registry/entity/C11470105

OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +18556845463 
OrgAbuseEmail:  abuse@ovhcloud.in
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8944-ARIN

OrgTechHandle: NOC11876-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-855-684-5463 
OrgTechEmail:  noc@ovh.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC11876-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.113.14.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.113.14.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 11:31:35 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
196.14.113.148.in-addr.arpa domain name pointer ip196.ip-148-113-14.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.14.113.148.in-addr.arpa	name = ip196.ip-148-113-14.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.106.189.67 attackspam
WordPress brute force
2020-06-28 06:04:42
138.197.163.11 attackbotsspam
340. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 49 unique times by 138.197.163.11.
2020-06-28 06:01:03
122.51.102.227 attack
2020-06-26T17:43:28.3205371495-001 sshd[37894]: Invalid user fh from 122.51.102.227 port 51982
2020-06-26T17:43:28.3237571495-001 sshd[37894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.102.227
2020-06-26T17:43:28.3205371495-001 sshd[37894]: Invalid user fh from 122.51.102.227 port 51982
2020-06-26T17:43:30.3198731495-001 sshd[37894]: Failed password for invalid user fh from 122.51.102.227 port 51982 ssh2
2020-06-26T17:47:50.2202391495-001 sshd[38122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.102.227  user=root
2020-06-26T17:47:52.1817271495-001 sshd[38122]: Failed password for root from 122.51.102.227 port 40218 ssh2
...
2020-06-28 06:21:03
199.187.209.30 attackbotsspam
WordPress brute force
2020-06-28 05:55:42
51.178.218.162 attack
Jun 27 23:58:13 rotator sshd\[28272\]: Failed password for root from 51.178.218.162 port 38356 ssh2Jun 27 23:58:14 rotator sshd\[28274\]: Invalid user admin from 51.178.218.162Jun 27 23:58:16 rotator sshd\[28274\]: Failed password for invalid user admin from 51.178.218.162 port 51768 ssh2Jun 27 23:58:16 rotator sshd\[28276\]: Invalid user admin from 51.178.218.162Jun 27 23:58:18 rotator sshd\[28276\]: Failed password for invalid user admin from 51.178.218.162 port 36518 ssh2Jun 27 23:58:19 rotator sshd\[28278\]: Invalid user user from 51.178.218.162
...
2020-06-28 05:58:34
13.77.154.108 attack
289. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 13.77.154.108.
2020-06-28 06:05:14
192.241.218.125 attackbotsspam
Attempted connection to port 113.
2020-06-28 06:19:42
2001:e68:5051:53d3:12be:f5ff:fe29:d018 attack
Jun 27 14:45:45 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=2001:e68:5051:53d3:12be:f5ff:fe29:d018, lip=2a04:bdc7:100:28::2, TLS, session=<8BDR6BapSoEgAQ5oUFFT0xK+9f/+KdAY>
...
2020-06-28 05:59:08
190.113.215.68 attack
WordPress brute force
2020-06-28 06:01:53
49.235.190.177 attack
Jun 27 23:02:15 mout sshd[7509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.190.177  user=root
Jun 27 23:02:17 mout sshd[7509]: Failed password for root from 49.235.190.177 port 54434 ssh2
2020-06-28 06:10:37
122.172.56.229 attackbots
WordPress brute force
2020-06-28 06:25:31
13.72.249.53 attackbotsspam
279. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 4 unique times by 13.72.249.53.
2020-06-28 06:01:21
170.231.154.196 attackbots
WordPress brute force
2020-06-28 06:12:55
40.74.112.84 attackbots
Jun 27 23:12:49 vpn01 sshd[3760]: Failed password for root from 40.74.112.84 port 1600 ssh2
...
2020-06-28 06:15:11
52.230.7.48 attack
2020-06-27T15:35:46.007168linuxbox-skyline sshd[288624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48  user=root
2020-06-27T15:35:48.323885linuxbox-skyline sshd[288624]: Failed password for root from 52.230.7.48 port 4038 ssh2
...
2020-06-28 05:56:28

最近上报的IP列表

189.157.155.69 178.108.10.57 37.148.214.126 110.77.187.143
2606:4700:10::6816:4853 121.134.176.113 2606:4700:10::6816:353 2606:4700:10::6814:9837
2606:4700:10::6814:9903 14.207.194.27 10.116.128.178 185.247.137.23
14.1.105.214 2606:4700:10::6816:4123 2606:4700:10::ac43:1804 44.244.60.106
34.232.45.99 89.124.8.33 85.217.149.24 168.143.104.245