城市(city): Mumbai
省份(region): Maharashtra
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 148.113.0.0 - 148.113.255.255
CIDR: 148.113.0.0/16
NetName: HO-2
NetHandle: NET-148-113-0-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: OVH Hosting, Inc. (HO-2)
RegDate: 2021-09-14
Updated: 2021-09-14
Ref: https://rdap.arin.net/registry/ip/148.113.0.0
OrgName: OVH Hosting, Inc.
OrgId: HO-2
Address: 800-1801 McGill College
City: Montreal
StateProv: QC
PostalCode: H3A 2N4
Country: CA
RegDate: 2011-06-22
Updated: 2025-09-04
Ref: https://rdap.arin.net/registry/entity/HO-2
OrgAbuseHandle: ABUSE3956-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-855-684-5463
OrgAbuseEmail: abuse@ovh.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3956-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
# start
NetRange: 148.113.0.0 - 148.113.63.255
CIDR: 148.113.0.0/18
NetName: OVHCLOUD-MUMBAI-01
NetHandle: NET-148-113-0-0-2
Parent: HO-2 (NET-148-113-0-0-1)
NetType: Reallocated
OriginAS:
Organization: OVHTECH R&D (INDIA) PRIVATE LIMITED (ORIPL)
RegDate: 2022-03-17
Updated: 2022-03-17
Ref: https://rdap.arin.net/registry/ip/148.113.0.0
OrgName: OVHTECH R&D (INDIA) PRIVATE LIMITED
OrgId: ORIPL
Address: YOTTA NM1 Hiranandani Fortune City, Survey No. 30, MH SH 76, Panvel
City: Mumbai
StateProv:
PostalCode:
Country: IN
RegDate: 2022-02-26
Updated: 2024-02-08
Ref: https://rdap.arin.net/registry/entity/ORIPL
OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +18556845463
OrgAbuseEmail: abuse@ovhcloud.in
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8944-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
# start
NetRange: 148.113.14.192 - 148.113.14.207
CIDR: 148.113.14.192/28
NetName: OVH-CUST-467443921
NetHandle: NET-148-113-14-192-1
Parent: OVHCLOUD-MUMBAI-01 (NET-148-113-0-0-2)
NetType: Reassigned
OriginAS:
Customer: OVH (C11470105)
RegDate: 2026-01-07
Updated: 2026-01-07
Ref: https://rdap.arin.net/registry/ip/148.113.14.192
CustName: OVH
Address: 1801 McGill College Ave #800
City: Montreal
StateProv: QC
PostalCode: H3A 1Z4
Country: CA
RegDate: 2026-01-07
Updated: 2026-01-07
Ref: https://rdap.arin.net/registry/entity/C11470105
OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +18556845463
OrgAbuseEmail: abuse@ovhcloud.in
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8944-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.113.14.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.113.14.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 11:31:35 CST 2026
;; MSG SIZE rcvd: 107
196.14.113.148.in-addr.arpa domain name pointer ip196.ip-148-113-14.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
196.14.113.148.in-addr.arpa name = ip196.ip-148-113-14.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.106.189.67 | attackspam | WordPress brute force |
2020-06-28 06:04:42 |
| 138.197.163.11 | attackbotsspam | 340. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 49 unique times by 138.197.163.11. |
2020-06-28 06:01:03 |
| 122.51.102.227 | attack | 2020-06-26T17:43:28.3205371495-001 sshd[37894]: Invalid user fh from 122.51.102.227 port 51982 2020-06-26T17:43:28.3237571495-001 sshd[37894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.102.227 2020-06-26T17:43:28.3205371495-001 sshd[37894]: Invalid user fh from 122.51.102.227 port 51982 2020-06-26T17:43:30.3198731495-001 sshd[37894]: Failed password for invalid user fh from 122.51.102.227 port 51982 ssh2 2020-06-26T17:47:50.2202391495-001 sshd[38122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.102.227 user=root 2020-06-26T17:47:52.1817271495-001 sshd[38122]: Failed password for root from 122.51.102.227 port 40218 ssh2 ... |
2020-06-28 06:21:03 |
| 199.187.209.30 | attackbotsspam | WordPress brute force |
2020-06-28 05:55:42 |
| 51.178.218.162 | attack | Jun 27 23:58:13 rotator sshd\[28272\]: Failed password for root from 51.178.218.162 port 38356 ssh2Jun 27 23:58:14 rotator sshd\[28274\]: Invalid user admin from 51.178.218.162Jun 27 23:58:16 rotator sshd\[28274\]: Failed password for invalid user admin from 51.178.218.162 port 51768 ssh2Jun 27 23:58:16 rotator sshd\[28276\]: Invalid user admin from 51.178.218.162Jun 27 23:58:18 rotator sshd\[28276\]: Failed password for invalid user admin from 51.178.218.162 port 36518 ssh2Jun 27 23:58:19 rotator sshd\[28278\]: Invalid user user from 51.178.218.162 ... |
2020-06-28 05:58:34 |
| 13.77.154.108 | attack | 289. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 13.77.154.108. |
2020-06-28 06:05:14 |
| 192.241.218.125 | attackbotsspam | Attempted connection to port 113. |
2020-06-28 06:19:42 |
| 2001:e68:5051:53d3:12be:f5ff:fe29:d018 | attack | Jun 27 14:45:45 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user= |
2020-06-28 05:59:08 |
| 190.113.215.68 | attack | WordPress brute force |
2020-06-28 06:01:53 |
| 49.235.190.177 | attack | Jun 27 23:02:15 mout sshd[7509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.190.177 user=root Jun 27 23:02:17 mout sshd[7509]: Failed password for root from 49.235.190.177 port 54434 ssh2 |
2020-06-28 06:10:37 |
| 122.172.56.229 | attackbots | WordPress brute force |
2020-06-28 06:25:31 |
| 13.72.249.53 | attackbotsspam | 279. On Jun 27 2020 experienced a Brute Force SSH login attempt -> 4 unique times by 13.72.249.53. |
2020-06-28 06:01:21 |
| 170.231.154.196 | attackbots | WordPress brute force |
2020-06-28 06:12:55 |
| 40.74.112.84 | attackbots | Jun 27 23:12:49 vpn01 sshd[3760]: Failed password for root from 40.74.112.84 port 1600 ssh2 ... |
2020-06-28 06:15:11 |
| 52.230.7.48 | attack | 2020-06-27T15:35:46.007168linuxbox-skyline sshd[288624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48 user=root 2020-06-27T15:35:48.323885linuxbox-skyline sshd[288624]: Failed password for root from 52.230.7.48 port 4038 ssh2 ... |
2020-06-28 05:56:28 |