City: Mumbai
Region: Maharashtra
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 148.113.0.0 - 148.113.255.255
CIDR: 148.113.0.0/16
NetName: HO-2
NetHandle: NET-148-113-0-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: OVH Hosting, Inc. (HO-2)
RegDate: 2021-09-14
Updated: 2021-09-14
Ref: https://rdap.arin.net/registry/ip/148.113.0.0
OrgName: OVH Hosting, Inc.
OrgId: HO-2
Address: 800-1801 McGill College
City: Montreal
StateProv: QC
PostalCode: H3A 2N4
Country: CA
RegDate: 2011-06-22
Updated: 2025-09-04
Ref: https://rdap.arin.net/registry/entity/HO-2
OrgAbuseHandle: ABUSE3956-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-855-684-5463
OrgAbuseEmail: abuse@ovh.ca
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3956-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
# start
NetRange: 148.113.0.0 - 148.113.63.255
CIDR: 148.113.0.0/18
NetName: OVHCLOUD-MUMBAI-01
NetHandle: NET-148-113-0-0-2
Parent: HO-2 (NET-148-113-0-0-1)
NetType: Reallocated
OriginAS:
Organization: OVHTECH R&D (INDIA) PRIVATE LIMITED (ORIPL)
RegDate: 2022-03-17
Updated: 2022-03-17
Ref: https://rdap.arin.net/registry/ip/148.113.0.0
OrgName: OVHTECH R&D (INDIA) PRIVATE LIMITED
OrgId: ORIPL
Address: YOTTA NM1 Hiranandani Fortune City, Survey No. 30, MH SH 76, Panvel
City: Mumbai
StateProv:
PostalCode:
Country: IN
RegDate: 2022-02-26
Updated: 2024-02-08
Ref: https://rdap.arin.net/registry/entity/ORIPL
OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +18556845463
OrgAbuseEmail: abuse@ovhcloud.in
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8944-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
# start
NetRange: 148.113.14.192 - 148.113.14.207
CIDR: 148.113.14.192/28
NetName: OVH-CUST-467443921
NetHandle: NET-148-113-14-192-1
Parent: OVHCLOUD-MUMBAI-01 (NET-148-113-0-0-2)
NetType: Reassigned
OriginAS:
Customer: OVH (C11470105)
RegDate: 2026-01-07
Updated: 2026-01-07
Ref: https://rdap.arin.net/registry/ip/148.113.14.192
CustName: OVH
Address: 1801 McGill College Ave #800
City: Montreal
StateProv: QC
PostalCode: H3A 1Z4
Country: CA
RegDate: 2026-01-07
Updated: 2026-01-07
Ref: https://rdap.arin.net/registry/entity/C11470105
OrgAbuseHandle: ABUSE8944-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +18556845463
OrgAbuseEmail: abuse@ovhcloud.in
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8944-ARIN
OrgTechHandle: NOC11876-ARIN
OrgTechName: NOC
OrgTechPhone: +1-855-684-5463
OrgTechEmail: noc@ovh.net
OrgTechRef: https://rdap.arin.net/registry/entity/NOC11876-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.113.14.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.113.14.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 11:31:35 CST 2026
;; MSG SIZE rcvd: 107
196.14.113.148.in-addr.arpa domain name pointer ip196.ip-148-113-14.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
196.14.113.148.in-addr.arpa name = ip196.ip-148-113-14.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.234.218.84 | attack | Sep 10 17:00:43 mail postfix/smtpd\[6220\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 10 17:38:48 mail postfix/smtpd\[7112\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 10 18:18:46 mail postfix/smtpd\[9017\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 10 18:59:32 mail postfix/smtpd\[10497\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-09-11 03:21:42 |
| 183.82.121.34 | attackbots | 2020-09-10T17:04:37.133380upcloud.m0sh1x2.com sshd[20580]: Invalid user mdba from 183.82.121.34 port 48000 |
2020-09-11 03:21:13 |
| 162.243.50.8 | attackspam | (sshd) Failed SSH login from 162.243.50.8 (US/United States/dev.rcms.io): 5 in the last 3600 secs |
2020-09-11 03:18:20 |
| 164.52.24.164 | attackspam |
|
2020-09-11 03:11:12 |
| 43.229.153.81 | attack | Sep 9 19:39:37 mavik sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.81 user=root Sep 9 19:39:39 mavik sshd[18238]: Failed password for root from 43.229.153.81 port 52896 ssh2 Sep 9 19:44:09 mavik sshd[18376]: Invalid user wartex from 43.229.153.81 Sep 9 19:44:09 mavik sshd[18376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.81 Sep 9 19:44:11 mavik sshd[18376]: Failed password for invalid user wartex from 43.229.153.81 port 52034 ssh2 ... |
2020-09-11 02:29:43 |
| 107.170.104.125 | attackspam | SSH Bruteforce attack |
2020-09-11 02:57:38 |
| 59.10.1.159 | attack | Dovecot Invalid User Login Attempt. |
2020-09-11 02:42:52 |
| 152.32.72.37 | attack | Icarus honeypot on github |
2020-09-11 03:07:49 |
| 186.151.197.189 | attack | Sep 11 00:10:43 gw1 sshd[7589]: Failed password for root from 186.151.197.189 port 54900 ssh2 ... |
2020-09-11 03:14:54 |
| 178.33.12.237 | attack | 178.33.12.237 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 10 09:13:39 server2 sshd[17488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.241.199 user=root Sep 10 09:13:41 server2 sshd[17488]: Failed password for root from 150.136.241.199 port 36888 ssh2 Sep 10 09:16:18 server2 sshd[18909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.184.50.174 user=root Sep 10 09:05:48 server2 sshd[13603]: Failed password for root from 178.128.217.58 port 60260 ssh2 Sep 10 09:16:20 server2 sshd[18909]: Failed password for root from 220.184.50.174 port 36912 ssh2 Sep 10 09:21:58 server2 sshd[23607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 user=root IP Addresses Blocked: 150.136.241.199 (US/United States/-) 220.184.50.174 (CN/China/-) 178.128.217.58 (SG/Singapore/-) |
2020-09-11 02:47:46 |
| 119.157.109.51 | attackbotsspam | Attempts against non-existent wp-login |
2020-09-11 02:30:24 |
| 193.169.253.136 | attackbotsspam | Sep 10 13:33:29 srv1 postfix/smtpd[3480]: warning: unknown[193.169.253.136]: SASL LOGIN authentication failed: authentication failure Sep 10 13:35:45 srv1 postfix/smtpd[5640]: warning: unknown[193.169.253.136]: SASL LOGIN authentication failed: authentication failure Sep 10 13:39:20 srv1 postfix/smtpd[5640]: warning: unknown[193.169.253.136]: SASL LOGIN authentication failed: authentication failure Sep 10 13:47:34 srv1 postfix/smtpd[8032]: warning: unknown[193.169.253.136]: SASL LOGIN authentication failed: authentication failure Sep 10 13:49:08 srv1 postfix/smtpd[8032]: warning: unknown[193.169.253.136]: SASL LOGIN authentication failed: authentication failure ... |
2020-09-11 03:17:10 |
| 5.188.87.49 | attack | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-10T18:46:53Z |
2020-09-11 03:07:19 |
| 123.140.114.196 | attack | Failed password for invalid user uftp from 123.140.114.196 port 55778 ssh2 |
2020-09-11 02:49:26 |
| 2a03:2880:30ff:14::face:b00c | attack | Fail2Ban Ban Triggered |
2020-09-11 03:16:03 |