Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.64.142.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.64.142.148.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092401 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 25 06:19:08 CST 2022
;; MSG SIZE  rcvd: 105
Host info
148.142.64.1.in-addr.arpa domain name pointer 1-64-142-148.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.142.64.1.in-addr.arpa	name = 1-64-142-148.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.88.227.250 attackbots
Automatic report - XMLRPC Attack
2020-05-21 23:44:26
213.138.209.109 attack
Unauthorized connection attempt from IP address 213.138.209.109 on Port 445(SMB)
2020-05-22 00:15:53
178.62.39.189 attackbots
" "
2020-05-21 23:47:33
188.227.84.206 spam
Spam Email  claiming to be Microsoft asking for log in credentials.
2020-05-22 00:26:19
14.18.103.163 attack
May 21 14:01:04  sshd\[11455\]: Invalid user diaosx from 14.18.103.163May 21 14:01:05  sshd\[11455\]: Failed password for invalid user diaosx from 14.18.103.163 port 58190 ssh2
...
2020-05-21 23:53:35
188.227.84.206 spam
Spam Email  claiming to be Microsoft asking for log in credentials.
2020-05-22 00:26:23
139.59.18.197 attackbotsspam
May 21 17:34:17 OPSO sshd\[13050\]: Invalid user azr from 139.59.18.197 port 39808
May 21 17:34:17 OPSO sshd\[13050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197
May 21 17:34:19 OPSO sshd\[13050\]: Failed password for invalid user azr from 139.59.18.197 port 39808 ssh2
May 21 17:36:26 OPSO sshd\[13729\]: Invalid user eyl from 139.59.18.197 port 39918
May 21 17:36:26 OPSO sshd\[13729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197
2020-05-22 00:03:07
185.156.73.60 attackbotsspam
scans 43 times in preceeding hours on the ports (in chronological order) 43389 20002 32389 33367 1189 3392 33289 38389 3397 33079 33889 3089 20089 4489 8989 3357 33894 36389 53389 3403 33377 33789 33370 3381 8089 31389 33377 33839 9989 33374 50089 33370 5555 33899 3357 33890 1189 7789 9090 3388 3384 33889 33891 resulting in total of 43 scans from 185.156.72.0/22 block.
2020-05-22 00:22:04
23.94.93.119 attackspambots
Unauthorized connection attempt detected from IP address 23.94.93.119 to port 22
2020-05-22 00:15:22
1.52.50.244 attack
Unauthorized connection attempt from IP address 1.52.50.244 on Port 445(SMB)
2020-05-22 00:02:18
185.153.196.245 attack
slow and persistent scanner
2020-05-22 00:24:27
159.192.225.167 attack
Unauthorized connection attempt from IP address 159.192.225.167 on Port 445(SMB)
2020-05-22 00:12:03
134.209.164.184 attack
Unauthorized connection attempt detected from IP address 134.209.164.184 to port 10516
2020-05-21 23:56:17
124.156.204.178 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 5038 3531
2020-05-21 23:57:35
176.113.70.60 attack
Automatic report - Port Scan
2020-05-21 23:47:52

Recently Reported IPs

1.64.116.241 1.63.66.163 1.63.72.219 1.63.80.72
1.63.53.178 1.63.3.0 1.62.90.187 1.63.227.2
1.63.173.174 1.63.251.67 1.63.250.100 1.63.111.221
1.63.26.217 1.63.118.245 1.63.27.180 1.62.88.136
1.63.123.231 1.63.12.182 1.63.197.187 1.63.71.69