Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.162.64.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.162.64.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 21:21:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 8.64.162.148.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 148.162.64.8.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
173.218.195.227 attackspam
IP blocked
2019-11-16 20:51:09
217.17.117.26 attackspam
Automatic report - Banned IP Access
2019-11-16 21:10:33
86.105.53.166 attackbots
(sshd) Failed SSH login from 86.105.53.166 (DE/Germany/host166-53-105-86.static.arubacloud.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 16 07:55:15 s1 sshd[21129]: Invalid user jakubowski from 86.105.53.166 port 40649
Nov 16 07:55:18 s1 sshd[21129]: Failed password for invalid user jakubowski from 86.105.53.166 port 40649 ssh2
Nov 16 08:16:33 s1 sshd[22005]: Invalid user cbrown from 86.105.53.166 port 47674
Nov 16 08:16:35 s1 sshd[22005]: Failed password for invalid user cbrown from 86.105.53.166 port 47674 ssh2
Nov 16 08:20:02 s1 sshd[22118]: Invalid user yoyo from 86.105.53.166 port 38096
2019-11-16 20:41:53
89.36.220.145 attackspambots
Automatic report - Banned IP Access
2019-11-16 21:06:48
78.163.213.52 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-16 20:56:42
94.39.189.141 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-16 20:50:13
218.208.176.145 attack
Port 22 Scan, PTR: PTR record not found
2019-11-16 20:43:51
81.177.33.4 attackspam
81.177.33.4 - - \[16/Nov/2019:12:42:17 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
81.177.33.4 - - \[16/Nov/2019:12:42:18 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 21:10:49
51.254.176.76 attackbots
Port scan
2019-11-16 20:41:19
177.159.157.178 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2019-11-16 21:20:22
79.187.192.249 attack
Brute-force attempt banned
2019-11-16 20:59:20
45.253.26.34 attack
Invalid user user from 45.253.26.34 port 50810
2019-11-16 21:00:36
211.20.107.225 attackbots
UTC: 2019-11-15 port: 26/tcp
2019-11-16 21:15:06
207.107.67.67 attack
Brute-force attempt banned
2019-11-16 21:06:14
41.41.46.193 attackspam
Brute-force attempt banned
2019-11-16 21:02:27

Recently Reported IPs

211.235.156.73 171.182.100.150 83.115.194.114 232.160.170.85
80.146.120.23 19.154.66.132 137.185.94.231 157.116.111.79
147.170.109.192 148.126.227.62 245.13.68.198 156.242.199.219
31.116.174.170 126.122.168.49 19.184.71.232 153.98.160.114
210.203.30.23 97.80.161.224 17.207.152.160 171.26.131.112