Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.64.56.74 attackbotsspam
Automatic report - Banned IP Access
2020-04-12 20:47:52
148.64.56.114 attackspambots
Automatic report - Banned IP Access
2019-12-17 02:22:33
148.64.56.125 attack
Automatic report - Banned IP Access
2019-10-18 12:20:20
148.64.56.113 attackbots
Automatic report - Banned IP Access
2019-10-01 05:48:49
148.64.56.74 attackspam
Automatic report - Banned IP Access
2019-07-18 14:59:53
148.64.56.117 bots
爬虫区间是148.64.56.0 to 148.64.56.255 (148.64.56.0/24)
148.64.56.117 - - [28/Apr/2019:09:09:44 +0800] "GET /check-ip/58.17.114.102 HTTP/1.1" 200 10015 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-28 09:15:32
148.64.56.118 bots
148.64.56.118 - - [27/Apr/2019:14:02:00 +0800] "GET /check-ip HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.118 - - [27/Apr/2019:14:02:02 +0800] "GET /check-ip HTTP/1.1" 200 2915 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-27 14:03:35
148.64.56.66 bots
爬虫,可以禁掉
148.64.56.66 - - [27/Apr/2019:05:31:15 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:17 +0800] "GET /robots.txt HTTP/1.1" 200 472 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:23 +0800] "GET /check-ip/193.85.177.25 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:24 +0800] "GET /check-ip/193.85.177.25 HTTP/1.1" 200 9571 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-27 06:48:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.64.56.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.64.56.121.			IN	A

;; AUTHORITY SECTION:
.			146	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 04:11:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
121.56.64.148.in-addr.arpa domain name pointer server121.hml.grapeshot.co.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.56.64.148.in-addr.arpa	name = server121.hml.grapeshot.co.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.215.143.177 attackspambots
[munged]::443 186.215.143.177 - - [04/Jan/2020:05:44:18 +0100] "POST /[munged]: HTTP/1.1" 200 7902 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.215.143.177 - - [04/Jan/2020:05:44:19 +0100] "POST /[munged]: HTTP/1.1" 200 4036 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.215.143.177 - - [04/Jan/2020:05:44:19 +0100] "POST /[munged]: HTTP/1.1" 200 4036 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.215.143.177 - - [04/Jan/2020:05:44:20 +0100] "POST /[munged]: HTTP/1.1" 200 4036 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.215.143.177 - - [04/Jan/2020:05:44:21 +0100] "POST /[munged]: HTTP/1.1" 200 4036 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 186.215.143.177 - - [04/Jan/20
2020-01-04 21:05:22
78.167.158.80 attack
Automatic report - Port Scan Attack
2020-01-04 21:49:22
60.250.48.187 attackspam
Honeypot attack, port: 445, PTR: 60-250-48-187.HINET-IP.hinet.net.
2020-01-04 21:03:51
124.156.240.79 attackspambots
Unauthorized connection attempt from IP address 124.156.240.79 on Port 25(SMTP)
2020-01-04 21:43:52
98.100.158.106 attackspam
Unauthorised access (Jan  4) SRC=98.100.158.106 LEN=40 TTL=53 ID=37245 TCP DPT=8080 WINDOW=38470 SYN 
Unauthorised access (Dec 30) SRC=98.100.158.106 LEN=40 TTL=53 ID=56483 TCP DPT=8080 WINDOW=38470 SYN
2020-01-04 21:17:59
119.42.175.200 attackspambots
Jan  4 03:13:53 kapalua sshd\[31165\]: Invalid user jenkins from 119.42.175.200
Jan  4 03:13:53 kapalua sshd\[31165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200
Jan  4 03:13:55 kapalua sshd\[31165\]: Failed password for invalid user jenkins from 119.42.175.200 port 43161 ssh2
Jan  4 03:15:50 kapalua sshd\[31307\]: Invalid user sybase from 119.42.175.200
Jan  4 03:15:50 kapalua sshd\[31307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200
2020-01-04 21:27:42
168.0.51.98 attackspambots
port scan and connect, tcp 23 (telnet)
2020-01-04 21:45:13
81.211.54.62 attackspam
Unauthorized connection attempt from IP address 81.211.54.62 on Port 445(SMB)
2020-01-04 21:34:15
182.68.112.68 attackspam
Unauthorized connection attempt from IP address 182.68.112.68 on Port 445(SMB)
2020-01-04 21:39:18
112.135.86.229 attackspambots
Unauthorized connection attempt from IP address 112.135.86.229 on Port 445(SMB)
2020-01-04 21:25:58
103.11.187.137 attackbots
Unauthorized connection attempt from IP address 103.11.187.137 on Port 445(SMB)
2020-01-04 21:28:10
132.145.18.157 attackspam
Multiple SSH login attempts.
2020-01-04 21:04:27
104.244.79.250 attackspam
SSH Brute-Force reported by Fail2Ban
2020-01-04 21:44:24
2.135.237.134 attackbots
Unauthorized connection attempt from IP address 2.135.237.134 on Port 445(SMB)
2020-01-04 21:40:26
106.54.219.195 attackbots
Jan  4 14:39:11 localhost sshd\[3283\]: Invalid user legal from 106.54.219.195 port 49670
Jan  4 14:39:11 localhost sshd\[3283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.219.195
Jan  4 14:39:13 localhost sshd\[3283\]: Failed password for invalid user legal from 106.54.219.195 port 49670 ssh2
2020-01-04 21:44:06

Recently Reported IPs

94.102.63.116 137.226.136.81 185.153.198.8 80.82.67.13
86.153.78.218 84.195.14.162 137.226.224.148 137.226.254.71
86.171.99.233 94.102.56.95 180.76.210.90 180.76.210.154
180.76.210.37 137.226.139.205 180.76.210.53 137.226.123.204
180.76.210.129 86.127.241.160 180.76.209.228 180.76.209.183