Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.64.56.74 attackbotsspam
Automatic report - Banned IP Access
2020-04-12 20:47:52
148.64.56.114 attackspambots
Automatic report - Banned IP Access
2019-12-17 02:22:33
148.64.56.125 attack
Automatic report - Banned IP Access
2019-10-18 12:20:20
148.64.56.113 attackbots
Automatic report - Banned IP Access
2019-10-01 05:48:49
148.64.56.74 attackspam
Automatic report - Banned IP Access
2019-07-18 14:59:53
148.64.56.117 bots
爬虫区间是148.64.56.0 to 148.64.56.255 (148.64.56.0/24)
148.64.56.117 - - [28/Apr/2019:09:09:44 +0800] "GET /check-ip/58.17.114.102 HTTP/1.1" 200 10015 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-28 09:15:32
148.64.56.118 bots
148.64.56.118 - - [27/Apr/2019:14:02:00 +0800] "GET /check-ip HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.118 - - [27/Apr/2019:14:02:02 +0800] "GET /check-ip HTTP/1.1" 200 2915 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-27 14:03:35
148.64.56.66 bots
爬虫,可以禁掉
148.64.56.66 - - [27/Apr/2019:05:31:15 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:17 +0800] "GET /robots.txt HTTP/1.1" 200 472 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:23 +0800] "GET /check-ip/193.85.177.25 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
148.64.56.66 - - [27/Apr/2019:05:31:24 +0800] "GET /check-ip/193.85.177.25 HTTP/1.1" 200 9571 "-" "Mozilla/5.0 (compatible; GrapeshotCrawler/2.0; +http://www.grapeshot.co.uk/crawler.php)"
2019-04-27 06:48:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.64.56.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.64.56.77.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 146 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 04:03:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
77.56.64.148.in-addr.arpa domain name pointer server77.hml.grapeshot.co.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
77.56.64.148.in-addr.arpa	name = server77.hml.grapeshot.co.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.54.67.130 attackbotsspam
Invalid user ey from 187.54.67.130 port 41793
2020-01-18 22:01:54
14.233.115.235 attack
Jan 18 13:59:34 grey postfix/smtpd\[28141\]: NOQUEUE: reject: RCPT from unknown\[14.233.115.235\]: 554 5.7.1 Service unavailable\; Client host \[14.233.115.235\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[14.233.115.235\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-18 21:46:48
203.195.207.40 attack
Invalid user ftpuser from 203.195.207.40 port 40898
2020-01-18 21:56:53
77.255.173.57 attack
Honeypot attack, port: 81, PTR: 77-255-173-57.adsl.inetia.pl.
2020-01-18 21:35:58
115.75.139.204 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 21:38:20
182.156.209.222 attackbotsspam
Invalid user gp from 182.156.209.222 port 17050
2020-01-18 22:03:15
197.248.164.62 attackbots
Invalid user admina from 197.248.164.62 port 58584
2020-01-18 21:58:24
171.255.130.4 attackbots
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-01-18 21:48:31
183.215.169.2 attack
Invalid user anirudh from 183.215.169.2 port 62863
2020-01-18 22:02:46
203.106.177.193 attackspam
Honeypot attack, port: 81, PTR: ppg-177-193.tm.net.my.
2020-01-18 21:38:56
85.113.136.122 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 21:50:24
42.3.104.34 attack
Honeypot attack, port: 5555, PTR: 42-3-104-034.static.netvigator.com.
2020-01-18 21:36:41
45.140.207.232 attackspam
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2020-01-18 21:28:13
185.74.4.189 attackspam
Unauthorized connection attempt detected from IP address 185.74.4.189 to port 2220 [J]
2020-01-18 22:02:13
81.211.94.74 attackbots
Honeypot attack, port: 445, PTR: spb-81-211-94-74.sovintel.ru.
2020-01-18 21:49:08

Recently Reported IPs

137.226.154.182 94.102.59.23 94.102.58.188 94.102.62.243
94.102.59.12 94.102.60.147 94.102.62.7 94.102.63.85
47.187.26.203 94.102.63.40 80.82.65.98 94.102.59.244
137.226.244.104 80.187.120.141 80.82.78.37 80.82.78.197
94.102.50.72 94.102.61.225 94.102.60.151 180.76.208.77