Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.112.42.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.112.42.148.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 12:12:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 148.42.112.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.42.112.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.22.160 attack
Invalid user jb from 129.211.22.160 port 39726
2019-10-29 07:12:00
167.99.83.237 attack
Invalid user io from 167.99.83.237 port 59888
2019-10-29 07:09:38
173.18.23.60 attack
$f2bV_matches
2019-10-29 07:29:06
193.32.163.182 attackbots
Oct 28 17:22:04 server sshd\[25788\]: Failed password for invalid user admin from 193.32.163.182 port 34223 ssh2
Oct 28 17:22:04 server sshd\[25771\]: Failed password for invalid user admin from 193.32.163.182 port 38316 ssh2
Oct 28 17:22:04 server sshd\[25770\]: Failed password for invalid user admin from 193.32.163.182 port 53610 ssh2
Oct 28 17:22:05 server sshd\[25775\]: Failed password for invalid user admin from 193.32.163.182 port 46391 ssh2
Oct 29 02:05:25 server sshd\[18297\]: Invalid user admin from 193.32.163.182
Oct 29 02:05:25 server sshd\[18297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 
...
2019-10-29 07:26:58
108.222.68.232 attackbots
$f2bV_matches
2019-10-29 07:14:12
207.6.1.11 attack
Invalid user pvp from 207.6.1.11 port 44572
2019-10-29 07:03:58
75.49.249.16 attackbotsspam
Invalid user User from 75.49.249.16 port 53510
2019-10-29 07:19:32
119.57.103.38 attackbots
Invalid user ts3 from 119.57.103.38 port 58109
2019-10-29 07:13:24
212.112.98.146 attackbotsspam
Invalid user uegadm from 212.112.98.146 port 44213
2019-10-29 07:03:11
94.203.254.248 attackbotsspam
Invalid user pi from 94.203.254.248 port 35620
2019-10-29 07:17:47
159.203.40.125 attackbots
Oct 29 00:10:23 vps sshd[9118]: Failed password for root from 159.203.40.125 port 35754 ssh2
Oct 29 00:18:41 vps sshd[9471]: Failed password for root from 159.203.40.125 port 45002 ssh2
...
2019-10-29 07:30:44
106.12.113.223 attackspambots
Oct 29 01:15:39 sauna sshd[61190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
Oct 29 01:15:41 sauna sshd[61190]: Failed password for invalid user bodiesel from 106.12.113.223 port 35950 ssh2
...
2019-10-29 07:16:07
222.186.175.167 attack
Oct 28 23:54:07 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:11 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:16 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2
...
2019-10-29 07:01:40
43.252.36.98 attackspambots
Invalid user test from 43.252.36.98 port 50184
2019-10-29 06:59:50
180.168.141.246 attackbots
Invalid user admin3 from 180.168.141.246 port 51832
2019-10-29 07:27:48

Recently Reported IPs

169.229.238.88 137.226.142.49 137.226.159.132 137.226.160.104
137.226.160.214 137.226.160.245 137.226.161.84 137.226.161.203
137.226.161.114 169.229.229.113 169.229.234.167 169.229.225.106
43.132.253.158 181.205.116.218 200.69.88.5 137.226.116.98
169.229.229.108 169.229.231.224 169.229.224.154 169.229.221.112