IP Address: 64.62.156.52


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
7 days ago
[probe-68-69] 2026-03-10 05:06:12, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /api/v2/static/not.found
PortScan
HTTP
23 days ago
Connection to port 1080 from port 2348
PortScan
SOCKS
24 days ago
[arem1] 2026-02-21 06:30:46, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-02-17 00:57:30, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
fail2ban
BruteForce, Hacking, PortScan
postfix
Anonymous
one month ago
fail2ban
BruteForce, Hacking, PortScan
postfix
one month ago
[probe-168-134] 2026-02-09 08:52:44, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-02-05 04:07:34, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-02-04 05:48:54, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-03 08:34:04, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-02-01 09:00:21, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
Connection to port 5900 from port 25238
BruteForce
VNC
one month ago
[arem1] 2026-01-28 00:20:51, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2026-01-14 00:10:45, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2026-01-10 00:23:55, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2026-01-04 10:21:30, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 1.8.0
BruteForce
RDP
Kamil
2 months ago
fail2ban
BruteForce
postfix
2 months ago
[probe-68-69] 2025-12-21 03:19:31, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-68-69] 2025-12-15 01:06:19, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
Connection to port 1521 from port 53460
BruteForce
Oracle
3 months ago
[rede-188] 2025-12-03 01:08:43, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-11-26 00:24:03, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
Connection to port 3389 from port 41938
BruteForce
RDP
Kamil
4 months ago
fail2ban
BruteForce
postfix
4 months ago
[probe-168-134] 2025-11-19 02:58:36, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
[probe-168-134] 2025-11-06 05:58:07, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
4 months ago
ipban 1.8.0 - 14
BruteForce
RDP
4 months ago
[arem1] 2025-11-03 06:07:04, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Nudlz
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
4 months ago
[arem1] 2025-10-26 10:17:46, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
fail2ban
BruteForce
dovecot
Anonymous
5 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
5 months ago
[probe-68-69] 2025-10-15 08:58:31, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
Connection to port 631 from port 51772
PortScan
IPP
5 months ago
[probe-168-134] 2025-10-09 03:59:44, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-10-05 09:00:03, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-10-02 03:28:12, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-09-30 05:56:24, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-09-29 12:37:42, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-09-23 12:27:55, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
ipban 1.8.0
BruteForce
RDP
Anonymous
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
6 months ago
[rede-188] 2025-09-20 06:10:36, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
6 months ago
fail2ban
BruteForce
postfix
Anonymous
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
6 months ago
Connection to port 25 from port 51574
Spam
SMTP
6 months ago
[probe-168-134] 2025-09-14 01:39:37, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[arem1] 2025-09-09 07:27:45, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-68-69] 2025-09-01 08:19:15, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
fail2ban
BruteForce
sshd
6 months ago
[probe-68-69] 2025-08-27 12:27:49, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 1.8.0 - 14
BruteForce
RDP
7 months ago
ipban 1.8.0
BruteForce
RDP
7 months ago
[rede-188] 2025-08-10 15:38:55, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-08-09 02:18:01, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-08-03 04:54:34, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
7 months ago
fail2ban
BruteForce
postfix
Anonymous
7 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
7 months ago
ipbanpro 4.2.0 - 14
BruteForce
RDP
Anonymous
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[probe-168-134] 2025-07-21 01:24:17, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-176-124] 2025-07-15 07:24:22, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-07-12 03:35:12, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
8 months ago
ipban 1.9.0 - 400
BruteForce
Apache
8 months ago
[rede-188] 2025-07-09 04:34:15, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[rede-188] 2025-07-03 04:08:49, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
8 months ago
ipban 2.0.1 - 14
BruteForce
RDP
Anonymous
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
[probe-176-124] 2025-06-21 07:13:55, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[rede-188] 2025-06-16 04:15:19, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /lang/custom/sbin/init
PortScan
HTTP
9 months ago
[probe-68-69] 2025-06-09 06:06:14, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /api/v2/static/not.found
PortScan
HTTP
9 months ago
[rede-188] 2025-06-08 11:37:49, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /migadmin/lang/legacy/legacy/filechecksum
PortScan
HTTP
9 months ago
Connection to port 11211 from port 17762
DDos
Memcached
Anonymous
9 months ago
ipban 1.8.1 - 14
BruteForce
RDP
9 months ago
[probe-168-134] 2025-05-30 04:50:56, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /remote/logincheck
PortScan
HTTP
10 months ago
[probe-176-124] 2025-05-26 01:23:21, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /lang/legacy/filechecksum
PortScan
HTTP
10 months ago
[sm-vultr-01] 2025-05-18 15:19:44, Client: 64.62.156.52, Protocol: 6, Unauthorized activity to HTTP: GET /api/v2/static/not.found
PortScan
HTTP
10 months ago
Connection to port 22 from port 15263
BruteForce
SSH
tuya
10 months ago
ipban 2.0.1 - 14
BruteForce
RDP
Anonymous
10 months ago
ipban 1.8.0 - 14
BruteForce
RDP
Anonymous
10 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
10 months ago
ipban 3.0.0
BruteForce
RDP
11 months ago
Connection to port 5900 from port 35026
BruteForce
VNC
Anonymous
11 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
11 months ago
ipbanpro 4.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.1
BruteForce
RDP
one year ago
Connection to port 5900 from port 47760
BruteForce
VNC
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
imcas
one year ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
Contact IPThreat