Whois information
NetRange: 65.255.32.0 - 65.255.47.255
CIDR: 65.255.32.0/20
NetName: ZL-LAX1-002
NetHandle: NET-65-255-32-0-1
Parent: NET65 (NET-65-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS21859
Organization: Zenlayer Inc (ZENLA-7)
RegDate: 2009-07-08
Updated: 2018-01-12
Ref: https://rdap.arin.net/registry/ip/65.255.32.0
OrgName: Zenlayer Inc
OrgId: ZENLA-7
Address: 21680 Gateway Center Dr. Suite 350
City: Diamond Bar
StateProv: CA
PostalCode: 91765
Country: US
RegDate: 2017-12-27
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/ZENLA-7
OrgTechHandle: IPADM641-ARIN
OrgTechName: IP ADMIN
OrgTechPhone: +1-909-718-3558
OrgTechEmail: ipadmin@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADM641-ARIN
OrgAbuseHandle: SOCOP-ARIN
OrgAbuseName: SOC Ops
OrgAbusePhone: +1-909-718-3558
OrgAbuseEmail: abuse@zenlayer.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/SOCOP-ARIN
OrgNOCHandle: IPADM641-ARIN
OrgNOCName: IP ADMIN
OrgNOCPhone: +1-909-718-3558
OrgNOCEmail: ipadmin@zenlayer.com
OrgNOCRef: https://rdap.arin.net/registry/entity/IPADM641-ARIN
OrgTechHandle: LIYAN11-ARIN
OrgTechName: Li, Yang
OrgTechPhone: +1-626-412-0833
OrgTechEmail: GlobalNetworkOperationsCenter@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/LIYAN11-ARIN
OrgTechHandle: ZENLA2-ARIN
OrgTechName: Zenlayer GNOC
OrgTechPhone: +1-909-718-3558
OrgTechEmail: gfs-gnoc@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZENLA2-ARIN
NetRange: 65.255.37.0 - 65.255.37.255
CIDR: 65.255.37.0/24
NetName: ZL-LAX-MANAGED-HOSTING-0053
NetHandle: NET-65-255-37-0-1
Parent: ZL-LAX1-002 (NET-65-255-32-0-1)
NetType: Reassigned
OriginAS: AS21859
Organization: ZENLA-1 (ZENLA-8)
RegDate: 2019-08-05
Updated: 2019-08-05
Comment: Abuse please contact: abuse@zenlayer.com
Ref: https://rdap.arin.net/registry/ip/65.255.37.0
OrgName: ZENLA-1
OrgId: ZENLA-8
Address: 21680 Gateway Center Dr.
Address: Suite 350
Address: Diamond Bar, CA 91765
Address: U.S. Headquarters
City: Los Angeles
StateProv: CA
PostalCode: 91765
Country: US
RegDate: 2019-07-30
Updated: 2019-07-30
Ref: https://rdap.arin.net/registry/entity/ZENLA-8
OrgAbuseHandle: ZENLA-ARIN
OrgAbuseName: zenlayer-1
OrgAbusePhone: +1-626-412-0049
OrgAbuseEmail: abuse@zenlayer.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ZENLA-ARIN
OrgTechHandle: ZENLA-ARIN
OrgTechName: zenlayer-1
OrgTechPhone: +1-626-412-0049
OrgTechEmail: abuse@zenlayer.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZENLA-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 65.255.37.173 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by Sam :
This is a bad bot. There can be no doubt about it. It doesn't read "robots.txt", and it is reading folders that are disallowed for robots. But it does download the whole website every time, ever so often -- maybe to finally discover those well-hidden e-mail addresses?