Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.248.205.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.248.205.2.			IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:27:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 2.205.248.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.205.248.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.234.80.112 attack
WordPress brute force
2020-08-02 09:00:16
59.48.135.166 attackspambots
Unauthorized connection attempt from IP address 59.48.135.166 on Port 445(SMB)
2020-08-02 08:40:21
195.242.103.103 attackbots
Automatic report - XMLRPC Attack
2020-08-02 08:48:44
206.189.145.233 attackbots
Aug  2 00:42:37 game-panel sshd[31590]: Failed password for root from 206.189.145.233 port 43530 ssh2
Aug  2 00:45:45 game-panel sshd[31730]: Failed password for root from 206.189.145.233 port 35630 ssh2
2020-08-02 08:56:26
134.159.225.143 attack
1596314746 - 08/01/2020 22:45:46 Host: 134.159.225.143/134.159.225.143 Port: 445 TCP Blocked
2020-08-02 08:38:39
190.52.34.86 attack
Attempted connection to port 23.
2020-08-02 09:05:29
182.72.100.214 attack
WordPress brute force
2020-08-02 09:07:00
117.192.10.186 attackspam
Unauthorized connection attempt from IP address 117.192.10.186 on Port 445(SMB)
2020-08-02 09:07:21
201.242.250.121 attack
Attempted connection to port 445.
2020-08-02 09:02:33
185.87.49.43 attack
WordPress brute force
2020-08-02 09:00:38
196.12.12.102 attackbotsspam
WordPress brute force
2020-08-02 08:47:39
115.78.94.174 attackspambots
Automatic report - Port Scan Attack
2020-08-02 08:50:38
190.198.13.152 attackspam
Attempted connection to port 445.
2020-08-02 09:05:13
23.240.136.91 attackspambots
WordPress brute force
2020-08-02 08:34:28
217.182.169.183 attackspambots
Failed password for root from 217.182.169.183 port 39418 ssh2
2020-08-02 08:49:33

Recently Reported IPs

109.248.205.32 109.248.204.36 109.248.208.107 109.248.207.192
109.248.216.43 109.248.208.91 109.248.218.241 109.248.218.238
109.248.218.242 109.248.218.249 109.248.218.244 109.248.218.250
109.248.218.252 109.248.208.69 109.248.222.215 109.248.228.129
109.248.229.242 109.248.229.246 109.248.229.239 109.248.229.248