Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.208.11.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.208.11.148.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:00:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 148.11.208.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.11.208.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.117.146.246 attack
Honeypot attack, port: 4567, PTR: 122-117-146-246.HINET-IP.hinet.net.
2020-01-28 14:34:24
146.88.240.4 attack
04:41:58 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:42:08 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:42:23 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:42:25 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:42:42 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:24 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:24 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:27 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:27 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:45 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:43:57 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:44:01 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:44:10 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:44:26 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:44:47 l2tp,info first L2TP UDP packet received from 146.88.240.4 
04:44:54 l2tp,info first L2TP UDP packet received from 146.88.240.4
2020-01-28 14:07:30
78.112.176.216 attackspam
unauthorized connection attempt
2020-01-28 14:26:50
218.61.40.4 attackspambots
unauthorized connection attempt
2020-01-28 14:06:30
47.198.228.58 attack
unauthorized connection attempt
2020-01-28 14:36:45
58.75.126.235 attackbots
spam
2020-01-28 13:59:23
219.78.207.196 attack
unauthorized connection attempt
2020-01-28 14:05:42
36.74.183.237 attackbotsspam
unauthorized connection attempt
2020-01-28 14:29:59
203.175.177.41 attackbotsspam
Apr 11 06:36:21 ubuntu sshd[8333]: Failed password for invalid user squirrelmail from 203.175.177.41 port 50318 ssh2
Apr 11 06:40:01 ubuntu sshd[9224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.175.177.41
Apr 11 06:40:03 ubuntu sshd[9224]: Failed password for invalid user Elma from 203.175.177.41 port 40726 ssh2
2020-01-28 14:32:03
203.115.103.83 attackbots
unauthorized connection attempt
2020-01-28 14:07:54
190.246.193.18 attack
unauthorized connection attempt
2020-01-28 14:09:57
79.103.98.36 attack
unauthorized connection attempt
2020-01-28 14:26:09
125.105.86.108 attackspam
Fail2Ban - FTP Abuse Attempt
2020-01-28 14:15:56
46.61.15.205 attackbots
unauthorized connection attempt
2020-01-28 14:28:27
177.11.46.77 attackspambots
unauthorized connection attempt
2020-01-28 14:13:04

Recently Reported IPs

116.208.103.245 116.208.11.12 114.105.183.31 116.208.103.59
116.208.11.159 116.208.11.172 116.208.103.71 116.208.11.187
116.208.11.193 116.208.11.181 116.208.11.20 116.208.11.214
116.208.11.229 114.105.183.32 116.208.11.210 116.208.11.242
116.208.11.32 116.208.11.35 116.208.11.234 116.208.11.39