Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.214.242.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.214.242.248.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 14:07:02 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 248.242.214.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.242.214.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.70.2.50 attackbotsspam
$f2bV_matches
2019-12-10 03:17:54
77.89.35.98 attack
Unauthorised access (Dec  9) SRC=77.89.35.98 LEN=52 TTL=116 ID=26045 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-10 02:45:35
139.162.72.191 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 03:07:24
104.244.79.146 attack
2019-12-09T19:23:42.514564vps751288.ovh.net sshd\[818\]: Invalid user fake from 104.244.79.146 port 48600
2019-12-09T19:23:42.522924vps751288.ovh.net sshd\[818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.146
2019-12-09T19:23:44.676447vps751288.ovh.net sshd\[818\]: Failed password for invalid user fake from 104.244.79.146 port 48600 ssh2
2019-12-09T19:23:45.072988vps751288.ovh.net sshd\[820\]: Invalid user ubnt from 104.244.79.146 port 52200
2019-12-09T19:23:45.082297vps751288.ovh.net sshd\[820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.146
2019-12-10 02:53:39
41.207.182.133 attackbots
ssh failed login
2019-12-10 03:09:06
111.93.237.186 attackspambots
WP_xmlrpc_attack
2019-12-10 02:46:48
91.244.255.54 attackspam
Unauthorized connection attempt from IP address 91.244.255.54 on Port 445(SMB)
2019-12-10 03:19:06
113.160.152.250 attackspambots
Unauthorized connection attempt detected from IP address 113.160.152.250 to port 445
2019-12-10 03:17:03
94.191.8.232 attackbots
Dec  9 18:41:09 hcbbdb sshd\[22846\]: Invalid user ashrae from 94.191.8.232
Dec  9 18:41:09 hcbbdb sshd\[22846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.8.232
Dec  9 18:41:11 hcbbdb sshd\[22846\]: Failed password for invalid user ashrae from 94.191.8.232 port 47130 ssh2
Dec  9 18:47:07 hcbbdb sshd\[23612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.8.232  user=root
Dec  9 18:47:08 hcbbdb sshd\[23612\]: Failed password for root from 94.191.8.232 port 52568 ssh2
2019-12-10 02:59:46
60.163.129.227 attackbotsspam
Dec  9 19:44:41 herz-der-gamer sshd[13259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.163.129.227  user=ftp
Dec  9 19:44:43 herz-der-gamer sshd[13259]: Failed password for ftp from 60.163.129.227 port 40240 ssh2
Dec  9 20:11:29 herz-der-gamer sshd[13632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.163.129.227  user=root
Dec  9 20:11:31 herz-der-gamer sshd[13632]: Failed password for root from 60.163.129.227 port 59294 ssh2
...
2019-12-10 03:19:28
95.213.177.124 attackspam
Automatic report - Banned IP Access
2019-12-10 02:57:25
223.75.116.49 attack
Port 1433 Scan
2019-12-10 03:22:58
104.237.159.50 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 03:20:51
203.128.240.146 attackspam
Unauthorized connection attempt from IP address 203.128.240.146 on Port 445(SMB)
2019-12-10 02:47:55
218.92.0.141 attackbotsspam
v+ssh-bruteforce
2019-12-10 02:49:06

Recently Reported IPs

56.209.105.66 167.105.216.46 8.216.33.30 35.161.249.187
192.235.243.108 42.163.232.140 65.106.67.31 149.64.70.159
220.9.247.76 157.36.154.129 241.19.136.92 56.68.11.218
230.230.217.33 28.195.184.66 234.145.97.222 101.10.146.187
52.83.192.140 71.34.237.147 199.116.100.5 96.85.181.188