Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Marburg an der Lahn

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.248.91.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.248.91.3.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023020300 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 03 17:47:46 CST 2023
;; MSG SIZE  rcvd: 105
Host info
3.91.248.137.in-addr.arpa domain name pointer ws09011.Literatur-und-Kunst.Uni-Marburg.DE.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.91.248.137.in-addr.arpa	name = ws09011.Literatur-und-Kunst.Uni-Marburg.DE.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.28.188.168 attack
Want to attack my Qnap
2020-09-03 23:57:08
110.136.51.80 attack
Attempted connection to port 445.
2020-09-03 23:37:24
218.92.0.208 attack
Sep  3 17:24:22 eventyay sshd[8334]: Failed password for root from 218.92.0.208 port 27194 ssh2
Sep  3 17:25:34 eventyay sshd[8343]: Failed password for root from 218.92.0.208 port 21970 ssh2
...
2020-09-03 23:44:02
148.72.158.192 attack
[Tue Sep 01 13:46:55 2020] - DDoS Attack From IP: 148.72.158.192 Port: 40815
2020-09-03 23:36:24
102.40.49.123 attackbots
Unauthorized connection attempt from IP address 102.40.49.123 on Port 445(SMB)
2020-09-04 00:07:40
141.212.123.189 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-03 23:57:21
121.135.65.116 attack
Attempted connection to port 23.
2020-09-04 00:21:04
61.177.172.128 attackspambots
Sep  3 17:57:43 sso sshd[26645]: Failed password for root from 61.177.172.128 port 58611 ssh2
Sep  3 17:57:55 sso sshd[26645]: Failed password for root from 61.177.172.128 port 58611 ssh2
Sep  3 17:57:55 sso sshd[26645]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 58611 ssh2 [preauth]
...
2020-09-03 23:58:47
5.206.4.170 attackspam
1599065142 - 09/02/2020 18:45:42 Host: 5.206.4.170/5.206.4.170 Port: 445 TCP Blocked
2020-09-04 00:02:02
176.236.83.66 attack
Unauthorized connection attempt detected from IP address 176.236.83.66 to port 23 [T]
2020-09-04 00:19:49
156.204.80.73 attack
Attempted connection to port 23.
2020-09-04 00:20:18
39.74.61.247 attack
Unauthorized connection attempt detected from IP address 39.74.61.247 to port 23 [T]
2020-09-03 23:38:00
45.82.136.246 attackspam
Sep  3 14:28:09 rush sshd[12939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.136.246
Sep  3 14:28:11 rush sshd[12939]: Failed password for invalid user ansible from 45.82.136.246 port 46680 ssh2
Sep  3 14:28:23 rush sshd[12957]: Failed password for root from 45.82.136.246 port 55990 ssh2
...
2020-09-03 23:44:51
80.82.68.218 attack
Attempted connection to port 3389.
2020-09-04 00:01:03
95.71.224.160 attackspam
Attempted connection to port 445.
2020-09-04 00:00:46

Recently Reported IPs

238.116.134.97 157.101.23.227 47.82.251.142 21.126.226.130
16.2.35.199 42.129.68.121 249.171.230.80 186.229.32.57
13.254.34.98 88.255.57.185 183.15.109.128 105.242.101.7
233.2.82.206 173.134.186.169 173.6.91.34 93.115.18.213
206.78.252.104 203.34.60.79 122.252.239.90 122.252.239.11