Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.106.119.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.106.119.248.		IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 193 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 18:06:07 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 248.119.106.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.119.106.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.234.162 attackspambots
2020-06-08T14:43:17.909096abusebot-6.cloudsearch.cf sshd[11536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:43:19.667291abusebot-6.cloudsearch.cf sshd[11536]: Failed password for root from 138.68.234.162 port 52188 ssh2
2020-06-08T14:46:59.610111abusebot-6.cloudsearch.cf sshd[11774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:47:01.512525abusebot-6.cloudsearch.cf sshd[11774]: Failed password for root from 138.68.234.162 port 38720 ssh2
2020-06-08T14:48:29.830978abusebot-6.cloudsearch.cf sshd[11856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:48:31.754962abusebot-6.cloudsearch.cf sshd[11856]: Failed password for root from 138.68.234.162 port 57328 ssh2
2020-06-08T14:50:01.328825abusebot-6.cloudsearch.cf sshd[11934]: pam_unix(sshd:auth):
...
2020-06-08 23:04:13
96.114.71.147 attackspambots
2020-06-08T10:46:09.7791121495-001 sshd[6667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
2020-06-08T10:46:11.4828451495-001 sshd[6667]: Failed password for root from 96.114.71.147 port 37770 ssh2
2020-06-08T10:50:00.1160661495-001 sshd[6867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
2020-06-08T10:50:02.5321121495-001 sshd[6867]: Failed password for root from 96.114.71.147 port 40536 ssh2
2020-06-08T10:53:51.1868601495-001 sshd[7043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
2020-06-08T10:53:52.6489071495-001 sshd[7043]: Failed password for root from 96.114.71.147 port 43300 ssh2
...
2020-06-08 23:18:21
142.93.226.18 attackspambots
Jun  8 11:57:45 marvibiene sshd[10128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18  user=root
Jun  8 11:57:46 marvibiene sshd[10128]: Failed password for root from 142.93.226.18 port 37764 ssh2
Jun  8 12:06:52 marvibiene sshd[10208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18  user=root
Jun  8 12:06:54 marvibiene sshd[10208]: Failed password for root from 142.93.226.18 port 45352 ssh2
...
2020-06-08 23:00:55
222.186.190.17 attack
Jun  8 15:22:48 rush sshd[8133]: Failed password for root from 222.186.190.17 port 55670 ssh2
Jun  8 15:24:06 rush sshd[8156]: Failed password for root from 222.186.190.17 port 35799 ssh2
...
2020-06-08 23:32:20
85.209.0.101 attack
Jun  8 22:27:29 localhost sshd[217582]: Failed password for root from 85.209.0.101 port 47498 ssh2
...
2020-06-08 23:14:22
85.175.100.195 attackspambots
Automatic report - Port Scan Attack
2020-06-08 23:08:17
212.71.235.106 attackspam
Port probing on unauthorized port 10443
2020-06-08 23:28:08
106.13.230.250 attackspam
Jun  8 14:06:39 host sshd[8250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.250  user=root
Jun  8 14:06:40 host sshd[8250]: Failed password for root from 106.13.230.250 port 60688 ssh2
...
2020-06-08 23:13:31
68.183.181.7 attack
Jun  8 13:58:37 legacy sshd[1937]: Failed password for root from 68.183.181.7 port 57018 ssh2
Jun  8 14:02:31 legacy sshd[2081]: Failed password for root from 68.183.181.7 port 59748 ssh2
...
2020-06-08 23:22:58
121.134.159.21 attack
" "
2020-06-08 23:27:21
163.172.60.213 attackspambots
Automatic report - XMLRPC Attack
2020-06-08 23:02:47
35.226.132.241 attackbots
Jun  8 17:32:08 journals sshd\[10132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.132.241  user=root
Jun  8 17:32:10 journals sshd\[10132\]: Failed password for root from 35.226.132.241 port 45244 ssh2
Jun  8 17:35:33 journals sshd\[10447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.132.241  user=root
Jun  8 17:35:35 journals sshd\[10447\]: Failed password for root from 35.226.132.241 port 49342 ssh2
Jun  8 17:39:04 journals sshd\[10876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.132.241  user=root
...
2020-06-08 23:31:56
203.192.204.168 attackbotsspam
2020-06-08T06:55:12.152656linuxbox-skyline sshd[218803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.204.168  user=root
2020-06-08T06:55:14.299145linuxbox-skyline sshd[218803]: Failed password for root from 203.192.204.168 port 46144 ssh2
...
2020-06-08 23:38:24
222.186.180.142 attack
08.06.2020 14:59:21 SSH access blocked by firewall
2020-06-08 23:00:36
35.189.138.246 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-08 23:24:33

Recently Reported IPs

83.166.138.115 45.129.103.115 196.119.168.192 73.132.249.192
180.98.230.206 61.223.14.23 199.114.218.125 118.67.173.59
35.250.102.151 167.113.18.0 70.101.114.0 238.52.86.170
65.27.207.108 129.101.59.195 150.250.132.2 91.116.71.9
162.205.214.236 5.219.148.136 22.17.212.65 14.33.95.253