Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Curauma

Region: Valparaiso (V)

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.130.152.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.130.152.248.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:33:07 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 248.152.130.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.152.130.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.112.232.6 attack
May 22 00:29:34 webhost01 sshd[8391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.112.232.6
May 22 00:29:36 webhost01 sshd[8391]: Failed password for invalid user zhj from 210.112.232.6 port 51372 ssh2
...
2020-05-22 03:52:49
14.170.56.23 attack
Invalid user sniffer from 14.170.56.23 port 64223
2020-05-22 04:18:13
159.89.163.226 attackbotsspam
Invalid user jinshuo from 159.89.163.226 port 48550
2020-05-22 03:58:18
203.148.20.254 attack
May 21 10:28:33 Host-KLAX-C sshd[13745]: Disconnected from invalid user mvl 203.148.20.254 port 56280 [preauth]
...
2020-05-22 03:54:11
198.199.115.94 attack
21218/tcp 2590/tcp 1052/tcp...
[2020-03-29/05-21]97pkt,34pt.(tcp)
2020-05-22 04:23:51
138.197.185.188 attack
Invalid user iub from 138.197.185.188 port 58716
2020-05-22 03:59:50
104.236.72.182 attackspam
5x Failed Password
2020-05-22 04:11:10
112.120.186.45 attack
Connection closed
2020-05-22 04:09:06
187.106.92.196 attack
Invalid user noq from 187.106.92.196 port 48340
2020-05-22 03:56:05
113.61.191.148 attackbots
Invalid user admin from 113.61.191.148 port 58965
2020-05-22 04:07:34
123.17.213.59 attackspambots
Invalid user avanthi from 123.17.213.59 port 64423
2020-05-22 04:02:22
175.6.67.24 attackspam
Invalid user geh from 175.6.67.24 port 57250
2020-05-22 04:28:12
2.187.251.84 attackspam
Automatic report - Banned IP Access
2020-05-22 04:18:58
163.172.113.19 attack
May 21 19:19:53 l02a sshd[23647]: Invalid user uyl from 163.172.113.19
May 21 19:19:53 l02a sshd[23647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19 
May 21 19:19:53 l02a sshd[23647]: Invalid user uyl from 163.172.113.19
May 21 19:19:55 l02a sshd[23647]: Failed password for invalid user uyl from 163.172.113.19 port 39764 ssh2
2020-05-22 04:28:37
117.222.160.177 attackbotsspam
Invalid user user1 from 117.222.160.177 port 56772
2020-05-22 04:05:11

Recently Reported IPs

29.225.221.87 224.113.199.46 63.164.33.134 214.24.6.116
176.123.43.147 210.202.20.150 138.224.221.76 252.39.215.94
164.173.103.235 164.86.46.109 189.7.117.64 166.97.137.41
227.199.253.92 51.145.104.222 9.124.13.179 154.145.254.197
186.59.213.77 52.193.151.203 98.23.23.14 174.64.182.17