Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Portland

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Regence Blue Cross Blue Shield of Oregon

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.166.241.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40627
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;205.166.241.248.		IN	A

;; AUTHORITY SECTION:
.			3595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 08 02:33:50 CST 2019
;; MSG SIZE  rcvd: 119

Host info
Host 248.241.166.205.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 248.241.166.205.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.85 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3073 proto: TCP cat: Misc Attack
2019-10-27 07:58:18
45.136.109.83 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 31 - port: 22 proto: TCP cat: Misc Attack
2019-10-27 07:28:35
185.156.73.27 attack
Multiport scan : 26 ports scanned 9418 9419 9420 15307 15308 15309 16825 16826 16827 24052 24053 24054 30526 30527 33730 33731 33732 39097 39098 39099 42862 42863 42864 49990 49991 49992
2019-10-27 07:38:32
5.39.221.55 attackbots
Fail2Ban Ban Triggered
2019-10-27 07:31:03
60.191.82.92 attackbots
ET COMPROMISED Known Compromised or Hostile Host Traffic group 15 - port: 8050 proto: TCP cat: Misc Attack
2019-10-27 07:26:54
80.82.77.227 attackbotsspam
Brute force attack stopped by firewall
2019-10-27 07:49:42
45.67.15.140 attackspam
firewall-block, port(s): 22/tcp
2019-10-27 07:29:51
61.244.206.38 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:25:58
37.49.231.104 attackbots
10/27/2019-01:08:11.437887 37.49.231.104 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 35
2019-10-27 07:56:34
185.176.27.54 attackspam
10/27/2019-01:17:00.371247 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:36:33
80.82.64.73 attackbots
10/26/2019-18:33:40.586598 80.82.64.73 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:50:25
185.176.27.26 attack
firewall-block, port(s): 2781/tcp
2019-10-27 07:36:53
217.68.217.60 attackbots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 07:31:59
185.209.0.92 attackbots
Multiport scan : 18 ports scanned 9000 9005 9007 9008 9010 9011 9015 9016 9017 9019 9020 9022 9025 9026 9029 9035 9037 9038
2019-10-27 07:34:01
45.136.109.82 attackbots
10/26/2019-19:15:13.223519 45.136.109.82 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:55:56

Recently Reported IPs

208.100.26.237 93.172.65.67 152.168.224.87 217.181.193.178
213.37.242.152 59.2.151.157 210.63.180.26 82.117.245.247
192.39.166.118 188.191.165.230 83.166.183.247 118.184.66.56
75.71.74.30 84.213.97.224 195.209.180.129 125.24.238.80
113.83.111.221 42.239.80.210 78.240.28.76 65.236.114.15