Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.224.248.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.224.248.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:39:08 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 42.248.224.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.248.224.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.50 attackbotsspam
Automatic report - Port Scan Attack
2019-08-08 03:10:10
218.92.0.182 attack
Aug  7 13:44:32 vps200512 sshd\[15812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.182  user=root
Aug  7 13:44:34 vps200512 sshd\[15812\]: Failed password for root from 218.92.0.182 port 2518 ssh2
Aug  7 13:44:52 vps200512 sshd\[15814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.182  user=root
Aug  7 13:44:54 vps200512 sshd\[15814\]: Failed password for root from 218.92.0.182 port 11453 ssh2
Aug  7 13:45:03 vps200512 sshd\[15814\]: Failed password for root from 218.92.0.182 port 11453 ssh2
2019-08-08 02:58:41
35.201.243.170 attack
Aug  7 20:31:18 vps691689 sshd[27220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
Aug  7 20:31:21 vps691689 sshd[27220]: Failed password for invalid user rd from 35.201.243.170 port 1606 ssh2
...
2019-08-08 02:56:42
178.33.45.156 attackbots
Automatic report - Banned IP Access
2019-08-08 03:10:53
118.27.11.126 attackspam
Aug  7 18:35:54 animalibera sshd[12838]: Invalid user dvs from 118.27.11.126 port 35394
...
2019-08-08 02:50:34
36.71.169.51 attackspambots
Automatic report - Port Scan Attack
2019-08-08 03:06:21
151.80.143.185 attack
Automatic report - Banned IP Access
2019-08-08 03:43:40
150.254.123.96 attackbotsspam
2019-08-07T19:44:12.3009461240 sshd\[23029\]: Invalid user beehive from 150.254.123.96 port 33460
2019-08-07T19:44:12.3061951240 sshd\[23029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.254.123.96
2019-08-07T19:44:14.4176841240 sshd\[23029\]: Failed password for invalid user beehive from 150.254.123.96 port 33460 ssh2
...
2019-08-08 03:16:29
88.99.145.83 attackbots
Only those who intend to destroy a site makes "all day" attempts like this below, so if this ip appears on your website block immediately 88.99.0.0/16 is high risk:

88.99.145.83 - - [07/Aug/2019:02:25:08 -0300] "GET / HTTP/1.1/403/9/ 
88.99.145.83/07/08/2019 12:35/9/error 403/GET/HTTP/1.1/
2019-08-08 03:32:36
182.61.164.210 attackbots
Aug  7 20:48:11 * sshd[24904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210
Aug  7 20:48:13 * sshd[24904]: Failed password for invalid user inma from 182.61.164.210 port 47936 ssh2
2019-08-08 03:21:15
196.219.52.205 attack
Aug  7 18:43:18 ms-srv sshd[4327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.219.52.205
Aug  7 18:43:20 ms-srv sshd[4327]: Failed password for invalid user leica from 196.219.52.205 port 32972 ssh2
2019-08-08 03:34:31
221.152.217.113 attack
Too many connections or unauthorized access detected from Yankee banned ip
2019-08-08 03:26:20
138.68.191.198 attackbots
138.68.191.198 - - [07/Aug/2019:19:45:27 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.191.198 - - [07/Aug/2019:19:45:27 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.191.198 - - [07/Aug/2019:19:45:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.191.198 - - [07/Aug/2019:19:45:37 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.191.198 - - [07/Aug/2019:19:45:38 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.191.198 - - [07/Aug/2019:19:45:39 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-08-08 02:44:11
178.128.55.52 attackbotsspam
Aug  7 19:45:07 vpn01 sshd\[8948\]: Invalid user mailroom from 178.128.55.52
Aug  7 19:45:07 vpn01 sshd\[8948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52
Aug  7 19:45:09 vpn01 sshd\[8948\]: Failed password for invalid user mailroom from 178.128.55.52 port 48657 ssh2
2019-08-08 02:56:22
212.83.129.111 attackbots
SIPVicious Scanner Detection
2019-08-08 02:47:44

Recently Reported IPs

160.238.152.224 245.164.146.206 244.68.25.46 230.242.24.80
173.235.254.68 206.88.142.200 205.210.224.82 43.103.236.23
66.103.225.178 35.248.22.205 26.240.214.204 234.163.73.164
229.21.216.254 30.24.173.100 253.145.241.120 101.26.179.24
194.8.104.127 213.169.4.35 42.16.17.68 241.71.212.162