Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Cyprus

Internet Service Provider: Cyprus Telecommuncations Authority

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Automatic report - Port Scan Attack
2020-06-27 14:36:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.149.189.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12279
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.149.189.248.		IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062700 1800 900 604800 86400

;; Query time: 134 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 27 14:36:28 CST 2020
;; MSG SIZE  rcvd: 119
Host info
248.189.149.213.in-addr.arpa domain name pointer 213-189-248.static.cytanet.com.cy.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
248.189.149.213.in-addr.arpa	name = 213-189-248.static.cytanet.com.cy.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
14.124.9.88 attackspam
Unauthorized connection attempt detected from IP address 14.124.9.88 to port 5555
2020-07-22 18:26:21
23.152.32.242 attackspam
Unauthorized connection attempt detected from IP address 23.152.32.242 to port 80
2020-07-22 18:01:14
94.168.83.174 attack
Unauthorized connection attempt detected from IP address 94.168.83.174 to port 23
2020-07-22 18:19:00
111.229.167.200 attackbots
Unauthorized connection attempt detected from IP address 111.229.167.200 to port 6379
2020-07-22 18:36:38
220.92.232.218 attack
Unauthorized connection attempt detected from IP address 220.92.232.218 to port 5555
2020-07-22 18:28:22
51.15.118.114 attack
Jul 22 09:51:32 jumpserver sshd[180773]: Invalid user process from 51.15.118.114 port 59686
Jul 22 09:51:33 jumpserver sshd[180773]: Failed password for invalid user process from 51.15.118.114 port 59686 ssh2
Jul 22 09:55:21 jumpserver sshd[180826]: Invalid user teamspeak from 51.15.118.114 port 44498
...
2020-07-22 18:22:30
113.105.8.58 attackspambots
Unauthorized connection attempt detected from IP address 113.105.8.58 to port 445
2020-07-22 18:16:19
46.176.160.160 attackspam
Unauthorized connection attempt detected from IP address 46.176.160.160 to port 23
2020-07-22 18:23:30
82.213.228.50 attackbotsspam
Unauthorized connection attempt detected from IP address 82.213.228.50 to port 22
2020-07-22 18:20:14
117.131.51.202 attackbotsspam
Unauthorized connection attempt detected from IP address 117.131.51.202 to port 1433
2020-07-22 18:15:56
27.72.88.141 attackspam
Unauthorized connection attempt detected from IP address 27.72.88.141 to port 445
2020-07-22 18:25:35
79.167.58.24 attackspambots
Unauthorized connection attempt detected from IP address 79.167.58.24 to port 23
2020-07-22 18:39:13
74.135.232.123 attack
WEB_SERVER 403 Forbidden
2020-07-22 18:40:43
137.117.171.11 attackspam
Unauthorized connection attempt detected from IP address 137.117.171.11 to port 1433 [T]
2020-07-22 18:14:54
13.93.229.47 attack
Unauthorized connection attempt detected from IP address 13.93.229.47 to port 1433
2020-07-22 18:01:45

Recently Reported IPs

114.101.82.59 49.234.25.70 185.166.87.200 67.205.170.167
117.172.63.71 182.146.158.179 51.116.182.55 37.148.210.173
168.227.224.89 159.146.121.22 119.38.242.244 116.26.84.44
45.77.221.13 180.247.212.187 78.164.254.35 47.94.198.232
186.84.52.10 157.53.53.204 34.80.190.46 60.167.177.31