Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Reston

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.16.248.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.16.248.52.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040501 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 07:03:02 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 52.248.16.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 52.248.16.214.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
118.24.213.126 attackspam
2019-11-07T08:41:06.552101abusebot-7.cloudsearch.cf sshd\[25481\]: Invalid user temp from 118.24.213.126 port 34726
2019-11-07 17:18:50
45.161.188.64 attack
Automatic report - Port Scan Attack
2019-11-07 17:32:23
223.223.188.226 attackspambots
Nov  7 06:55:33 server6 sshd[15469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 06:55:35 server6 sshd[15469]: Failed password for r.r from 223.223.188.226 port 57238 ssh2
Nov  7 06:55:35 server6 sshd[15469]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:14:19 server6 sshd[30709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:14:21 server6 sshd[30709]: Failed password for r.r from 223.223.188.226 port 48913 ssh2
Nov  7 07:14:22 server6 sshd[30709]: Received disconnect from 223.223.188.226: 11: Bye Bye [preauth]
Nov  7 07:19:44 server6 sshd[2484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.188.226  user=r.r
Nov  7 07:19:46 server6 sshd[2484]: Failed password for r.r from 223.223.188.226 port 39988 ssh2
Nov  7 07:19:46 server6 sshd[2484]: R........
-------------------------------
2019-11-07 17:19:48
180.247.157.186 attack
SMB Server BruteForce Attack
2019-11-07 17:49:25
114.67.80.161 attackspam
Nov  6 21:34:42 php1 sshd\[7604\]: Invalid user pwd@12345 from 114.67.80.161
Nov  6 21:34:42 php1 sshd\[7604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
Nov  6 21:34:44 php1 sshd\[7604\]: Failed password for invalid user pwd@12345 from 114.67.80.161 port 39367 ssh2
Nov  6 21:38:51 php1 sshd\[8111\]: Invalid user sohu from 114.67.80.161
Nov  6 21:38:51 php1 sshd\[8111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
2019-11-07 17:10:28
139.59.171.46 attackbotsspam
WordPress wp-login brute force :: 139.59.171.46 0.156 BYPASS [07/Nov/2019:08:00:28  0000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 1559 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-07 17:47:43
139.59.238.14 attackbots
Nov  7 03:08:36 ny01 sshd[12348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14
Nov  7 03:08:38 ny01 sshd[12348]: Failed password for invalid user ld from 139.59.238.14 port 39556 ssh2
Nov  7 03:13:11 ny01 sshd[12704]: Failed password for root from 139.59.238.14 port 49438 ssh2
2019-11-07 17:48:34
181.196.3.82 attack
Nov  7 07:21:23 xb0 sshd[1257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.196.3.82  user=r.r
Nov  7 07:21:25 xb0 sshd[1257]: Failed password for r.r from 181.196.3.82 port 59875 ssh2
Nov  7 07:21:28 xb0 sshd[1257]: Failed password for r.r from 181.196.3.82 port 59875 ssh2
Nov  7 07:21:30 xb0 sshd[1257]: Failed password for r.r from 181.196.3.82 port 59875 ssh2
Nov  7 07:21:30 xb0 sshd[1257]: Disconnecting: Too many authentication failures for r.r from 181.196.3.82 port 59875 ssh2 [preauth]
Nov  7 07:21:30 xb0 sshd[1257]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.196.3.82  user=r.r
Nov  7 07:21:36 xb0 sshd[1524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.196.3.82  user=r.r
Nov  7 07:21:37 xb0 sshd[1524]: Failed password for r.r from 181.196.3.82 port 59886 ssh2
Nov  7 07:21:40 xb0 sshd[1524]: Failed password for r.r from 181.196.3.8........
-------------------------------
2019-11-07 17:38:16
138.68.4.198 attack
Nov  7 08:48:08 *** sshd[16304]: Invalid user rack from 138.68.4.198
2019-11-07 17:39:59
68.183.91.25 attackspambots
Nov  6 23:01:26 tdfoods sshd\[11484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25  user=root
Nov  6 23:01:28 tdfoods sshd\[11484\]: Failed password for root from 68.183.91.25 port 52621 ssh2
Nov  6 23:05:58 tdfoods sshd\[11846\]: Invalid user anirudh from 68.183.91.25
Nov  6 23:05:58 tdfoods sshd\[11846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.91.25
Nov  6 23:05:59 tdfoods sshd\[11846\]: Failed password for invalid user anirudh from 68.183.91.25 port 43346 ssh2
2019-11-07 17:43:16
149.202.45.11 attack
149.202.45.11 - - \[07/Nov/2019:06:27:12 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.202.45.11 - - \[07/Nov/2019:06:27:13 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-07 17:09:26
123.59.195.125 attackspam
Port Scan 1433
2019-11-07 17:08:43
178.186.145.184 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.186.145.184/ 
 
 RU - 1H : (142)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 178.186.145.184 
 
 CIDR : 178.186.0.0/15 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 6 
  3H - 11 
  6H - 22 
 12H - 42 
 24H - 73 
 
 DateTime : 2019-11-07 07:26:19 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 17:47:07
192.99.100.51 attackbots
11/07/2019-09:23:42.225586 192.99.100.51 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-11-07 17:11:42
58.211.157.195 attackspambots
Helo
2019-11-07 17:41:37

Recently Reported IPs

172.85.7.210 185.28.149.77 109.14.14.228 87.147.235.190
94.197.120.28 157.237.152.82 179.35.209.1 187.1.227.194
98.184.131.68 123.130.91.76 68.201.139.168 212.128.95.205
221.39.55.254 176.34.159.186 117.137.221.33 87.187.104.63
58.68.122.141 107.171.171.152 220.107.81.14 143.189.84.129