Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.141.248.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.141.248.193.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:08:15 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 193.248.141.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.248.141.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.228.241 attackbotsspam
SSH Invalid Login
2020-04-11 07:12:48
66.42.43.150 attack
SSH Brute Force
2020-04-11 07:28:04
81.182.249.106 attack
SSH Invalid Login
2020-04-11 07:27:12
192.241.237.194 attack
firewall-block, port(s): 26/tcp
2020-04-11 07:38:26
182.74.25.246 attack
SSH Invalid Login
2020-04-11 07:05:01
79.143.29.234 attackbotsspam
Apr 11 00:29:19 server sshd[9264]: Failed password for invalid user hum from 79.143.29.234 port 58148 ssh2
Apr 11 00:33:02 server sshd[19145]: Failed password for root from 79.143.29.234 port 38860 ssh2
Apr 11 00:36:47 server sshd[28264]: Failed password for invalid user jared from 79.143.29.234 port 47770 ssh2
2020-04-11 07:27:28
115.159.115.17 attackspambots
SSH Invalid Login
2020-04-11 07:19:08
185.53.88.102 attackbotsspam
185.53.88.102 was recorded 8 times by 8 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 8, 19, 231
2020-04-11 07:41:37
171.244.43.52 attack
SSH Brute Force
2020-04-11 07:08:18
187.189.11.49 attackbots
SSH Brute Force
2020-04-11 07:03:48
106.12.92.246 attackbotsspam
Invalid user UBNT from 106.12.92.246 port 53464
2020-04-11 07:23:32
103.141.46.154 attackspam
SSH Invalid Login
2020-04-11 07:24:06
64.227.74.144 attackspambots
Invalid user jts3bot from 64.227.74.144 port 52340
2020-04-11 07:28:28
118.25.16.40 attack
2020-04-10 23:48:17,051 fail2ban.actions: WARNING [ssh] Ban 118.25.16.40
2020-04-11 07:17:29
196.38.70.24 attack
Apr 10 18:38:19 Tower sshd[659]: Connection from 196.38.70.24 port 19894 on 192.168.10.220 port 22 rdomain ""
Apr 10 18:38:21 Tower sshd[659]: Invalid user st from 196.38.70.24 port 19894
Apr 10 18:38:21 Tower sshd[659]: error: Could not get shadow information for NOUSER
Apr 10 18:38:21 Tower sshd[659]: Failed password for invalid user st from 196.38.70.24 port 19894 ssh2
Apr 10 18:38:21 Tower sshd[659]: Received disconnect from 196.38.70.24 port 19894:11: Bye Bye [preauth]
Apr 10 18:38:21 Tower sshd[659]: Disconnected from invalid user st 196.38.70.24 port 19894 [preauth]
2020-04-11 07:37:55

Recently Reported IPs

175.205.208.203 210.36.193.39 202.72.175.20 19.110.67.243
235.55.216.130 206.181.58.251 44.69.72.47 166.20.210.236
222.61.162.25 172.193.115.171 94.79.20.78 244.225.126.32
126.234.226.169 169.200.47.255 14.185.213.127 40.179.129.134
248.235.98.106 56.232.156.34 220.101.79.203 146.124.36.95