Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.48.0.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;240.48.0.0.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 11 23:47:15 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 0.0.48.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.0.48.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.193.139.251 attack
" "
2019-11-29 05:35:27
222.124.16.227 attack
$f2bV_matches
2019-11-29 05:18:00
41.207.184.179 attack
Automatic report - SSH Brute-Force Attack
2019-11-29 05:16:56
185.156.73.52 attackbots
11/28/2019-16:32:52.529194 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 05:53:09
185.125.33.226 attackbots
Chat Spam
2019-11-29 05:32:30
208.90.58.178 attackspam
Exploit Attempt
2019-11-29 05:52:33
103.247.109.34 attack
TCP Port Scanning
2019-11-29 05:23:42
58.56.32.238 attackspambots
Tried sshing with brute force.
2019-11-29 05:34:16
222.141.50.134 attackbots
Nov 28 15:26:07 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:222.141.50.134\]
...
2019-11-29 05:30:04
83.227.97.154 attackspambots
2019/11/28 14:25:57 \[error\] 31132\#0: \*10479 An error occurred in mail zmauth: user not found:osentoski_ryszard@*fathog.com while SSL handshaking to lookup handler, client: 83.227.97.154:40384, server: 45.79.145.195:993, login: "osentoski_ryszard@*fathog.com"
2019-11-29 05:31:46
223.197.239.197 attack
Automatic report - Port Scan Attack
2019-11-29 05:16:00
52.63.41.122 attack
RDP Bruteforce
2019-11-29 05:36:32
79.124.62.25 attack
11/28/2019-09:26:15.538214 79.124.62.25 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 05:28:08
167.71.180.35 attack
firewall-block, port(s): 53413/udp
2019-11-29 05:44:14
211.151.95.139 attackbotsspam
SSH Brute Force, server-1 sshd[31931]: Failed password for invalid user godep from 211.151.95.139 port 39724 ssh2
2019-11-29 05:21:21

Recently Reported IPs

85.195.178.79 90.122.110.205 149.140.207.121 148.27.47.59
147.136.110.33 232.232.157.242 12.29.90.82 89.104.66.168
51.15.100.182 43.10.255.222 190.89.92.238 46.166.45.193
199.199.25.121 221.129.171.79 185.63.153.214 155.160.107.79
229.104.74.10 245.184.216.14 248.140.175.191 241.91.249.60