Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.0.142.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.0.142.215.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101800 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 18 18:16:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 215.142.0.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.142.0.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
146.88.240.18 attack
Aug  6 03:58:23 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=146.88.240.18 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=55 ID=44222 DF PROTO=UDP SPT=37362 DPT=123 LEN=56 
...
2019-09-11 04:32:44
165.227.2.127 attackbotsspam
Sep 10 01:56:11 php1 sshd\[19090\]: Invalid user vncvnc from 165.227.2.127
Sep 10 01:56:11 php1 sshd\[19090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.2.127
Sep 10 01:56:14 php1 sshd\[19090\]: Failed password for invalid user vncvnc from 165.227.2.127 port 45416 ssh2
Sep 10 02:02:25 php1 sshd\[19671\]: Invalid user test from 165.227.2.127
Sep 10 02:02:25 php1 sshd\[19671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.2.127
2019-09-11 04:15:56
183.167.204.69 attack
[Wed Aug 21 23:40:15.161583 2019] [access_compat:error] [pid 10283] [client 183.167.204.69:45915] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php, referer: http://lukegirvin.co.uk/wp-login.php
...
2019-09-11 04:37:34
104.244.72.78 attack
Sep 10 05:51:15 hpm sshd\[3420\]: Invalid user testsite from 104.244.72.78
Sep 10 05:51:15 hpm sshd\[3420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.72.78
Sep 10 05:51:17 hpm sshd\[3420\]: Failed password for invalid user testsite from 104.244.72.78 port 54972 ssh2
Sep 10 05:57:14 hpm sshd\[3951\]: Invalid user test3 from 104.244.72.78
Sep 10 05:57:14 hpm sshd\[3951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.72.78
2019-09-11 04:22:10
82.165.101.96 attackspambots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 04:03:56
119.94.5.63 attack
[Mon Sep 09 07:09:06.849560 2019] [access_compat:error] [pid 30340] [client 119.94.5.63:15973] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2019-09-11 04:17:59
122.194.34.163 attackspam
Sep 10 12:50:40 xxxxxxx0 sshd[11402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.34.163  user=r.r
Sep 10 12:50:42 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2
Sep 10 12:50:45 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2
Sep 10 12:50:47 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2
Sep 10 12:50:50 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.194.34.163
2019-09-11 04:01:26
78.188.126.65 attackspambots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 04:29:18
5.135.135.116 attack
Sep 10 22:06:18 core sshd[20701]: Failed password for root from 5.135.135.116 port 59410 ssh2
Sep 10 22:13:16 core sshd[29175]: Invalid user nagios from 5.135.135.116 port 37222
...
2019-09-11 04:23:10
118.25.233.35 attackspam
Sep 10 05:47:49 wbs sshd\[10586\]: Invalid user ts from 118.25.233.35
Sep 10 05:47:49 wbs sshd\[10586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.233.35
Sep 10 05:47:50 wbs sshd\[10586\]: Failed password for invalid user ts from 118.25.233.35 port 35878 ssh2
Sep 10 05:54:39 wbs sshd\[11205\]: Invalid user temp from 118.25.233.35
Sep 10 05:54:39 wbs sshd\[11205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.233.35
2019-09-11 04:00:13
54.38.33.178 attackspam
Sep 10 10:03:37 lcdev sshd\[11333\]: Invalid user vnc from 54.38.33.178
Sep 10 10:03:37 lcdev sshd\[11333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-54-38-33.eu
Sep 10 10:03:39 lcdev sshd\[11333\]: Failed password for invalid user vnc from 54.38.33.178 port 40672 ssh2
Sep 10 10:09:06 lcdev sshd\[11927\]: Invalid user ts3 from 54.38.33.178
Sep 10 10:09:06 lcdev sshd\[11927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-54-38-33.eu
2019-09-11 04:14:42
188.162.199.65 attack
[Aegis] @ 2019-09-10 15:55:24  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-09-11 04:05:07
186.6.76.18 attack
Unauthorized connection attempt from IP address 186.6.76.18 on Port 445(SMB)
2019-09-11 04:31:48
119.90.34.135 attack
[Tue Sep 03 00:17:58.162991 2019] [access_compat:error] [pid 15973] [client 119.90.34.135:36312] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php, referer: http://www.learnargentinianspanish.com/wp-login.php
...
2019-09-11 04:19:37
80.73.89.94 attack
Telnet Server BruteForce Attack
2019-09-11 03:58:11

Recently Reported IPs

23.58.107.105 57.194.248.229 100.183.251.179 22.106.35.170
65.16.186.202 125.123.243.238 160.249.18.184 80.40.17.112
2.208.115.113 15.59.123.223 206.110.171.103 32.228.6.121
39.126.208.79 62.146.11.40 176.116.37.43 6.187.215.32
118.41.173.230 191.62.30.5 22.93.244.156 177.67.211.10