Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.114.132.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.114.132.252.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:48:53 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 252.132.114.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.132.114.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.52.195 attackspambots
Invalid user teacher from 51.75.52.195 port 41076
2019-08-03 01:18:13
212.237.7.163 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-08-03 00:22:10
106.75.86.217 attackbotsspam
2019-08-02T17:05:07.669774  sshd[19363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.86.217  user=root
2019-08-02T17:05:09.675166  sshd[19363]: Failed password for root from 106.75.86.217 port 37378 ssh2
2019-08-02T17:10:41.224425  sshd[19405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.86.217  user=root
2019-08-02T17:10:43.415422  sshd[19405]: Failed password for root from 106.75.86.217 port 37724 ssh2
2019-08-02T17:16:19.360999  sshd[19479]: Invalid user aman from 106.75.86.217 port 37988
...
2019-08-03 00:08:43
5.14.199.236 attackbotsspam
Automatic report - Port Scan Attack
2019-08-03 00:03:11
95.58.194.141 attack
Aug  2 18:51:53 icinga sshd[27259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.141
Aug  2 18:51:55 icinga sshd[27259]: Failed password for invalid user rodrigo from 95.58.194.141 port 43476 ssh2
...
2019-08-03 01:23:05
78.198.69.64 attackspam
$f2bV_matches
2019-08-03 01:05:33
61.216.35.96 attackbots
Port Scan: TCP/445
2019-08-03 01:08:03
176.31.218.147 attackspambots
Synology brute-force
2019-08-03 00:36:19
128.14.209.154 attackspambots
EventTime:Fri Aug 2 22:25:04 AEST 2019,EventName:GET: Forbidden,TargetDataNamespace:/,TargetDataContainer:secure/,TargetDataName:ContactAdministrators!default.jspa,SourceIP:128.14.209.154,VendorOutcomeCode:403,InitiatorServiceName:Mozilla/5.0
2019-08-03 01:34:28
67.227.154.5 attackbots
Aug  2 18:27:24 dedicated sshd[31739]: Invalid user GunGame from 67.227.154.5 port 40554
2019-08-03 00:34:53
185.220.101.50 attackspambots
Aug  2 17:26:52 MainVPS sshd[19776]: Invalid user NetLinx from 185.220.101.50 port 43947
Aug  2 17:26:52 MainVPS sshd[19776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.50
Aug  2 17:26:52 MainVPS sshd[19776]: Invalid user NetLinx from 185.220.101.50 port 43947
Aug  2 17:26:55 MainVPS sshd[19776]: Failed password for invalid user NetLinx from 185.220.101.50 port 43947 ssh2
Aug  2 17:26:52 MainVPS sshd[19776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.50
Aug  2 17:26:52 MainVPS sshd[19776]: Invalid user NetLinx from 185.220.101.50 port 43947
Aug  2 17:26:55 MainVPS sshd[19776]: Failed password for invalid user NetLinx from 185.220.101.50 port 43947 ssh2
Aug  2 17:26:55 MainVPS sshd[19776]: Disconnecting invalid user NetLinx 185.220.101.50 port 43947: Change of username or service not allowed: (NetLinx,ssh-connection) -> (administrator,ssh-connection [preauth]
...
2019-08-02 23:56:44
71.237.171.150 attackspambots
Invalid user ksgdb from 71.237.171.150 port 34716
2019-08-03 01:36:19
206.189.142.10 attackbotsspam
Aug  2 11:22:37 MK-Soft-VM7 sshd\[12598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10  user=root
Aug  2 11:22:39 MK-Soft-VM7 sshd\[12598\]: Failed password for root from 206.189.142.10 port 42790 ssh2
Aug  2 11:27:42 MK-Soft-VM7 sshd\[12617\]: Invalid user ned from 206.189.142.10 port 42652
...
2019-08-03 01:25:16
92.119.160.52 attackbotsspam
08/02/2019-10:16:05.613682 92.119.160.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-03 00:26:30
186.154.141.66 attackbotsspam
Automatic report - Port Scan Attack
2019-08-02 23:56:11

Recently Reported IPs

116.86.127.155 81.105.158.43 51.206.143.123 254.38.133.254
153.142.20.39 198.122.144.118 220.110.183.204 252.161.247.174
71.81.248.107 244.75.94.195 65.97.38.17 48.71.63.61
157.94.172.59 83.93.134.198 18.101.143.7 25.127.106.188
170.138.251.115 54.28.59.57 179.46.21.245 242.112.62.78