Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.166.55.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.166.55.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 210 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:25:13 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.55.166.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.55.166.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.57.61.190 attackspam
Automatic report - Port Scan Attack
2019-10-01 04:44:45
112.245.219.168 attack
23/tcp
[2019-09-30]1pkt
2019-10-01 04:48:07
103.101.45.150 attackbotsspam
Honeypot attack, port: 445, PTR: 103-101-45-150.integranet.ph.
2019-10-01 04:52:23
159.89.165.127 attack
2019-10-01T02:59:29.703925enmeeting.mahidol.ac.th sshd\[11636\]: Invalid user user from 159.89.165.127 port 51408
2019-10-01T02:59:29.722631enmeeting.mahidol.ac.th sshd\[11636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.165.127
2019-10-01T02:59:32.109861enmeeting.mahidol.ac.th sshd\[11636\]: Failed password for invalid user user from 159.89.165.127 port 51408 ssh2
...
2019-10-01 04:51:11
36.229.105.168 attackbots
23/tcp
[2019-09-30]1pkt
2019-10-01 04:52:42
185.244.25.184 attackbots
185.244.25.184 - - [01/Oct/2019:01:00:01 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2019-10-01 05:09:28
141.98.81.37 attackspambots
Invalid user admin from 141.98.81.37 port 25813
2019-10-01 05:06:11
54.37.229.223 attackspambots
Sep 30 16:47:39 debian sshd\[26184\]: Invalid user nz from 54.37.229.223 port 32780
Sep 30 16:47:39 debian sshd\[26184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.229.223
Sep 30 16:47:41 debian sshd\[26184\]: Failed password for invalid user nz from 54.37.229.223 port 32780 ssh2
...
2019-10-01 04:54:11
193.188.22.229 attackbotsspam
Invalid user admin from 193.188.22.229 port 18090
2019-10-01 05:03:35
118.71.5.248 attack
Unauthorised access (Sep 30) SRC=118.71.5.248 LEN=40 TTL=43 ID=39007 TCP DPT=23 WINDOW=7499 SYN
2019-10-01 05:14:32
27.84.166.140 attackspambots
Invalid user suman from 27.84.166.140 port 59018
2019-10-01 05:08:02
1.165.165.140 attackspambots
445/tcp
[2019-09-30]1pkt
2019-10-01 04:55:37
185.47.137.128 attackspam
Web App Attack
2019-10-01 04:47:34
178.62.236.68 attackbots
Automatic report - XMLRPC Attack
2019-10-01 04:43:42
200.16.132.202 attackbotsspam
Invalid user hoanln from 200.16.132.202 port 51904
2019-10-01 05:02:21

Recently Reported IPs

137.124.54.43 246.78.202.33 123.212.126.123 48.134.128.75
21.175.158.193 118.18.45.115 152.29.218.53 91.82.63.148
150.98.244.243 170.215.10.34 203.234.47.98 58.214.191.174
22.0.15.111 190.6.13.108 66.228.100.73 215.133.24.70
15.251.155.152 72.82.236.240 218.175.132.138 234.138.167.66