Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.189.214.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.189.214.147.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 04:12:55 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 147.214.189.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.214.189.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.171.12.154 attackspam
2020-07-31T01:29:56.891485afi-git.jinr.ru sshd[13705]: Invalid user wujian from 217.171.12.154 port 36742
2020-07-31T01:29:56.894857afi-git.jinr.ru sshd[13705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.kolgotki-optom.ru
2020-07-31T01:29:56.891485afi-git.jinr.ru sshd[13705]: Invalid user wujian from 217.171.12.154 port 36742
2020-07-31T01:29:58.952344afi-git.jinr.ru sshd[13705]: Failed password for invalid user wujian from 217.171.12.154 port 36742 ssh2
2020-07-31T01:34:17.842564afi-git.jinr.ru sshd[14756]: Invalid user nxitc from 217.171.12.154 port 42678
...
2020-07-31 06:41:50
221.229.218.50 attackspam
SSH Invalid Login
2020-07-31 06:21:27
101.39.228.45 attackspambots
"$f2bV_matches"
2020-07-31 06:50:19
106.12.173.60 attackspam
Jul 30 22:08:21 ns382633 sshd\[2323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.173.60  user=root
Jul 30 22:08:23 ns382633 sshd\[2323\]: Failed password for root from 106.12.173.60 port 57568 ssh2
Jul 30 22:16:40 ns382633 sshd\[3943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.173.60  user=root
Jul 30 22:16:41 ns382633 sshd\[3943\]: Failed password for root from 106.12.173.60 port 45224 ssh2
Jul 30 22:21:33 ns382633 sshd\[4858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.173.60  user=root
2020-07-31 06:22:39
45.162.123.9 attackspam
SSH Invalid Login
2020-07-31 06:19:48
159.65.128.182 attackspambots
SSH Invalid Login
2020-07-31 06:25:47
181.57.137.194 attack
port scan and connect, tcp 23 (telnet)
2020-07-31 06:42:32
196.52.43.56 attackspambots
 TCP (SYN) 196.52.43.56:53388 -> port 389, len 44
2020-07-31 06:49:23
46.101.248.180 attackspam
2020-07-26T08:43:33.347473perso.[domain] sshd[828273]: Invalid user search from 46.101.248.180 port 39976 2020-07-26T08:43:35.567356perso.[domain] sshd[828273]: Failed password for invalid user search from 46.101.248.180 port 39976 ssh2 2020-07-26T08:55:28.034436perso.[domain] sshd[834762]: Invalid user admin from 46.101.248.180 port 56624 ...
2020-07-31 06:23:23
159.89.174.224 attackbotsspam
SSH Invalid Login
2020-07-31 06:31:29
201.218.132.8 attack
(smtpauth) Failed SMTP AUTH login from 201.218.132.8 (CL/Chile/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-31 00:51:25 plain authenticator failed for ([201.218.132.8]) [201.218.132.8]: 535 Incorrect authentication data (set_id=ab-heidary)
2020-07-31 06:27:25
103.89.91.156 attackbots
RDP brute force attack detected by fail2ban
2020-07-31 06:40:00
213.137.179.203 attackspambots
Jul 30 22:02:51 django-0 sshd[23266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.137.179.203  user=root
Jul 30 22:02:53 django-0 sshd[23266]: Failed password for root from 213.137.179.203 port 10565 ssh2
...
2020-07-31 06:44:30
114.236.209.138 attackbotsspam
Lines containing failures of 114.236.209.138
Jul 30 22:11:01 shared12 sshd[6520]: Bad protocol version identification '' from 114.236.209.138 port 54039
Jul 30 22:11:06 shared12 sshd[6528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.236.209.138  user=r.r
Jul 30 22:11:08 shared12 sshd[6528]: Failed password for r.r from 114.236.209.138 port 54232 ssh2
Jul 30 22:11:09 shared12 sshd[6528]: Connection closed by authenticating user r.r 114.236.209.138 port 54232 [preauth]
Jul 30 22:11:13 shared12 sshd[6537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.236.209.138  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.236.209.138
2020-07-31 06:27:43
178.128.88.3 attack
178.128.88.3 - - [30/Jul/2020:21:51:01 +0100] "POST /wp-login.php HTTP/1.1" 200 1836 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.88.3 - - [30/Jul/2020:21:51:08 +0100] "POST /wp-login.php HTTP/1.1" 200 1815 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.88.3 - - [30/Jul/2020:21:51:09 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 06:35:25

Recently Reported IPs

107.159.83.70 132.114.116.162 16.125.204.93 70.209.172.220
182.232.244.142 156.138.2.133 79.128.36.235 16.115.29.159
86.246.108.16 127.68.42.138 220.21.166.231 253.208.189.15
60.16.226.88 177.200.23.33 237.137.253.223 217.147.180.72
208.88.223.61 111.248.191.35 164.113.212.138 159.31.220.73