Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.2.67.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.2.67.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:43:59 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 48.67.2.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.67.2.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.54.252 attack
Sep 21 00:19:27 *hidden* postfix/postscreen[26999]: DNSBL rank 3 for [94.102.54.252]:57832
2020-10-10 14:13:07
94.102.50.176 attackspam
Sep 9 17:08:32 *hidden* postfix/postscreen[28795]: DNSBL rank 3 for [94.102.50.176]:52261
2020-10-10 14:20:22
162.243.128.127 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-10 13:59:54
62.210.114.39 attack
Unauthorized connection attempt from IP address 62.210.114.39 on Port 445(SMB)
2020-10-10 08:00:08
195.95.215.157 attackbots
Oct 10 07:51:41 *hidden* sshd[45918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.95.215.157 user=root Oct 10 07:51:43 *hidden* sshd[45918]: Failed password for *hidden* from 195.95.215.157 port 50646 ssh2 Oct 10 07:57:21 *hidden* sshd[47893]: Invalid user matt from 195.95.215.157 port 55736 Oct 10 07:57:21 *hidden* sshd[47893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.95.215.157 Oct 10 07:57:23 *hidden* sshd[47893]: Failed password for invalid user matt from 195.95.215.157 port 55736 ssh2
2020-10-10 14:14:51
46.36.27.120 attackbotsspam
Oct 10 04:06:48 localhost sshd[116377]: Invalid user test from 46.36.27.120 port 39754
Oct 10 04:06:48 localhost sshd[116377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.36.27.120
Oct 10 04:06:48 localhost sshd[116377]: Invalid user test from 46.36.27.120 port 39754
Oct 10 04:06:50 localhost sshd[116377]: Failed password for invalid user test from 46.36.27.120 port 39754 ssh2
Oct 10 04:15:37 localhost sshd[117587]: Invalid user mc from 46.36.27.120 port 32776
...
2020-10-10 14:19:45
165.227.95.163 attack
2020-10-10T05:51:12.108268abusebot-5.cloudsearch.cf sshd[16078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.95.163  user=root
2020-10-10T05:51:14.474181abusebot-5.cloudsearch.cf sshd[16078]: Failed password for root from 165.227.95.163 port 58024 ssh2
2020-10-10T05:53:54.196879abusebot-5.cloudsearch.cf sshd[16087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.95.163  user=root
2020-10-10T05:53:56.467603abusebot-5.cloudsearch.cf sshd[16087]: Failed password for root from 165.227.95.163 port 44694 ssh2
2020-10-10T05:56:27.795745abusebot-5.cloudsearch.cf sshd[16096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.95.163  user=root
2020-10-10T05:56:29.735484abusebot-5.cloudsearch.cf sshd[16096]: Failed password for root from 165.227.95.163 port 58262 ssh2
2020-10-10T05:58:56.316746abusebot-5.cloudsearch.cf sshd[16105]: pam_unix(sshd:auth):
...
2020-10-10 14:22:06
200.169.6.206 attackspambots
Oct 8 02:03:34 *hidden* sshd[19302]: Failed password for *hidden* from 200.169.6.206 port 46503 ssh2 Oct 8 02:07:32 *hidden* sshd[21213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.169.6.206 user=root Oct 8 02:07:35 *hidden* sshd[21213]: Failed password for *hidden* from 200.169.6.206 port 44412 ssh2
2020-10-10 07:59:19
45.129.33.152 attack
ET DROP Dshield Block Listed Source group 1 - port: 3274 proto: tcp cat: Misc Attackbytes: 60
2020-10-10 14:24:30
51.38.128.30 attackbots
SSH Brute-force
2020-10-10 13:58:24
111.229.121.142 attackbotsspam
Oct 10 11:18:29 gw1 sshd[7886]: Failed password for root from 111.229.121.142 port 45900 ssh2
Oct 10 11:23:15 gw1 sshd[7945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142
...
2020-10-10 14:26:07
45.148.122.173 attackspambots
 TCP (SYN) 45.148.122.173:55294 -> port 22, len 44
2020-10-10 14:06:14
112.85.42.238 attackspam
Oct 10 11:39:01 mx sshd[1315962]: Failed password for root from 112.85.42.238 port 25771 ssh2
Oct 10 11:40:26 mx sshd[1316055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Oct 10 11:40:28 mx sshd[1316055]: Failed password for root from 112.85.42.238 port 19262 ssh2
Oct 10 11:42:04 mx sshd[1316092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Oct 10 11:42:06 mx sshd[1316092]: Failed password for root from 112.85.42.238 port 61391 ssh2
...
2020-10-10 14:12:23
197.210.85.164 attack
1602189927 - 10/08/2020 22:45:27 Host: 197.210.85.164/197.210.85.164 Port: 445 TCP Blocked
2020-10-10 08:04:24
94.102.56.238 attackbotsspam
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
Oct 10 06:36:11 ns308116 postfix/smtpd[8160]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: authentication failure
...
2020-10-10 14:10:32

Recently Reported IPs

91.213.167.229 251.72.180.36 167.162.191.153 92.160.151.10
159.217.142.154 220.183.18.237 106.229.219.229 170.230.248.19
103.230.199.22 207.8.115.173 30.85.12.56 195.29.222.221
16.197.211.218 181.51.75.136 120.143.77.3 4.92.172.218
2.41.11.133 129.233.141.188 227.239.117.50 128.228.97.107