Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.82.23.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.82.23.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:32:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.23.82.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.23.82.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
67.55.92.89 attack
Sep 12 15:18:28 ms-srv sshd[4902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
Sep 12 15:18:29 ms-srv sshd[4902]: Failed password for invalid user arkserver from 67.55.92.89 port 42398 ssh2
2020-02-16 02:28:26
211.193.47.213 attackbots
Jan 19 06:27:25 ms-srv sshd[6797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.47.213
Jan 19 06:27:27 ms-srv sshd[6797]: Failed password for invalid user pi from 211.193.47.213 port 51765 ssh2
2020-02-16 02:21:09
113.128.104.46 attack
Unauthorized connection attempt detected from IP address 113.128.104.46 to port 80
2020-02-16 02:11:34
61.38.37.74 attackspambots
Feb 15 23:54:14 itv-usvr-01 sshd[4015]: Invalid user mu from 61.38.37.74
Feb 15 23:54:14 itv-usvr-01 sshd[4015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.38.37.74
Feb 15 23:54:14 itv-usvr-01 sshd[4015]: Invalid user mu from 61.38.37.74
Feb 15 23:54:16 itv-usvr-01 sshd[4015]: Failed password for invalid user mu from 61.38.37.74 port 42769 ssh2
Feb 15 23:57:40 itv-usvr-01 sshd[4144]: Invalid user mukund from 61.38.37.74
2020-02-16 02:03:36
90.151.90.210 attack
Unauthorized connection attempt from IP address 90.151.90.210 on Port 445(SMB)
2020-02-16 02:30:23
36.110.27.18 attackspambots
Brute force SMTP login attempted.
...
2020-02-16 02:34:59
158.69.192.83 attackbotsspam
Invalid user weng from 158.69.192.83 port 32775
2020-02-16 01:50:43
118.40.66.62 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 02:15:16
203.186.138.82 attack
Feb 15 07:52:13 hpm sshd\[28198\]: Invalid user postgres from 203.186.138.82
Feb 15 07:52:13 hpm sshd\[28198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186138082.ctinets.com
Feb 15 07:52:15 hpm sshd\[28198\]: Failed password for invalid user postgres from 203.186.138.82 port 36980 ssh2
Feb 15 07:55:43 hpm sshd\[28512\]: Invalid user user1 from 203.186.138.82
Feb 15 07:55:43 hpm sshd\[28512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186138082.ctinets.com
2020-02-16 02:28:59
43.224.130.146 attack
Invalid user jessica from 43.224.130.146 port 12872
2020-02-16 02:26:44
149.202.13.41 attackspambots
Feb 10 18:45:19 m3 sshd[7666]: Invalid user nmk from 149.202.13.41
Feb 10 18:45:21 m3 sshd[7666]: Failed password for invalid user nmk from 149.202.13.41 port 52512 ssh2
Feb 10 18:54:53 m3 sshd[8700]: Invalid user qz from 149.202.13.41


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.202.13.41
2020-02-16 01:58:23
211.23.125.95 attackspambots
Brute-force attempt banned
2020-02-16 01:47:05
123.193.146.240 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 01:53:56
103.74.120.201 attackbots
Automatic report - Banned IP Access
2020-02-16 02:10:05
43.240.117.49 attack
Port probing on unauthorized port 1433
2020-02-16 02:06:31

Recently Reported IPs

107.253.41.179 120.190.98.49 194.151.222.175 147.178.77.76
116.88.249.247 36.100.144.99 179.171.11.173 202.145.111.36
136.145.59.69 49.234.145.59 184.36.7.108 124.229.189.78
219.216.6.168 79.232.183.111 60.206.202.191 205.244.226.174
46.22.162.107 110.47.102.22 242.147.56.61 148.228.194.75