Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Budapest

Region: Budapest főváros

Country: Hungary

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '31.46.240.0 - 31.46.255.255'

% Abuse contact for '31.46.240.0 - 31.46.255.255' is 'abuse@telekom.hu'

inetnum:        31.46.240.0 - 31.46.255.255
netname:        MT-BROADBAND-NAT-FIXEDLINE
descr:          Magyar Telekom customers using dynamic IP
descr:          NAT pool
country:        HU
admin-c:        MTRA-RIPE
tech-c:         MTNA-RIPE
status:         ASSIGNED PA
mnt-by:         MTELEKOM-MNT
created:        2014-03-14T16:39:42Z
last-modified:  2020-07-24T14:58:47Z
source:         RIPE # Filtered

role:           Magyar Telekom Network Administrator
address:        Budapest, Hungary
tech-c:         TIBA-RIPE
tech-c:         DB2380-RIPE
nic-hdl:        MTNA-RIPE
abuse-mailbox:  abuse@telekom.hu
mnt-by:         MTELEKOM-MNT
created:        2013-10-13T20:08:36Z
last-modified:  2021-10-20T11:49:32Z
source:         RIPE # Filtered

role:           Magyar Telekom RIPE Administrator
address:        Budapest, Hungary
admin-c:        DB2380-RIPE
admin-c:        MK1117-RIPE
admin-c:        TIBA-RIPE
nic-hdl:        MTRA-RIPE
abuse-mailbox:  abuse@telekom.hu
mnt-by:         MTELEKOM-MNT
created:        2013-10-13T19:58:47Z
last-modified:  2021-10-20T11:49:15Z
source:         RIPE # Filtered

% Information related to '31.46.0.0/16as5483'

route:          31.46.0.0/16
descr:          htc
origin:         as5483
mnt-by:         MTELEKOM-MNT
mnt-routes:     MTELEKOM-TELSOC-MNT
created:        2011-03-21T09:34:29Z
last-modified:  2024-11-20T13:05:26Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.46.248.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.46.248.246.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 08:13:57 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'246.248.46.31.in-addr.arpa domain name pointer 1f2ef8f6.nat.pool.telekom.hu.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
246.248.46.31.in-addr.arpa	name = 1F2EF8F6.nat.pool.telekom.hu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
156.221.16.3 attackbots
23/tcp
[2019-06-21]1pkt
2019-06-22 08:42:32
122.168.197.36 attackbots
SMB Server BruteForce Attack
2019-06-22 08:17:28
92.118.160.37 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-06-22 08:15:16
71.6.202.198 attackspam
Request: "GET /ccvv HTTP/1.1"
2019-06-22 08:54:20
118.160.0.108 attackspambots
37215/tcp
[2019-06-21]1pkt
2019-06-22 08:23:11
91.124.40.165 attack
Request: "GET / HTTP/1.1"
2019-06-22 08:19:21
91.240.100.80 attack
NAME : NETPAK CIDR : 91.240.100.0/23 DDoS attack Poland - block certain countries :) IP: 91.240.100.80  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 08:26:48
151.45.48.30 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 08:05:44
41.235.185.127 attackbots
2323/tcp
[2019-06-21]1pkt
2019-06-22 08:55:37
177.68.133.3 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 08:40:56
196.235.96.141 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-22 08:07:13
77.78.196.56 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 08:43:09
1.25.153.26 attackspam
port 23 attempt blocked
2019-06-22 08:26:03
81.15.227.97 attack
Request: "GET / HTTP/1.1"
2019-06-22 08:09:29
180.250.183.154 attackbots
2019-06-21 UTC: 1x - root
2019-06-22 08:56:20

Recently Reported IPs

59.40.77.59 66.132.195.114 195.140.214.22 14.29.7.57
195.140.214.30 198.168.100.52 2606:4700:10::6814:4652 2606:4700:10::6814:6310
2606:4700:10::ac43:1948 2606:4700:10::6816:4346 2606:4700:10::6814:6085 14.207.194.186
2606:4700:10::6816:3592 2606:4700:10::ac43:2230 2606:4700:10::6814:8889 2606:4700:10::6814:5401
2606:4700:10::6814:5737 143.92.60.205 183.202.134.16 134.122.197.16