Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.114.248.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.114.248.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:35:45 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.248.114.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.248.114.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.200.167.186 attack
10/06/2019-22:30:19.197088 54.200.167.186 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-07 04:33:19
182.253.105.93 attack
2019-10-06T20:29:06.142059shield sshd\[31342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-06T20:29:08.103955shield sshd\[31342\]: Failed password for root from 182.253.105.93 port 41588 ssh2
2019-10-06T20:33:49.179974shield sshd\[31617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-06T20:33:51.327362shield sshd\[31617\]: Failed password for root from 182.253.105.93 port 52944 ssh2
2019-10-06T20:38:29.963006shield sshd\[31837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-07 04:42:45
41.207.182.133 attackspambots
Oct  6 23:30:56 sauna sshd[205813]: Failed password for root from 41.207.182.133 port 44778 ssh2
...
2019-10-07 04:56:22
222.186.52.89 attack
06.10.2019 21:00:13 SSH access blocked by firewall
2019-10-07 05:03:21
194.102.35.245 attackbots
Oct  6 10:42:27 wbs sshd\[6260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.245  user=root
Oct  6 10:42:29 wbs sshd\[6260\]: Failed password for root from 194.102.35.245 port 58068 ssh2
Oct  6 10:46:24 wbs sshd\[6654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.245  user=root
Oct  6 10:46:26 wbs sshd\[6654\]: Failed password for root from 194.102.35.245 port 41496 ssh2
Oct  6 10:50:17 wbs sshd\[6984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.245  user=root
2019-10-07 04:56:44
51.254.38.106 attackspam
Oct  6 22:49:05 SilenceServices sshd[12910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106
Oct  6 22:49:07 SilenceServices sshd[12910]: Failed password for invalid user King123 from 51.254.38.106 port 47892 ssh2
Oct  6 22:52:58 SilenceServices sshd[13948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106
2019-10-07 04:59:03
106.12.85.76 attackspam
2019-10-06T20:29:01.615588abusebot-5.cloudsearch.cf sshd\[15295\]: Invalid user max from 106.12.85.76 port 48624
2019-10-07 04:49:38
106.12.23.128 attackbots
Oct  6 22:40:28 vps647732 sshd[18654]: Failed password for root from 106.12.23.128 port 38516 ssh2
...
2019-10-07 04:57:40
76.73.206.90 attackspambots
2019-10-06T08:47:19.2617451495-001 sshd\[55517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90  user=root
2019-10-06T08:47:21.2023411495-001 sshd\[55517\]: Failed password for root from 76.73.206.90 port 38629 ssh2
2019-10-06T08:51:44.0268551495-001 sshd\[55839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90  user=root
2019-10-06T08:51:45.8770171495-001 sshd\[55839\]: Failed password for root from 76.73.206.90 port 49955 ssh2
2019-10-06T08:56:17.4625481495-001 sshd\[56146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90  user=root
2019-10-06T08:56:19.5937531495-001 sshd\[56146\]: Failed password for root from 76.73.206.90 port 43189 ssh2
...
2019-10-07 04:29:11
117.55.241.3 attack
Oct  6 16:24:39 ny01 sshd[4640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.3
Oct  6 16:24:42 ny01 sshd[4640]: Failed password for invalid user 1qaz2wsx3edc4rfv5tgb6yhn from 117.55.241.3 port 33880 ssh2
Oct  6 16:29:13 ny01 sshd[5870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.3
2019-10-07 04:32:10
68.183.160.63 attack
2019-10-06T20:25:03.210491abusebot-5.cloudsearch.cf sshd\[15270\]: Invalid user team from 68.183.160.63 port 47088
2019-10-07 04:55:15
222.186.42.117 attack
Oct  6 21:00:38 venus sshd\[5782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117  user=root
Oct  6 21:00:40 venus sshd\[5782\]: Failed password for root from 222.186.42.117 port 27568 ssh2
Oct  6 21:00:42 venus sshd\[5782\]: Failed password for root from 222.186.42.117 port 27568 ssh2
...
2019-10-07 05:01:07
93.180.9.248 attackspam
Port scan on 1 port(s): 6380
2019-10-07 04:58:03
223.111.184.10 attack
Oct  6 10:20:37 wbs sshd\[4091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.184.10  user=root
Oct  6 10:20:39 wbs sshd\[4091\]: Failed password for root from 223.111.184.10 port 39322 ssh2
Oct  6 10:23:58 wbs sshd\[4423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.184.10  user=root
Oct  6 10:24:00 wbs sshd\[4423\]: Failed password for root from 223.111.184.10 port 54776 ssh2
Oct  6 10:27:19 wbs sshd\[4724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.184.10  user=root
2019-10-07 04:34:22
140.143.17.196 attack
Oct  6 22:31:35 SilenceServices sshd[7947]: Failed password for root from 140.143.17.196 port 50854 ssh2
Oct  6 22:34:56 SilenceServices sshd[8952]: Failed password for root from 140.143.17.196 port 40133 ssh2
2019-10-07 04:51:43

Recently Reported IPs

51.96.235.22 74.24.238.54 118.186.216.217 56.113.53.154
72.80.89.230 3.252.214.191 130.119.213.249 125.192.82.246
97.36.39.253 82.176.197.6 161.38.11.221 138.38.111.48
46.238.202.194 91.243.189.99 214.53.62.5 141.156.48.147
188.0.91.44 140.180.249.105 63.232.61.121 84.203.165.66