Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Salt Lake City

Region: Utah

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: CenturyLink Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
65.155.248.106 attack
Unauthorized connection attempt detected from IP address 65.155.248.106 to port 9673
2020-06-21 16:28:04
65.155.248.106 attackbots
W 31101,/var/log/nginx/access.log,-,-
2020-04-28 20:19:02
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.155.248.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;65.155.248.242.			IN	A

;; AUTHORITY SECTION:
.			231	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081400 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 03:29:14 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 242.248.155.65.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 242.248.155.65.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
82.102.115.155 attackbotsspam
Honeypot attack, port: 5555, PTR: cpe-686958.ip.primehome.com.
2020-02-20 05:53:31
49.118.131.165 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-20 05:34:39
92.118.160.45 attack
firewall-block, port(s): 5061/tcp
2020-02-20 05:46:49
12.175.66.34 attack
Trying ports that it shouldn't be.
2020-02-20 05:34:54
61.91.21.130 attackbots
Unauthorized connection attempt from IP address 61.91.21.130 on Port 445(SMB)
2020-02-20 05:38:30
190.129.75.197 attack
Feb 19 16:12:01 debian-2gb-nbg1-2 kernel: \[4384334.009687\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=190.129.75.197 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=231 ID=5410 PROTO=TCP SPT=53066 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-20 05:40:57
188.237.135.172 attackspambots
Honeypot attack, port: 445, PTR: host-static-188-237-135-172.moldtelecom.md.
2020-02-20 05:45:03
92.118.160.53 attack
Honeypot attack, port: 139, PTR: 92.118.160.53.netsystemsresearch.com.
2020-02-20 05:34:24
141.101.22.254 attackspam
" "
2020-02-20 05:32:10
117.5.121.128 attackspambots
Honeypot attack, port: 5555, PTR: localhost.
2020-02-20 05:32:33
152.168.137.2 attackbots
SSH Brute Force
2020-02-20 05:41:57
82.193.124.252 attackbotsspam
UA_IPNETUA-MNT_<177>1582149531 [1:2403438:55470] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 70 [Classification: Misc Attack] [Priority: 2] {TCP} 82.193.124.252:21977
2020-02-20 06:03:55
190.199.96.255 attack
Honeypot attack, port: 445, PTR: 190-199-96-255.dyn.dsl.cantv.net.
2020-02-20 05:41:39
125.138.58.188 attackspambots
$f2bV_matches
2020-02-20 05:50:28
92.118.160.61 attack
firewall-block, port(s): 8082/tcp
2020-02-20 05:24:52

Recently Reported IPs

222.160.107.2 43.58.91.209 148.188.72.189 11.183.231.228
238.59.222.249 58.119.24.199 37.71.145.248 82.10.166.159
136.116.113.67 96.71.4.56 31.109.76.4 167.72.116.177
40.92.190.50 2.249.206.31 37.74.73.86 186.225.239.5
216.196.159.17 1.176.241.139 221.205.135.108 125.34.188.241