Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hässleholm

Region: Skåne

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.248.242.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64916
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;83.248.242.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 01:18:20 CST 2019
;; MSG SIZE  rcvd: 118
Host info
148.242.248.83.in-addr.arpa domain name pointer c83-248-242-148.bredband.comhem.se.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.242.248.83.in-addr.arpa	name = c83-248-242-148.bredband.comhem.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
184.22.142.134 attackspam
unauthorized connection attempt
2020-01-04 19:39:54
222.186.175.182 attackbots
Jan  4 11:11:22 IngegnereFirenze sshd[4885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
...
2020-01-04 19:15:18
94.25.160.189 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 08:05:17.
2020-01-04 19:39:19
187.18.202.235 attackspam
Unauthorized connection attempt detected from IP address 187.18.202.235 to port 23
2020-01-04 19:21:29
182.105.53.18 attackbotsspam
1578113161 - 01/04/2020 05:46:01 Host: 182.105.53.18/182.105.53.18 Port: 445 TCP Blocked
2020-01-04 19:41:21
49.89.15.80 attackbotsspam
Automatic report - Port Scan Attack
2020-01-04 19:20:28
14.166.254.38 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-04 19:43:39
184.105.139.67 attack
Unauthorized connection attempt detected from IP address 184.105.139.67 to port 5555 [J]
2020-01-04 19:42:51
106.12.180.216 attack
[ssh] SSH attack
2020-01-04 19:25:56
43.254.163.156 attack
Unauthorized connection attempt from IP address 43.254.163.156 on Port 445(SMB)
2020-01-04 19:31:05
85.155.154.198 attackbots
Jan  4 10:58:19 www sshd\[157459\]: Invalid user nagios from 85.155.154.198
Jan  4 10:58:19 www sshd\[157459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.155.154.198
Jan  4 10:58:21 www sshd\[157459\]: Failed password for invalid user nagios from 85.155.154.198 port 55010 ssh2
...
2020-01-04 19:45:24
211.21.230.210 attack
Honeypot attack, port: 23, PTR: 211-21-230-210.HINET-IP.hinet.net.
2020-01-04 19:09:50
101.109.113.165 attack
Unauthorized connection attempt from IP address 101.109.113.165 on Port 445(SMB)
2020-01-04 19:28:28
117.4.115.55 attack
Unauthorized connection attempt from IP address 117.4.115.55 on Port 445(SMB)
2020-01-04 19:16:37
139.59.248.5 attackspambots
leo_www
2020-01-04 19:08:21

Recently Reported IPs

112.24.193.190 208.252.177.249 210.5.88.23 194.216.138.252
208.171.240.110 61.60.249.122 196.206.250.169 109.166.211.145
168.252.152.81 251.217.241.15 195.74.106.56 110.199.72.66
172.254.188.208 205.206.6.157 132.145.232.124 114.95.63.85
183.4.145.21 75.43.198.253 156.255.169.15 87.118.254.56