Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.192.242.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.192.242.248.		IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:45:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 248.242.192.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 104.192.242.248.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.101.177.98 attackspambots
Lines containing failures of 190.101.177.98
Sep  3 14:49:29 www sshd[6747]: Invalid user noel from 190.101.177.98 port 49546
Sep  3 14:49:29 www sshd[6747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.101.177.98
Sep  3 14:49:32 www sshd[6747]: Failed password for invalid user noel from 190.101.177.98 port 49546 ssh2
Sep  3 14:49:32 www sshd[6747]: Received disconnect from 190.101.177.98 port 49546:11: Bye Bye [preauth]
Sep  3 14:49:32 www sshd[6747]: Disconnected from invalid user noel 190.101.177.98 port 49546 [preauth]
Sep  3 14:53:43 www sshd[7179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.101.177.98  user=r.r
Sep  3 14:53:45 www sshd[7179]: Failed password for r.r from 190.101.177.98 port 54012 ssh2
Sep  3 14:53:45 www sshd[7179]: Received disconnect from 190.101.177.98 port 54012:11: Bye Bye [preauth]
Sep  3 14:53:45 www sshd[7179]: Disconnected from authenticating use........
------------------------------
2020-09-04 19:22:34
69.29.16.209 attack
Honeypot attack, port: 445, PTR: 69-29-16-209.stat.centurytel.net.
2020-09-04 19:26:50
80.90.80.117 attackbotsspam
TCP ports : 7770 / 7777
2020-09-04 19:03:49
194.67.210.77 attackspambots
Automated report (2020-09-04T13:25:33+08:00). Faked user agent detected.
2020-09-04 18:58:34
183.82.34.246 attackbotsspam
Sep  4 03:44:34 ajax sshd[20046]: Failed password for root from 183.82.34.246 port 45136 ssh2
2020-09-04 18:50:19
196.216.73.90 attack
Sep  4 10:20:00 jumpserver sshd[222712]: Invalid user sistemas from 196.216.73.90 port 18579
Sep  4 10:20:02 jumpserver sshd[222712]: Failed password for invalid user sistemas from 196.216.73.90 port 18579 ssh2
Sep  4 10:22:45 jumpserver sshd[222728]: Invalid user vnc from 196.216.73.90 port 21916
...
2020-09-04 19:11:02
113.140.80.174 attackspam
Sep  4 09:08:42 h2646465 sshd[24146]: Invalid user market from 113.140.80.174
Sep  4 09:08:42 h2646465 sshd[24146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.80.174
Sep  4 09:08:42 h2646465 sshd[24146]: Invalid user market from 113.140.80.174
Sep  4 09:08:44 h2646465 sshd[24146]: Failed password for invalid user market from 113.140.80.174 port 6350 ssh2
Sep  4 09:11:34 h2646465 sshd[24818]: Invalid user hbr from 113.140.80.174
Sep  4 09:11:34 h2646465 sshd[24818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.80.174
Sep  4 09:11:34 h2646465 sshd[24818]: Invalid user hbr from 113.140.80.174
Sep  4 09:11:36 h2646465 sshd[24818]: Failed password for invalid user hbr from 113.140.80.174 port 21669 ssh2
Sep  4 09:12:30 h2646465 sshd[24876]: Invalid user testuser from 113.140.80.174
...
2020-09-04 19:11:37
42.118.242.189 attackspam
Time:     Fri Sep  4 07:01:04 2020 -0400
IP:       42.118.242.189 (VN/Vietnam/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  4 06:54:47 pv-11-ams1 sshd[18957]: Invalid user student from 42.118.242.189 port 60934
Sep  4 06:54:50 pv-11-ams1 sshd[18957]: Failed password for invalid user student from 42.118.242.189 port 60934 ssh2
Sep  4 06:58:28 pv-11-ams1 sshd[19186]: Invalid user website from 42.118.242.189 port 51436
Sep  4 06:58:30 pv-11-ams1 sshd[19186]: Failed password for invalid user website from 42.118.242.189 port 51436 ssh2
Sep  4 07:00:59 pv-11-ams1 sshd[19358]: Invalid user lixiang from 42.118.242.189 port 60026
2020-09-04 19:14:22
106.13.190.51 attackbots
Brute-force attempt banned
2020-09-04 18:54:12
39.153.252.94 attack
Sep  2 19:43:54 www3-7 sshd[25235]: Did not receive identification string from 39.153.252.94 port 40327
Sep  3 11:50:01 www3-7 sshd[13399]: Did not receive identification string from 39.153.252.94 port 48125
Sep  3 11:50:08 www3-7 sshd[13482]: Invalid user user from 39.153.252.94 port 54153
Sep  3 11:50:09 www3-7 sshd[13482]: Connection closed by 39.153.252.94 port 54153 [preauth]
Sep  3 11:51:03 www3-7 sshd[13486]: Invalid user oracle from 39.153.252.94 port 38673
Sep  3 11:51:07 www3-7 sshd[13486]: Connection closed by 39.153.252.94 port 38673 [preauth]
Sep  3 11:51:09 www3-7 sshd[13545]: Invalid user admin from 39.153.252.94 port 49882
Sep  3 11:51:10 www3-7 sshd[13545]: Connection closed by 39.153.252.94 port 49882 [preauth]
Sep  3 11:51:19 www3-7 sshd[13547]: Invalid user test from 39.153.252.94 port 53810
Sep  3 11:51:27 www3-7 sshd[13547]: Connection closed by 39.153.252.94 port 53810 [preauth]
Sep  3 11:51:50 www3-7 sshd[13554]: Invalid user hadoop from 39.153.2........
-------------------------------
2020-09-04 19:02:47
175.101.156.126 attackspambots
IP 175.101.156.126 attacked honeypot on port: 1433 at 9/3/2020 9:43:16 AM
2020-09-04 19:12:54
185.220.102.250 attackspam
Sep  4 12:56:59 kh-dev-server sshd[19701]: Failed password for root from 185.220.102.250 port 2604 ssh2
...
2020-09-04 19:26:15
49.234.52.176 attackspambots
Invalid user csj from 49.234.52.176 port 44690
2020-09-04 18:52:15
185.220.101.15 attackbotsspam
Automatic report - Banned IP Access
2020-09-04 18:50:05
188.146.171.252 attackspam
Sep  3 18:43:39 mellenthin postfix/smtpd[20267]: NOQUEUE: reject: RCPT from 188.146.171.252.nat.umts.dynamic.t-mobile.pl[188.146.171.252]: 554 5.7.1 Service unavailable; Client host [188.146.171.252] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/188.146.171.252; from= to= proto=ESMTP helo=<188.146.171.252.nat.umts.dynamic.t-mobile.pl>
2020-09-04 19:04:21

Recently Reported IPs

104.192.242.228 104.192.242.240 104.192.242.253 104.192.242.26
104.192.242.250 101.109.20.222 104.192.242.32 104.192.242.28
104.192.242.34 104.192.242.53 104.192.242.40 104.192.242.42
199.65.224.120 101.109.20.28 104.192.242.59 104.192.242.77
104.192.242.69 104.192.242.80 104.192.242.78 104.192.242.83