Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.208.119.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.208.119.148.		IN	A

;; AUTHORITY SECTION:
.			394	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 18:48:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 148.119.208.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.119.208.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.146.86.22 attack
Unauthorized connection attempt from IP address 219.146.86.22 on Port 445(SMB)
2020-01-15 20:42:42
159.89.160.91 attack
Unauthorized connection attempt detected from IP address 159.89.160.91 to port 3896 [J]
2020-01-15 20:11:49
157.230.42.76 attack
Unauthorized connection attempt detected from IP address 157.230.42.76 to port 2220 [J]
2020-01-15 20:19:52
77.247.108.241 attackbotsspam
SIP Server BruteForce Attack
2020-01-15 20:19:33
198.108.67.57 attackspam
firewall-block, port(s): 3101/tcp
2020-01-15 20:50:14
142.93.154.90 attack
Unauthorized connection attempt detected from IP address 142.93.154.90 to port 2220 [J]
2020-01-15 20:43:26
218.92.0.175 attack
Jan 15 17:35:18 gw1 sshd[24408]: Failed password for root from 218.92.0.175 port 51836 ssh2
Jan 15 17:35:32 gw1 sshd[24408]: Failed password for root from 218.92.0.175 port 51836 ssh2
Jan 15 17:35:32 gw1 sshd[24408]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 51836 ssh2 [preauth]
...
2020-01-15 20:39:00
31.173.113.46 attack
unauthorized connection attempt
2020-01-15 20:24:02
222.186.190.17 attackspambots
Jan 15 12:06:25 ip-172-31-62-245 sshd\[24161\]: Failed password for root from 222.186.190.17 port 61585 ssh2\
Jan 15 12:06:44 ip-172-31-62-245 sshd\[24163\]: Failed password for root from 222.186.190.17 port 16646 ssh2\
Jan 15 12:07:09 ip-172-31-62-245 sshd\[24165\]: Failed password for root from 222.186.190.17 port 44778 ssh2\
Jan 15 12:07:55 ip-172-31-62-245 sshd\[24174\]: Failed password for root from 222.186.190.17 port 57617 ssh2\
Jan 15 12:11:07 ip-172-31-62-245 sshd\[24275\]: Failed password for root from 222.186.190.17 port 33247 ssh2\
2020-01-15 20:25:21
203.147.65.90 attackbots
Brute force attack to crack SMTP password (port 25 / 587)
2020-01-15 20:43:13
124.78.44.35 attack
Unauthorized connection attempt from IP address 124.78.44.35 on Port 445(SMB)
2020-01-15 20:18:58
41.223.152.50 attack
C1,WP GET /wp-login.php
2020-01-15 20:14:49
95.181.217.155 attack
B: zzZZzz blocked content access
2020-01-15 20:33:11
103.192.78.178 attack
invalid login attempt
2020-01-15 20:13:23
109.96.84.46 attack
Unauthorized connection attempt detected from IP address 109.96.84.46 to port 1433 [J]
2020-01-15 20:30:05

Recently Reported IPs

104.208.104.55 104.21.224.143 104.21.224.68 104.21.225.146
104.21.228.172 104.21.230.178 104.21.233.237 104.21.233.238
104.21.236.15 104.21.236.228 104.21.238.240 104.21.238.245
104.21.238.77 104.21.239.16 104.21.239.245 25.39.137.222
219.153.248.202 104.210.44.57 104.211.103.217 104.211.22.159