Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankford

Region: Ontario

Country: Canada

Internet Service Provider: Xplornet

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.224.122.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.224.122.250.		IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080501 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 06 08:28:26 CST 2020
;; MSG SIZE  rcvd: 119
Host info
250.122.224.104.in-addr.arpa domain name pointer xplr-104-224-122-250.xplornet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
250.122.224.104.in-addr.arpa	name = xplr-104-224-122-250.xplornet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.183.12.191 attack
port scan and connect, tcp 23 (telnet)
2019-08-12 09:13:49
111.125.226.178 attackspam
[portscan] Port scan
2019-08-12 09:46:11
188.121.57.4 attackbots
fail2ban honeypot
2019-08-12 09:49:59
219.92.29.250 attackspam
Brute forcing RDP port 3389
2019-08-12 09:09:39
185.175.93.104 attack
08/11/2019-21:00:43.997296 185.175.93.104 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-12 09:50:59
49.70.59.136 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2019-08-12 09:25:19
107.216.104.94 attackspam
9000/tcp
[2019-08-11]1pkt
2019-08-12 09:52:26
47.91.86.129 attack
Unauthorised access (Aug 11) SRC=47.91.86.129 LEN=40 TTL=52 ID=61079 TCP DPT=8080 WINDOW=39846 SYN
2019-08-12 09:23:31
84.254.11.52 attackspam
Honeypot attack, port: 23, PTR: ipa52.11.tellas.gr.
2019-08-12 09:23:54
61.174.139.227 attackspambots
22/tcp
[2019-08-11]1pkt
2019-08-12 09:45:09
36.234.180.55 attackspambots
23/tcp
[2019-08-11]1pkt
2019-08-12 09:44:05
211.54.70.152 attackbotsspam
Aug 11 19:55:22 ns341937 sshd[25324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.70.152
Aug 11 19:55:23 ns341937 sshd[25324]: Failed password for invalid user nate from 211.54.70.152 port 55068 ssh2
Aug 11 20:01:50 ns341937 sshd[26298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.70.152
...
2019-08-12 09:46:46
68.183.181.7 attackspam
Aug 12 03:07:37 srv206 sshd[22827]: Invalid user marci from 68.183.181.7
...
2019-08-12 09:42:39
103.23.134.11 attackbots
8080/tcp
[2019-08-11]1pkt
2019-08-12 09:46:31
68.183.16.188 attackbotsspam
Fail2Ban Ban Triggered
2019-08-12 09:37:29

Recently Reported IPs

67.69.126.19 177.104.244.245 216.51.193.255 189.240.192.226
119.228.82.112 66.136.202.219 201.160.56.230 120.33.156.6
164.128.233.105 132.203.98.188 126.164.107.137 151.18.170.145
154.59.113.94 67.182.202.93 65.132.96.79 194.44.238.241
191.185.46.24 148.63.4.55 122.232.140.211 119.128.28.228