Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.115.254 attackbotsspam
104.248.115.254 - - [24/Jun/2020:13:08:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.115.254 - - [24/Jun/2020:13:08:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.115.254 - - [24/Jun/2020:13:08:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2037 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-24 22:05:14
104.248.115.254 attack
timhelmke.de 104.248.115.254 [16/May/2020:23:26:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5987 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
timhelmke.de 104.248.115.254 [16/May/2020:23:26:48 +0200] "POST /wp-login.php HTTP/1.1" 200 5941 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-23 06:28:11
104.248.115.231 attack
IP attempted unauthorised action
2019-11-12 01:10:46
104.248.115.231 attackspam
2019-11-05T14:41:17.380815abusebot.cloudsearch.cf sshd\[4884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.115.231  user=root
2019-11-05 23:29:41
104.248.115.231 attackbotsspam
Oct 27 10:09:51 ncomp sshd[5359]: Invalid user zimbra from 104.248.115.231
Oct 27 10:09:51 ncomp sshd[5359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.115.231
Oct 27 10:09:51 ncomp sshd[5359]: Invalid user zimbra from 104.248.115.231
Oct 27 10:09:52 ncomp sshd[5359]: Failed password for invalid user zimbra from 104.248.115.231 port 49030 ssh2
2019-10-27 17:21:51
104.248.115.231 attack
Invalid user usuario from 104.248.115.231 port 58726
2019-10-25 02:56:28
104.248.115.231 attackspam
SSH Brute-Force reported by Fail2Ban
2019-10-22 15:06:55
104.248.115.231 attackbotsspam
Oct 21 14:28:49 localhost sshd\[24454\]: Invalid user usuario from 104.248.115.231 port 41512
Oct 21 14:28:49 localhost sshd\[24454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.115.231
Oct 21 14:28:51 localhost sshd\[24454\]: Failed password for invalid user usuario from 104.248.115.231 port 41512 ssh2
2019-10-21 22:07:14
104.248.115.231 attackbotsspam
" "
2019-10-17 02:49:08
104.248.115.231 attack
Oct 16 07:21:24 * sshd[29010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.115.231
Oct 16 07:21:26 * sshd[29010]: Failed password for invalid user jboss from 104.248.115.231 port 38560 ssh2
2019-10-16 13:59:16
104.248.115.231 attack
Oct 15 09:43:54 vps01 sshd[8044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.115.231
Oct 15 09:43:57 vps01 sshd[8044]: Failed password for invalid user admin from 104.248.115.231 port 38620 ssh2
2019-10-15 16:46:11
104.248.115.231 attackspam
Invalid user oracle from 104.248.115.231 port 43558
2019-10-11 21:19:42
104.248.115.231 attackspam
Oct 10 20:11:45 thevastnessof sshd[20890]: Failed password for root from 104.248.115.231 port 53192 ssh2
...
2019-10-11 04:25:56
104.248.115.231 attack
Invalid user test from 104.248.115.231 port 46080
2019-10-11 03:26:29
104.248.115.231 attackspam
Oct  8 19:42:53 arianus sshd\[15019\]: Unable to negotiate with 104.248.115.231 port 44406: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-10-09 02:19:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.115.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.115.159.		IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 09:45:43 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 159.115.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.115.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.198.202 attack
2020-05-06 02:40:22 server sshd[75715]: Failed password for invalid user root from 111.67.198.202 port 39874 ssh2
2020-05-07 00:14:39
201.49.127.212 attackbots
SSH Brute-Force. Ports scanning.
2020-05-06 23:56:04
123.149.98.15 attack
Bad Postfix AUTH attempts
2020-05-07 00:10:05
103.246.240.26 attackbots
SSH_attack
2020-05-07 00:15:12
138.197.118.32 attackbotsspam
May  6 18:02:42 lukav-desktop sshd\[17422\]: Invalid user charles from 138.197.118.32
May  6 18:02:42 lukav-desktop sshd\[17422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.118.32
May  6 18:02:44 lukav-desktop sshd\[17422\]: Failed password for invalid user charles from 138.197.118.32 port 52566 ssh2
May  6 18:07:17 lukav-desktop sshd\[14117\]: Invalid user dada from 138.197.118.32
May  6 18:07:17 lukav-desktop sshd\[14117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.118.32
2020-05-07 00:09:09
209.222.101.41 attackbots
May  6 17:26:03 mail kernel: [784380.525605] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=209.222.101.41 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=42156 PROTO=TCP SPT=56528 DPT=29634 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-05-06 23:37:15
151.80.34.219 attack
May  6 14:52:46 ns3033917 sshd[17607]: Invalid user demo from 151.80.34.219 port 9224
May  6 14:52:48 ns3033917 sshd[17607]: Failed password for invalid user demo from 151.80.34.219 port 9224 ssh2
May  6 15:48:53 ns3033917 sshd[18054]: Invalid user arkserver from 151.80.34.219 port 9224
...
2020-05-06 23:50:11
222.186.175.154 attackbotsspam
May  6 17:37:15 meumeu sshd[6780]: Failed password for root from 222.186.175.154 port 14880 ssh2
May  6 17:37:19 meumeu sshd[6780]: Failed password for root from 222.186.175.154 port 14880 ssh2
May  6 17:37:35 meumeu sshd[6780]: Failed password for root from 222.186.175.154 port 14880 ssh2
May  6 17:37:36 meumeu sshd[6780]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 14880 ssh2 [preauth]
...
2020-05-06 23:39:03
129.213.150.225 attackbotsspam
May  6 11:15:04 XXX sshd[687]: Invalid user user1 from 129.213.150.225 port 4617
2020-05-07 00:09:30
116.97.243.118 attack
20/5/6@08:00:09: FAIL: Alarm-Network address from=116.97.243.118
...
2020-05-06 23:45:13
180.96.63.162 attack
May  6 16:27:02 pve1 sshd[27472]: Failed password for root from 180.96.63.162 port 55325 ssh2
...
2020-05-06 23:52:50
43.225.181.48 attackspam
Unauthorized SSH login attempts
2020-05-07 00:01:37
5.79.234.141 attack
Unauthorized connection attempt from IP address 5.79.234.141 on Port 445(SMB)
2020-05-07 00:01:56
23.247.33.61 attack
(sshd) Failed SSH login from 23.247.33.61 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 13:52:46 amsweb01 sshd[16016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61  user=root
May  6 13:52:48 amsweb01 sshd[16016]: Failed password for root from 23.247.33.61 port 43514 ssh2
May  6 13:57:38 amsweb01 sshd[16646]: Invalid user xv from 23.247.33.61 port 39374
May  6 13:57:40 amsweb01 sshd[16646]: Failed password for invalid user xv from 23.247.33.61 port 39374 ssh2
May  6 14:00:10 amsweb01 sshd[16965]: User admin from 23.247.33.61 not allowed because not listed in AllowUsers
2020-05-06 23:41:01
104.215.197.210 attackspam
$f2bV_matches
2020-05-06 23:53:45

Recently Reported IPs

104.248.105.245 104.248.134.107 104.248.134.45 104.248.141.120
104.248.143.223 104.248.146.133 104.248.155.229 104.248.163.37
127.224.60.158 104.248.170.73 104.248.180.153 104.248.193.176
104.248.198.139 104.248.203.182 104.248.24.178 104.248.241.107
104.248.241.118 104.248.252.165 211.209.19.104 104.248.29.171