Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.139.121 attackspambots
May 14 08:55:32 NPSTNNYC01T sshd[14068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
May 14 08:55:34 NPSTNNYC01T sshd[14068]: Failed password for invalid user user from 104.248.139.121 port 49288 ssh2
May 14 08:59:01 NPSTNNYC01T sshd[14354]: Failed password for root from 104.248.139.121 port 56564 ssh2
...
2020-05-14 21:25:45
104.248.139.121 attackbotsspam
May  3 06:22:00 legacy sshd[5370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
May  3 06:22:02 legacy sshd[5370]: Failed password for invalid user mf from 104.248.139.121 port 40166 ssh2
May  3 06:25:38 legacy sshd[5637]: Failed password for root from 104.248.139.121 port 49638 ssh2
...
2020-05-03 12:34:29
104.248.139.121 attackspam
SSH auth scanning - multiple failed logins
2020-04-30 07:33:34
104.248.139.121 attack
2020-04-27T13:03:38.800886abusebot-3.cloudsearch.cf sshd[30948]: Invalid user hung from 104.248.139.121 port 41966
2020-04-27T13:03:38.810081abusebot-3.cloudsearch.cf sshd[30948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-04-27T13:03:38.800886abusebot-3.cloudsearch.cf sshd[30948]: Invalid user hung from 104.248.139.121 port 41966
2020-04-27T13:03:40.381859abusebot-3.cloudsearch.cf sshd[30948]: Failed password for invalid user hung from 104.248.139.121 port 41966 ssh2
2020-04-27T13:07:22.168837abusebot-3.cloudsearch.cf sshd[31229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121  user=root
2020-04-27T13:07:24.161636abusebot-3.cloudsearch.cf sshd[31229]: Failed password for root from 104.248.139.121 port 53746 ssh2
2020-04-27T13:11:04.475551abusebot-3.cloudsearch.cf sshd[31503]: Invalid user znc from 104.248.139.121 port 37302
...
2020-04-27 22:58:33
104.248.139.121 attackbots
Apr 27 11:44:11 dev0-dcde-rnet sshd[22559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Apr 27 11:44:14 dev0-dcde-rnet sshd[22559]: Failed password for invalid user udp from 104.248.139.121 port 52906 ssh2
Apr 27 11:50:16 dev0-dcde-rnet sshd[22729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-04-27 18:07:05
104.248.139.121 attackspam
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-24 23:09:01
104.248.139.121 attackbotsspam
Invalid user od from 104.248.139.121 port 53734
2020-04-23 04:11:27
104.248.139.121 attack
Wordpress malicious attack:[sshd]
2020-04-20 12:17:42
104.248.139.121 attackspam
Apr 20 00:12:29 debian-2gb-nbg1-2 kernel: \[9593314.391754\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.139.121 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=23968 PROTO=TCP SPT=59620 DPT=19842 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-20 08:07:04
104.248.139.121 attackbots
scans once in preceeding hours on the ports (in chronological order) 19153 resulting in total of 5 scans from 104.248.0.0/16 block.
2020-04-20 00:13:49
104.248.139.121 attack
Apr 17 13:56:38 sso sshd[29563]: Failed password for root from 104.248.139.121 port 42032 ssh2
Apr 17 14:00:28 sso sshd[30000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
...
2020-04-17 22:34:21
104.248.139.121 attackbotsspam
Apr 17 09:49:30 vpn01 sshd[24030]: Failed password for root from 104.248.139.121 port 47328 ssh2
...
2020-04-17 16:50:57
104.248.139.121 attackspambots
Apr  8 06:00:12 sso sshd[10238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Apr  8 06:00:14 sso sshd[10238]: Failed password for invalid user aman from 104.248.139.121 port 60516 ssh2
...
2020-04-08 12:18:20
104.248.139.121 attackspam
(sshd) Failed SSH login from 104.248.139.121 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 09:34:42 ubnt-55d23 sshd[17241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121  user=root
Apr  4 09:34:44 ubnt-55d23 sshd[17241]: Failed password for root from 104.248.139.121 port 43664 ssh2
2020-04-04 16:11:55
104.248.139.121 attack
Mar 28 16:31:05 dev0-dcde-rnet sshd[3144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Mar 28 16:31:06 dev0-dcde-rnet sshd[3144]: Failed password for invalid user oracle from 104.248.139.121 port 41678 ssh2
Mar 28 16:41:28 dev0-dcde-rnet sshd[3230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-03-29 00:22:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.139.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.139.93.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:51:33 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 93.139.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.139.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.236.174.181 attack
2020-07-11 05:50:19 plain_virtual_exim authenticator failed for ([37.236.174.181]) [37.236.174.181]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.236.174.181
2020-07-11 19:19:35
176.186.77.215 attackspam
Jul 11 08:24:08 inter-technics sshd[27595]: Invalid user spela from 176.186.77.215 port 52428
Jul 11 08:24:08 inter-technics sshd[27595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.186.77.215
Jul 11 08:24:08 inter-technics sshd[27595]: Invalid user spela from 176.186.77.215 port 52428
Jul 11 08:24:11 inter-technics sshd[27595]: Failed password for invalid user spela from 176.186.77.215 port 52428 ssh2
Jul 11 08:27:34 inter-technics sshd[27748]: Invalid user notepad from 176.186.77.215 port 60280
...
2020-07-11 19:04:46
120.70.100.89 attackspambots
Jul 11 05:49:17 santamaria sshd\[20633\]: Invalid user eric from 120.70.100.89
Jul 11 05:49:17 santamaria sshd\[20633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.89
Jul 11 05:49:19 santamaria sshd\[20633\]: Failed password for invalid user eric from 120.70.100.89 port 33513 ssh2
...
2020-07-11 18:58:55
176.31.116.179 attack
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-07-11 18:58:40
190.109.43.98 attackspambots
2020-07-1105:23:32dovecot_plainauthenticatorfailedfor\([189.85.30.243]\)[189.85.30.243]:41428:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:47dovecot_plainauthenticatorfailedfor\([91.236.133.10]\)[91.236.133.10]:39666:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:25:38dovecot_plainauthenticatorfailedfor\([94.40.82.147]\)[94.40.82.147]:3880:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:35:38dovecot_plainauthenticatorfailedfor\([191.53.252.127]\)[191.53.252.127]:47526:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:10:47dovecot_plainauthenticatorfailedfor\([190.109.43.98]\)[190.109.43.98]:54287:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:48:52dovecot_plainauthenticatorfailedfor\([177.85.19.101]\)[177.85.19.101]:57300:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:41:29dovecot_plainauthenticatorfailedfor\([179.108.240.102]\)[179.108.240.102]:43310:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:22dovecot_plainauthenticatorfail
2020-07-11 19:20:14
141.98.81.209 attackspam
Jul 10 23:39:55 vm0 sshd[28215]: Failed password for root from 141.98.81.209 port 6289 ssh2
Jul 11 12:54:10 vm0 sshd[19955]: Failed password for root from 141.98.81.209 port 10095 ssh2
...
2020-07-11 19:06:05
79.173.90.153 attack
0,14-02/02 [bc01/m04] PostRequest-Spammer scoring: nairobi
2020-07-11 19:16:12
68.183.65.4 attackbots
Jul 11 08:05:15 l02a sshd[14430]: Invalid user shardae from 68.183.65.4
Jul 11 08:05:15 l02a sshd[14430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.65.4 
Jul 11 08:05:15 l02a sshd[14430]: Invalid user shardae from 68.183.65.4
Jul 11 08:05:17 l02a sshd[14430]: Failed password for invalid user shardae from 68.183.65.4 port 36912 ssh2
2020-07-11 18:57:11
152.32.129.152 attack
Jul 11 10:29:42 lnxweb61 sshd[24422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.152
Jul 11 10:29:42 lnxweb61 sshd[24422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.152
2020-07-11 19:11:19
91.236.133.10 attackbots
2020-07-1105:23:32dovecot_plainauthenticatorfailedfor\([189.85.30.243]\)[189.85.30.243]:41428:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:47dovecot_plainauthenticatorfailedfor\([91.236.133.10]\)[91.236.133.10]:39666:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:25:38dovecot_plainauthenticatorfailedfor\([94.40.82.147]\)[94.40.82.147]:3880:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:35:38dovecot_plainauthenticatorfailedfor\([191.53.252.127]\)[191.53.252.127]:47526:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:10:47dovecot_plainauthenticatorfailedfor\([190.109.43.98]\)[190.109.43.98]:54287:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:48:52dovecot_plainauthenticatorfailedfor\([177.85.19.101]\)[177.85.19.101]:57300:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:41:29dovecot_plainauthenticatorfailedfor\([179.108.240.102]\)[179.108.240.102]:43310:535Incorrectauthenticationdata\(set_id=info\)2020-07-1105:11:22dovecot_plainauthenticatorfail
2020-07-11 19:25:06
40.77.167.35 attack
Automatic report - Banned IP Access
2020-07-11 19:08:49
37.139.20.6 attack
Invalid user hermes from 37.139.20.6 port 33723
2020-07-11 19:17:45
64.202.185.246 attackbotsspam
64.202.185.246 - - [11/Jul/2020:04:48:48 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.202.185.246 - - [11/Jul/2020:04:48:49 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.202.185.246 - - [11/Jul/2020:04:48:50 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-11 19:28:54
103.90.228.121 attackbotsspam
Invalid user skranetcan from 103.90.228.121 port 37842
2020-07-11 19:05:09
46.101.245.176 attackspam
Jul 11 10:27:02 xeon sshd[61232]: Failed password for invalid user esuser from 46.101.245.176 port 38424 ssh2
2020-07-11 19:13:58

Recently Reported IPs

46.149.161.57 104.248.142.32 104.248.144.135 104.248.150.19
104.248.150.22 104.248.149.215 104.248.146.112 104.248.159.41
104.248.158.7 104.248.151.104 104.248.161.98 104.248.161.27
104.248.156.47 104.248.160.129 104.248.168.9 104.248.163.10
104.248.17.177 104.248.17.175 104.248.165.183 104.248.169.51