Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Mar 16 15:35:18  sshd\[11502\]: User root from 104.248.144.147 not allowed because not listed in AllowUsersMar 16 15:35:20  sshd\[11502\]: Failed password for invalid user root from 104.248.144.147 port 39346 ssh2
...
2020-03-17 07:07:58
Comments on same subnet:
IP Type Details Datetime
104.248.144.94 attackbots
sshd jail - ssh hack attempt
2020-07-11 00:48:47
104.248.144.94 attackbotsspam
$f2bV_matches
2020-07-10 16:55:02
104.248.144.208 attack
104.248.144.208 - - [30/Jun/2020:13:44:09 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [30/Jun/2020:13:44:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1924 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [30/Jun/2020:13:44:15 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-01 00:47:22
104.248.144.208 attackspambots
104.248.144.208 - - [29/Jun/2020:04:58:23 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [29/Jun/2020:04:58:26 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [29/Jun/2020:04:58:27 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-29 12:14:39
104.248.144.208 attackspam
Attempt to log in with non-existing username: admin
2020-06-04 14:33:13
104.248.144.208 attackbots
104.248.144.208 - - [01/Jun/2020:14:27:58 +0200] "GET /wp-login.php HTTP/1.1" 200 6364 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [01/Jun/2020:14:28:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6615 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [01/Jun/2020:14:28:07 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-01 23:04:31
104.248.144.208 attackspambots
104.248.144.208 - - [28/May/2020:14:03:14 +0200] "GET /wp-login.php HTTP/1.1" 200 5865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [28/May/2020:14:03:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.144.208 - - [28/May/2020:14:03:18 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-28 20:54:25
104.248.144.208 attack
abasicmove.de 104.248.144.208 [10/May/2020:15:30:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6098 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
abasicmove.de 104.248.144.208 [10/May/2020:15:30:30 +0200] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 19:13:49
104.248.144.208 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-15 08:20:54
104.248.144.208 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-11 04:01:42
104.248.144.208 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-03-26 03:27:09
104.248.144.208 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-14 09:32:48
104.248.144.208 attackspam
xmlrpc attack
2020-02-19 21:43:52
104.248.144.208 attack
Automatic report - XMLRPC Attack
2020-02-03 14:06:18
104.248.144.208 attackspam
C1,WP GET /nelson/wp-login.php
2020-01-13 17:17:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.144.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.248.144.147.		IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031601 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 07:07:55 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 147.144.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.144.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.110 attackbotsspam
trying to connect to the root user of my server
2020-10-08 16:59:03
112.85.42.172 attack
Oct  8 10:28:40 minden010 sshd[25129]: Failed password for root from 112.85.42.172 port 41734 ssh2
Oct  8 10:28:44 minden010 sshd[25129]: Failed password for root from 112.85.42.172 port 41734 ssh2
Oct  8 10:28:47 minden010 sshd[25129]: Failed password for root from 112.85.42.172 port 41734 ssh2
Oct  8 10:28:50 minden010 sshd[25129]: Failed password for root from 112.85.42.172 port 41734 ssh2
...
2020-10-08 16:29:00
111.229.48.141 attack
SSH login attempts.
2020-10-08 17:01:38
46.101.19.133 attack
Oct  7 20:04:25 eddieflores sshd\[11181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
Oct  7 20:04:28 eddieflores sshd\[11181\]: Failed password for root from 46.101.19.133 port 59256 ssh2
Oct  7 20:08:22 eddieflores sshd\[11501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
Oct  7 20:08:24 eddieflores sshd\[11501\]: Failed password for root from 46.101.19.133 port 33969 ssh2
Oct  7 20:12:14 eddieflores sshd\[11818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-10-08 16:30:42
122.51.201.158 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-08 16:38:45
222.240.1.0 attackbots
2020-10-08T03:17:35.927660abusebot-8.cloudsearch.cf sshd[12386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-10-08T03:17:37.859567abusebot-8.cloudsearch.cf sshd[12386]: Failed password for root from 222.240.1.0 port 32948 ssh2
2020-10-08T03:20:04.766576abusebot-8.cloudsearch.cf sshd[12400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-10-08T03:20:06.819010abusebot-8.cloudsearch.cf sshd[12400]: Failed password for root from 222.240.1.0 port 40593 ssh2
2020-10-08T03:22:23.370335abusebot-8.cloudsearch.cf sshd[12418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-10-08T03:22:25.171860abusebot-8.cloudsearch.cf sshd[12418]: Failed password for root from 222.240.1.0 port 11170 ssh2
2020-10-08T03:24:50.138079abusebot-8.cloudsearch.cf sshd[12530]: pam_unix(sshd:auth): authentication fa
...
2020-10-08 16:52:05
192.241.153.102 attackspam
SSH login attempts.
2020-10-08 16:47:50
165.22.206.182 attackspambots
Oct  8 04:47:05 firewall sshd[17042]: Failed password for root from 165.22.206.182 port 35720 ssh2
Oct  8 04:50:30 firewall sshd[17144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.206.182  user=root
Oct  8 04:50:32 firewall sshd[17144]: Failed password for root from 165.22.206.182 port 41774 ssh2
...
2020-10-08 16:56:05
49.233.108.195 attackspam
prod6
...
2020-10-08 17:05:21
89.179.247.249 attackspam
Oct  8 05:41:52 *** sshd[32046]: User root from 89.179.247.249 not allowed because not listed in AllowUsers
2020-10-08 16:53:33
119.65.95.181 attack
Automatic report - Banned IP Access
2020-10-08 16:41:16
140.210.90.197 attackspam
2020-10-08T07:53:49.693136shield sshd\[16096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197  user=root
2020-10-08T07:53:51.613195shield sshd\[16096\]: Failed password for root from 140.210.90.197 port 35508 ssh2
2020-10-08T07:58:04.296994shield sshd\[16566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197  user=root
2020-10-08T07:58:06.222240shield sshd\[16566\]: Failed password for root from 140.210.90.197 port 33448 ssh2
2020-10-08T08:02:11.398154shield sshd\[17027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197  user=root
2020-10-08 16:58:42
164.90.216.156 attackspambots
Oct  8 05:53:19 firewall sshd[18495]: Failed password for root from 164.90.216.156 port 42626 ssh2
Oct  8 05:56:49 firewall sshd[18598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.216.156  user=root
Oct  8 05:56:52 firewall sshd[18598]: Failed password for root from 164.90.216.156 port 47360 ssh2
...
2020-10-08 17:01:14
182.150.44.41 attack
SSH login attempts.
2020-10-08 16:47:13
222.186.42.137 attack
2020-10-08T10:26:07.289927vps773228.ovh.net sshd[17536]: Failed password for root from 222.186.42.137 port 36915 ssh2
2020-10-08T10:26:09.509248vps773228.ovh.net sshd[17536]: Failed password for root from 222.186.42.137 port 36915 ssh2
2020-10-08T10:26:12.334215vps773228.ovh.net sshd[17536]: Failed password for root from 222.186.42.137 port 36915 ssh2
2020-10-08T10:26:24.965927vps773228.ovh.net sshd[17538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-10-08T10:26:26.940180vps773228.ovh.net sshd[17538]: Failed password for root from 222.186.42.137 port 63312 ssh2
...
2020-10-08 16:27:10

Recently Reported IPs

45.152.34.231 170.81.81.179 143.208.194.66 167.71.241.43
86.120.131.144 49.235.238.17 89.46.197.46 84.64.184.225
212.237.120.224 190.12.115.8 141.98.11.118 105.226.32.216
123.231.105.184 205.185.122.238 167.89.87.204 186.47.98.2
177.191.213.180 39.38.236.240 165.227.82.48 94.103.202.93