Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.164.123 attack
Jun 16 08:19:49 pbkit sshd[22632]: Invalid user ftpguest from 104.248.164.123 port 35842
Jun 16 08:19:51 pbkit sshd[22632]: Failed password for invalid user ftpguest from 104.248.164.123 port 35842 ssh2
Jun 16 08:25:44 pbkit sshd[22789]: Invalid user marilena from 104.248.164.123 port 36848
...
2020-06-16 18:53:10
104.248.164.123 attackbotsspam
Jun 14 10:38:39 Ubuntu-1404-trusty-64-minimal sshd\[23748\]: Invalid user admin from 104.248.164.123
Jun 14 10:38:39 Ubuntu-1404-trusty-64-minimal sshd\[23748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123
Jun 14 10:38:41 Ubuntu-1404-trusty-64-minimal sshd\[23748\]: Failed password for invalid user admin from 104.248.164.123 port 38408 ssh2
Jun 14 10:44:20 Ubuntu-1404-trusty-64-minimal sshd\[26105\]: Invalid user russ from 104.248.164.123
Jun 14 10:44:20 Ubuntu-1404-trusty-64-minimal sshd\[26105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123
2020-06-14 19:47:17
104.248.164.123 attack
Invalid user default from 104.248.164.123 port 47504
2020-06-13 18:35:06
104.248.164.123 attackbotsspam
Jun 11 09:47:49 *** sshd[18910]: User root from 104.248.164.123 not allowed because not listed in AllowUsers
2020-06-11 18:22:44
104.248.164.123 attackbots
Jun  5 07:53:46 lukav-desktop sshd\[28213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123  user=root
Jun  5 07:53:47 lukav-desktop sshd\[28213\]: Failed password for root from 104.248.164.123 port 42874 ssh2
Jun  5 07:57:27 lukav-desktop sshd\[28288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123  user=root
Jun  5 07:57:29 lukav-desktop sshd\[28288\]: Failed password for root from 104.248.164.123 port 46628 ssh2
Jun  5 08:01:06 lukav-desktop sshd\[28360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123  user=root
2020-06-05 16:19:30
104.248.164.123 attackbotsspam
Jun  1 08:15:30 hosting sshd[15808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123  user=root
Jun  1 08:15:32 hosting sshd[15808]: Failed password for root from 104.248.164.123 port 59474 ssh2
...
2020-06-01 14:44:04
104.248.164.123 attackbotsspam
May 26 18:55:26 pve1 sshd[10815]: Failed password for root from 104.248.164.123 port 51794 ssh2
...
2020-05-27 01:22:35
104.248.164.123 attackspambots
May 16 00:55:10 vpn01 sshd[28336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123
May 16 00:55:12 vpn01 sshd[28336]: Failed password for invalid user deploy from 104.248.164.123 port 56822 ssh2
...
2020-05-16 21:18:18
104.248.164.123 attackspam
Invalid user user from 104.248.164.123 port 42278
2020-05-15 06:33:45
104.248.164.123 attack
SSH brute-force attempt
2020-05-12 03:18:12
104.248.164.123 attackbots
May  4 02:57:13 vps46666688 sshd[31321]: Failed password for root from 104.248.164.123 port 53460 ssh2
May  4 03:00:43 vps46666688 sshd[31607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.164.123
...
2020-05-04 14:01:24
104.248.164.123 attackspam
Invalid user zoe from 104.248.164.123 port 39248
2020-04-30 06:03:41
104.248.164.123 attackspam
(sshd) Failed SSH login from 104.248.164.123 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 26 05:46:47 elude sshd[24937]: Invalid user wlw from 104.248.164.123 port 59250
Apr 26 05:46:48 elude sshd[24937]: Failed password for invalid user wlw from 104.248.164.123 port 59250 ssh2
Apr 26 05:54:01 elude sshd[25963]: Invalid user kay from 104.248.164.123 port 51138
Apr 26 05:54:03 elude sshd[25963]: Failed password for invalid user kay from 104.248.164.123 port 51138 ssh2
Apr 26 05:56:10 elude sshd[26305]: Invalid user shen from 104.248.164.123 port 33518
2020-04-26 12:51:47
104.248.164.123 attack
ssh brute force
2020-04-21 06:42:02
104.248.164.123 attack
srv03 Mass scanning activity detected Target: 10887  ..
2020-04-20 08:07:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.164.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.164.139.		IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:24:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 139.164.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.164.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.212.100 attack
Oct 26 03:48:22 hcbbdb sshd\[6913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.100  user=root
Oct 26 03:48:24 hcbbdb sshd\[6913\]: Failed password for root from 106.12.212.100 port 53356 ssh2
Oct 26 03:48:25 hcbbdb sshd\[6923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.100  user=root
Oct 26 03:48:27 hcbbdb sshd\[6923\]: Failed password for root from 106.12.212.100 port 53440 ssh2
Oct 26 03:48:30 hcbbdb sshd\[6935\]: Invalid user pi from 106.12.212.100
2019-10-26 16:22:11
180.182.47.132 attack
Oct 25 17:43:35 tdfoods sshd\[29924\]: Invalid user pass from 180.182.47.132
Oct 25 17:43:35 tdfoods sshd\[29924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
Oct 25 17:43:37 tdfoods sshd\[29924\]: Failed password for invalid user pass from 180.182.47.132 port 59572 ssh2
Oct 25 17:48:17 tdfoods sshd\[30289\]: Invalid user Jana from 180.182.47.132
Oct 25 17:48:17 tdfoods sshd\[30289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
2019-10-26 16:30:00
116.196.80.104 attackspam
2019-10-26T03:47:44.619880abusebot-4.cloudsearch.cf sshd\[9836\]: Invalid user ack from 116.196.80.104 port 34634
2019-10-26 16:53:24
118.25.196.31 attack
Oct 22 12:08:05 xb0 sshd[26792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31  user=r.r
Oct 22 12:08:08 xb0 sshd[26792]: Failed password for r.r from 118.25.196.31 port 36940 ssh2
Oct 22 12:08:08 xb0 sshd[26792]: Received disconnect from 118.25.196.31: 11: Bye Bye [preauth]
Oct 22 12:13:45 xb0 sshd[30800]: Failed password for invalid user m from 118.25.196.31 port 48372 ssh2
Oct 22 12:13:45 xb0 sshd[30800]: Received disconnect from 118.25.196.31: 11: Bye Bye [preauth]
Oct 22 12:18:00 xb0 sshd[29372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31  user=r.r
Oct 22 12:18:02 xb0 sshd[29372]: Failed password for r.r from 118.25.196.31 port 56020 ssh2
Oct 22 12:18:02 xb0 sshd[29372]: Received disconnect from 118.25.196.31: 11: Bye Bye [preauth]
Oct 22 12:21:38 xb0 sshd[27743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1........
-------------------------------
2019-10-26 16:54:33
139.59.77.237 attackspambots
Invalid user lab from 139.59.77.237 port 51241
2019-10-26 16:30:22
175.139.242.49 attackspam
2019-10-26T08:12:11.944066abusebot-2.cloudsearch.cf sshd\[21359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.242.49  user=root
2019-10-26 16:27:39
83.220.168.182 attackspambots
Oct 26 09:38:12 bouncer sshd\[14577\]: Invalid user fz123456 from 83.220.168.182 port 49822
Oct 26 09:38:12 bouncer sshd\[14577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.220.168.182 
Oct 26 09:38:14 bouncer sshd\[14577\]: Failed password for invalid user fz123456 from 83.220.168.182 port 49822 ssh2
...
2019-10-26 16:28:28
139.59.161.78 attack
Oct 26 05:46:46 XXX sshd[19282]: Invalid user jrojas from 139.59.161.78 port 20094
2019-10-26 16:31:51
52.192.157.100 attackspambots
slow and persistent scanner
2019-10-26 16:48:22
46.151.210.60 attackbots
Oct 22 07:14:33 uapps sshd[29429]: reveeclipse mapping checking getaddrinfo for forums.moe.sa [46.151.210.60] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 22 07:14:35 uapps sshd[29429]: Failed password for invalid user pi from 46.151.210.60 port 60946 ssh2
Oct 22 07:14:35 uapps sshd[29429]: Received disconnect from 46.151.210.60: 11: Bye Bye [preauth]
Oct 22 07:38:33 uapps sshd[29844]: reveeclipse mapping checking getaddrinfo for forums.moe.sa [46.151.210.60] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 22 07:38:35 uapps sshd[29844]: Failed password for invalid user postgres from 46.151.210.60 port 59774 ssh2
Oct 22 07:38:35 uapps sshd[29844]: Received disconnect from 46.151.210.60: 11: Bye Bye [preauth]
Oct 22 07:42:56 uapps sshd[29918]: reveeclipse mapping checking getaddrinfo for forums.moe.sa [46.151.210.60] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 22 07:42:56 uapps sshd[29918]: User r.r from 46.151.210.60 not allowed because not listed in AllowUsers
Oct 22 07:42:56 uapps sshd........
-------------------------------
2019-10-26 16:48:35
167.114.55.84 attackspambots
Oct 26 10:19:31 lnxweb62 sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84
2019-10-26 16:36:40
106.12.28.124 attackbotsspam
2019-10-26T03:48:15.245703abusebot-3.cloudsearch.cf sshd\[10379\]: Invalid user priscila from 106.12.28.124 port 49784
2019-10-26 16:32:09
58.7.189.183 attackbotsspam
23/tcp
[2019-10-26]1pkt
2019-10-26 16:20:43
104.244.75.244 attack
Oct 25 01:11:35 archiv sshd[7918]: reveeclipse mapping checking getaddrinfo for . [104.244.75.244] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 25 01:11:35 archiv sshd[7918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244  user=r.r
Oct 25 01:11:36 archiv sshd[7918]: Failed password for r.r from 104.244.75.244 port 57142 ssh2
Oct 25 01:11:37 archiv sshd[7918]: Received disconnect from 104.244.75.244 port 57142:11: Bye Bye [preauth]
Oct 25 01:11:37 archiv sshd[7918]: Disconnected from 104.244.75.244 port 57142 [preauth]
Oct 25 01:17:42 archiv sshd[7954]: reveeclipse mapping checking getaddrinfo for . [104.244.75.244] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 25 01:17:42 archiv sshd[7954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244  user=r.r
Oct 25 01:17:45 archiv sshd[7954]: Failed password for r.r from 104.244.75.244 port 52708 ssh2
Oct 25 01:17:45 archiv sshd[795........
-------------------------------
2019-10-26 16:33:30
49.48.17.89 attackspam
8080/tcp
[2019-10-26]1pkt
2019-10-26 16:23:28

Recently Reported IPs

104.248.164.132 104.248.164.147 104.248.164.16 104.248.163.83
104.248.164.193 104.248.164.227 104.248.164.215 104.248.164.45
101.109.63.137 104.248.164.30 104.248.164.99 104.248.164.88
104.248.164.87 104.248.164.60 104.248.165.114 104.248.165.210
104.248.165.135 104.248.166.0 101.109.63.138 104.248.165.249