Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.240.174 attackproxy
Fraud connect
2024-05-14 20:51:04
104.248.205.67 spamattack
Phishing
2022-01-28 16:41:36
104.248.246.41 attack
fail2ban detected brute force on sshd
2020-10-12 07:24:44
104.248.205.67 attackspambots
Oct 11 20:16:41 cho sshd[449424]: Failed password for invalid user mugihiko from 104.248.205.67 port 47586 ssh2
Oct 11 20:19:53 cho sshd[449593]: Invalid user chick from 104.248.205.67 port 51910
Oct 11 20:19:53 cho sshd[449593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67 
Oct 11 20:19:53 cho sshd[449593]: Invalid user chick from 104.248.205.67 port 51910
Oct 11 20:19:55 cho sshd[449593]: Failed password for invalid user chick from 104.248.205.67 port 51910 ssh2
...
2020-10-12 02:35:14
104.248.246.41 attackbots
Invalid user test from 104.248.246.41 port 55920
2020-10-11 23:39:01
104.248.205.67 attackbots
TCP port : 3918
2020-10-11 18:26:20
104.248.246.41 attackbotsspam
(sshd) Failed SSH login from 104.248.246.41 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 00:30:27 server4 sshd[7206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.41  user=root
Oct 11 00:30:29 server4 sshd[7206]: Failed password for root from 104.248.246.41 port 44390 ssh2
Oct 11 00:39:51 server4 sshd[12389]: Invalid user prueba from 104.248.246.41
Oct 11 00:39:52 server4 sshd[12389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.41 
Oct 11 00:39:53 server4 sshd[12389]: Failed password for invalid user prueba from 104.248.246.41 port 54958 ssh2
2020-10-11 15:38:18
104.248.246.41 attack
SSH brutforce
2020-10-11 08:55:57
104.248.246.8 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-07T19:04:42Z
2020-10-08 05:35:17
104.248.246.8 attack
Oct  6 06:01:26 ns4 sshd[27242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:01:29 ns4 sshd[27242]: Failed password for r.r from 104.248.246.8 port 46506 ssh2
Oct  6 06:10:46 ns4 sshd[28508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:10:48 ns4 sshd[28508]: Failed password for r.r from 104.248.246.8 port 33954 ssh2
Oct  6 06:14:29 ns4 sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:14:31 ns4 sshd[28931]: Failed password for r.r from 104.248.246.8 port 44924 ssh2
Oct  6 06:18:09 ns4 sshd[29265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:18:11 ns4 sshd[29265]: Failed password for r.r from 104.248.246.8 port 55894 ssh2
Oct  6 06:22:32 ns4 sshd[29859]: pam........
-------------------------------
2020-10-07 21:59:43
104.248.246.8 attack
Oct  6 06:01:26 ns4 sshd[27242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:01:29 ns4 sshd[27242]: Failed password for r.r from 104.248.246.8 port 46506 ssh2
Oct  6 06:10:46 ns4 sshd[28508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:10:48 ns4 sshd[28508]: Failed password for r.r from 104.248.246.8 port 33954 ssh2
Oct  6 06:14:29 ns4 sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:14:31 ns4 sshd[28931]: Failed password for r.r from 104.248.246.8 port 44924 ssh2
Oct  6 06:18:09 ns4 sshd[29265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.8  user=r.r
Oct  6 06:18:11 ns4 sshd[29265]: Failed password for r.r from 104.248.246.8 port 55894 ssh2
Oct  6 06:22:32 ns4 sshd[29859]: pam........
-------------------------------
2020-10-07 13:49:05
104.248.230.153 attackspam
(sshd) Failed SSH login from 104.248.230.153 (US/United States/-): 5 in the last 3600 secs
2020-10-07 05:24:27
104.248.230.153 attackspambots
Oct  6 15:02:03 xeon sshd[32516]: Failed password for root from 104.248.230.153 port 58082 ssh2
2020-10-06 21:33:55
104.248.230.153 attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-10-06 13:15:39
104.248.231.200 attack
Oct  4 20:50:32 electroncash sshd[3649]: Failed password for root from 104.248.231.200 port 34936 ssh2
Oct  4 20:51:37 electroncash sshd[4070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.231.200  user=root
Oct  4 20:51:38 electroncash sshd[4070]: Failed password for root from 104.248.231.200 port 54398 ssh2
Oct  4 20:52:42 electroncash sshd[4489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.231.200  user=root
Oct  4 20:52:45 electroncash sshd[4489]: Failed password for root from 104.248.231.200 port 45634 ssh2
...
2020-10-05 05:43:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.2.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.2.216.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:09:13 CST 2022
;; MSG SIZE  rcvd: 106
Host info
216.2.248.104.in-addr.arpa domain name pointer discipulospr.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.2.248.104.in-addr.arpa	name = discipulospr.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.70.149.50 attack
Jul  3 19:29:50 relay postfix/smtpd\[17509\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 19:30:12 relay postfix/smtpd\[25642\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 19:30:27 relay postfix/smtpd\[23616\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 19:30:48 relay postfix/smtpd\[5745\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 19:31:03 relay postfix/smtpd\[22436\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-04 01:32:14
13.68.171.41 attackbotsspam
Jul  3 15:25:52 XXX sshd[62142]: Invalid user carlos from 13.68.171.41 port 56242
2020-07-04 01:43:06
103.84.63.5 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-07-04 01:57:04
159.203.63.125 attackspam
Jul  3 19:29:08 zulu412 sshd\[10097\]: Invalid user hadoop from 159.203.63.125 port 57100
Jul  3 19:29:08 zulu412 sshd\[10097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125
Jul  3 19:29:10 zulu412 sshd\[10097\]: Failed password for invalid user hadoop from 159.203.63.125 port 57100 ssh2
...
2020-07-04 01:46:44
1.53.199.189 attackbots
1593740865 - 07/03/2020 03:47:45 Host: 1.53.199.189/1.53.199.189 Port: 445 TCP Blocked
2020-07-04 02:01:13
193.228.91.105 attackspam
Unauthorized connection attempt detected from IP address 193.228.91.105 to port 22 [T]
2020-07-04 02:00:45
171.5.250.67 attack
1593741075 - 07/03/2020 03:51:15 Host: 171.5.250.67/171.5.250.67 Port: 445 TCP Blocked
2020-07-04 01:40:53
177.23.78.45 attack
failed_logins
2020-07-04 01:36:33
113.164.246.6 attackspambots
2020-07-03T13:02:09.788443devel sshd[12196]: Failed password for invalid user techsupport from 113.164.246.6 port 38598 ssh2
2020-07-03T13:18:55.520959devel sshd[13856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.164.246.6  user=root
2020-07-03T13:18:57.607596devel sshd[13856]: Failed password for root from 113.164.246.6 port 44096 ssh2
2020-07-04 01:59:03
46.38.148.10 attack
2020-07-03 17:57:19 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=sid@csmailer.org)
2020-07-03 17:57:49 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=asc@csmailer.org)
2020-07-03 17:58:17 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=zend@csmailer.org)
2020-07-03 17:58:47 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=aj@csmailer.org)
2020-07-03 17:59:17 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=og@csmailer.org)
...
2020-07-04 01:59:50
188.240.208.26 attackbotsspam
Auto reported by IDS
2020-07-04 01:56:32
103.50.37.55 attackbots
Jul  2 19:47:29 server1 sshd\[5148\]: Invalid user zain from 103.50.37.55
Jul  2 19:47:29 server1 sshd\[5148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.50.37.55 
Jul  2 19:47:31 server1 sshd\[5148\]: Failed password for invalid user zain from 103.50.37.55 port 46121 ssh2
Jul  2 19:54:13 server1 sshd\[7383\]: Invalid user tsm from 103.50.37.55
Jul  2 19:54:13 server1 sshd\[7383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.50.37.55 
...
2020-07-04 01:24:18
113.141.67.162 attack
Portscan or hack attempt detected by psad/fwsnort
2020-07-04 01:28:16
195.223.211.242 attack
Jul  3 19:42:53 vpn01 sshd[26404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Jul  3 19:42:55 vpn01 sshd[26404]: Failed password for invalid user santosh from 195.223.211.242 port 36731 ssh2
...
2020-07-04 01:44:55
191.240.39.77 attack
$f2bV_matches
2020-07-04 01:29:28

Recently Reported IPs

104.248.180.21 104.248.200.146 104.248.203.37 104.248.204.51
104.248.207.138 104.248.210.82 104.248.223.66 104.248.224.48
104.248.235.212 104.248.239.199 104.248.239.241 104.248.240.232
104.248.247.140 104.248.247.240 104.248.25.17 104.248.30.163
104.248.32.221 104.248.36.150 104.248.36.220 104.248.40.75