Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.205.67 spamattack
Phishing
2022-01-28 16:41:36
104.248.205.67 attackspambots
Oct 11 20:16:41 cho sshd[449424]: Failed password for invalid user mugihiko from 104.248.205.67 port 47586 ssh2
Oct 11 20:19:53 cho sshd[449593]: Invalid user chick from 104.248.205.67 port 51910
Oct 11 20:19:53 cho sshd[449593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67 
Oct 11 20:19:53 cho sshd[449593]: Invalid user chick from 104.248.205.67 port 51910
Oct 11 20:19:55 cho sshd[449593]: Failed password for invalid user chick from 104.248.205.67 port 51910 ssh2
...
2020-10-12 02:35:14
104.248.205.67 attackbots
TCP port : 3918
2020-10-11 18:26:20
104.248.205.67 attackspambots
srv02 Mass scanning activity detected Target: 24911  ..
2020-09-29 05:58:03
104.248.205.67 attack
Time:     Mon Sep 28 03:11:10 2020 +0000
IP:       104.248.205.67 (NL/Netherlands/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 28 02:52:35 14-2 sshd[20445]: Invalid user github from 104.248.205.67 port 55244
Sep 28 02:52:37 14-2 sshd[20445]: Failed password for invalid user github from 104.248.205.67 port 55244 ssh2
Sep 28 03:07:18 14-2 sshd[3025]: Invalid user mike from 104.248.205.67 port 40436
Sep 28 03:07:20 14-2 sshd[3025]: Failed password for invalid user mike from 104.248.205.67 port 40436 ssh2
Sep 28 03:11:08 14-2 sshd[15270]: Invalid user vnc from 104.248.205.67 port 47886
2020-09-28 22:22:42
104.248.205.67 attack
Port scan denied
2020-09-28 14:28:33
104.248.205.67 attackspam
Automatic report - Banned IP Access
2020-09-14 00:57:40
104.248.205.67 attackspam
Port scan denied
2020-09-13 16:47:38
104.248.205.24 attackspambots
web-1 [ssh] SSH Attack
2020-09-12 02:46:13
104.248.205.24 attackbotsspam
Sep 11 02:08:45 raspberrypi sshd[28751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.24  user=root
Sep 11 02:08:47 raspberrypi sshd[28751]: Failed password for invalid user root from 104.248.205.24 port 60612 ssh2
...
2020-09-11 18:42:28
104.248.205.67 attackspam
SSH brute-force attempt
2020-09-08 03:00:10
104.248.205.67 attackbotsspam
TCP ports : 122 / 1347 / 11584 / 12561 / 20742 / 27793
2020-09-07 18:27:39
104.248.205.67 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 96 - port: 122 proto: tcp cat: Misc Attackbytes: 60
2020-09-02 01:59:59
104.248.205.24 attackbots
Sep  1 14:32:17 vm0 sshd[11485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.24
Sep  1 14:32:19 vm0 sshd[11485]: Failed password for invalid user jupyter from 104.248.205.24 port 54598 ssh2
...
2020-09-01 23:24:29
104.248.205.24 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-09-01 08:09:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.20.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.20.213.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:20:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
213.20.248.104.in-addr.arpa domain name pointer server.eie.sa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.20.248.104.in-addr.arpa	name = server.eie.sa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.50.32.74 attackbots
Port Scan: TCP/60001
2019-09-25 09:41:36
209.200.15.186 attackspambots
Port Scan: TCP/445
2019-09-25 09:00:41
114.239.172.65 attackbotsspam
Port Scan: TCP/25
2019-09-25 09:21:48
200.253.164.2 attackspam
Port Scan: TCP/445
2019-09-25 09:15:32
24.227.153.195 attack
Port Scan: UDP/137
2019-09-25 09:12:01
177.37.77.64 attackbots
Sep 25 03:01:16 localhost sshd\[22585\]: Invalid user matias from 177.37.77.64 port 35950
Sep 25 03:01:16 localhost sshd\[22585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.77.64
Sep 25 03:01:19 localhost sshd\[22585\]: Failed password for invalid user matias from 177.37.77.64 port 35950 ssh2
2019-09-25 09:17:47
192.169.152.246 attackbots
Port Scan: TCP/445
2019-09-25 09:16:48
130.43.150.131 attackbots
Port Scan: TCP/5555
2019-09-25 09:19:44
155.254.30.234 attack
Port Scan: TCP/445
2019-09-25 09:06:21
12.247.25.46 attackbots
Port Scan: UDP/137
2019-09-25 09:27:08
186.6.177.76 attackspam
Port Scan: TCP/445
2019-09-25 09:03:27
87.251.99.153 attackspambots
Port Scan: TCP/5984
2019-09-25 09:36:19
68.52.5.57 attack
Port Scan: TCP/21
2019-09-25 09:25:12
188.170.212.78 attack
Port Scan: TCP/85
2019-09-25 09:32:11
174.127.205.173 attackspambots
Port Scan: UDP/137
2019-09-25 09:18:05

Recently Reported IPs

104.248.20.20 104.248.202.246 104.248.202.6 104.248.203.128
104.248.207.206 104.248.21.168 98.97.249.243 104.248.21.80
104.248.217.2 104.248.22.21 104.248.224.106 104.248.229.202
104.248.235.183 104.248.238.95 178.19.87.136 104.248.239.200
104.248.239.56 104.248.241.193 104.248.246.9 104.248.252.29