Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.212.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.212.12.			IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:26:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 12.212.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.212.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.151.211.66 attackspam
Jul 26 13:00:03 game-panel sshd[10344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.211.66
Jul 26 13:00:04 game-panel sshd[10344]: Failed password for invalid user madison from 46.151.211.66 port 56276 ssh2
Jul 26 13:03:40 game-panel sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.211.66
2020-07-26 21:39:00
192.99.145.164 attack
Jul 26 18:04:39 gw1 sshd[30925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.145.164
Jul 26 18:04:42 gw1 sshd[30925]: Failed password for invalid user ftpadmin from 192.99.145.164 port 40384 ssh2
...
2020-07-26 21:34:24
144.217.93.78 attack
SSH bruteforce
2020-07-26 21:34:42
200.129.244.1 attackspam
Icarus honeypot on github
2020-07-26 21:57:54
120.237.118.144 attackspam
SSH bruteforce
2020-07-26 22:11:21
121.57.230.26 attack
Fail2Ban Ban Triggered
2020-07-26 21:38:09
186.225.80.194 attackbots
2020-07-26T13:15:46.489022vps1033 sshd[5325]: Invalid user administrator from 186.225.80.194 port 41401
2020-07-26T13:15:46.492782vps1033 sshd[5325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.225.80.194
2020-07-26T13:15:46.489022vps1033 sshd[5325]: Invalid user administrator from 186.225.80.194 port 41401
2020-07-26T13:15:48.375138vps1033 sshd[5325]: Failed password for invalid user administrator from 186.225.80.194 port 41401 ssh2
2020-07-26T13:20:38.074531vps1033 sshd[15645]: Invalid user sinusbot from 186.225.80.194 port 44608
...
2020-07-26 22:07:28
203.170.140.201 attack
IP 203.170.140.201 attacked honeypot on port: 8080 at 7/26/2020 5:05:55 AM
2020-07-26 21:41:06
45.32.60.161 attack
Unauthorised access (Jul 26) SRC=45.32.60.161 LEN=40 TTL=239 ID=20288 TCP DPT=1433 WINDOW=1024 SYN
2020-07-26 21:53:17
170.106.38.97 attackspam
Port Scan
...
2020-07-26 22:13:01
165.22.43.225 attackspambots
Jul 26 08:37:56 ny01 sshd[1490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.43.225
Jul 26 08:37:59 ny01 sshd[1490]: Failed password for invalid user teacher1 from 165.22.43.225 port 35996 ssh2
Jul 26 08:41:51 ny01 sshd[2156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.43.225
2020-07-26 21:55:35
222.80.156.115 attackbots
2020-07-26T13:13:15.978672vps1033 sshd[32315]: Invalid user bkpuser from 222.80.156.115 port 64344
2020-07-26T13:13:15.985059vps1033 sshd[32315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.80.156.115
2020-07-26T13:13:15.978672vps1033 sshd[32315]: Invalid user bkpuser from 222.80.156.115 port 64344
2020-07-26T13:13:18.139391vps1033 sshd[32315]: Failed password for invalid user bkpuser from 222.80.156.115 port 64344 ssh2
2020-07-26T13:16:41.406745vps1033 sshd[7326]: Invalid user neide from 222.80.156.115 port 23822
...
2020-07-26 21:40:43
202.83.172.43 attack
 TCP (SYN) 202.83.172.43:60518 -> port 1433, len 44
2020-07-26 21:33:24
193.27.228.239 attack
Unauthorized connection attempt detected from IP address 193.27.228.239 to port 3393
2020-07-26 21:59:37
191.53.250.232 attack
(smtpauth) Failed SMTP AUTH login from 191.53.250.232 (BR/Brazil/191-53-250-232.nvs-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-26 16:36:12 plain authenticator failed for ([191.53.250.232]) [191.53.250.232]: 535 Incorrect authentication data (set_id=info@atlaspumpsepahan.com)
2020-07-26 22:05:37

Recently Reported IPs

104.248.214.13 104.248.214.145 104.248.211.30 104.248.211.44
104.248.210.191 104.248.214.132 104.248.211.34 104.248.213.33
104.248.214.155 101.109.63.51 104.248.214.194 104.248.215.253
104.248.216.26 104.248.215.169 104.248.214.169 104.248.217.40
104.248.216.204 104.248.219.167 104.248.219.65 101.109.63.53