Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.225.22 attackspam
Automatic report generated by Wazuh
2020-09-19 03:06:58
104.248.225.22 attack
SS1,DEF GET /wp-login.php
2020-09-18 19:09:24
104.248.225.22 attackspambots
104.248.225.22 - - [15/Sep/2020:17:50:50 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [15/Sep/2020:17:50:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1685 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [15/Sep/2020:17:51:01 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-16 01:56:23
104.248.225.22 attackbots
104.248.225.22 - - [15/Sep/2020:08:31:40 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [15/Sep/2020:08:31:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [15/Sep/2020:08:31:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-15 17:49:52
104.248.225.22 attack
104.248.225.22 - - [09/Aug/2020:04:54:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [09/Aug/2020:04:54:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1779 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - [09/Aug/2020:04:54:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 13:37:56
104.248.225.22 attackspam
104.248.225.22 - - \[04/Aug/2020:08:07:18 +0200\] "POST /wp-login.php HTTP/1.0" 200 4409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[04/Aug/2020:08:07:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 4241 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[04/Aug/2020:08:07:24 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-04 17:08:01
104.248.225.22 attackspam
Automatic report - XMLRPC Attack
2020-08-01 18:44:12
104.248.225.47 attackspam
Unauthorized connection attempt detected from IP address 104.248.225.47 to port 8088
2020-07-14 00:42:59
104.248.225.14 attackbots
Jul 11 00:44:02 CT728 sshd[14421]: reveeclipse mapping checking getaddrinfo for atua.ag-2019 [104.248.225.14] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 11 00:44:02 CT728 sshd[14421]: User r.r from 104.248.225.14 not allowed because not listed in AllowUsers
Jul 11 00:44:02 CT728 sshd[14421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.225.14  user=r.r
Jul 11 00:44:04 CT728 sshd[14421]: Failed password for invalid user r.r from 104.248.225.14 port 55024 ssh2
Jul 11 00:44:04 CT728 sshd[14421]: Connection closed by 104.248.225.14 [preauth]
Jul 11 00:45:56 CT728 sshd[14424]: reveeclipse mapping checking getaddrinfo for atua.ag-2019 [104.248.225.14] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 11 00:45:56 CT728 sshd[14424]: User r.r from 104.248.225.14 not allowed because not listed in AllowUsers
Jul 11 00:45:56 CT728 sshd[14424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.225.14........
-------------------------------
2020-07-11 23:47:31
104.248.225.22 attack
Automatic report - XMLRPC Attack
2020-07-10 20:05:20
104.248.225.22 attackbotsspam
104.248.225.22 - - \[08/Jul/2020:09:39:25 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[08/Jul/2020:09:39:31 +0200\] "POST /wp-login.php HTTP/1.0" 200 6825 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[08/Jul/2020:09:39:36 +0200\] "POST /wp-login.php HTTP/1.0" 200 6673 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-08 18:00:34
104.248.225.22 attackspam
Automatic report - XMLRPC Attack
2020-06-23 19:32:45
104.248.225.22 attackbots
10 attempts against mh-misc-ban on heat
2020-06-14 01:22:50
104.248.225.22 attackbots
MYH,DEF GET /2020/wp-login.php
2020-06-12 19:08:18
104.248.225.22 attack
CMS (WordPress or Joomla) login attempt.
2020-06-02 07:29:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.225.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.225.214.		IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:26:10 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 214.225.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.225.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.234.180.83 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/36.234.180.83/ 
 
 TW - 1H : (119)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.234.180.83 
 
 CIDR : 36.234.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 4 
  3H - 15 
  6H - 31 
 12H - 56 
 24H - 112 
 
 DateTime : 2019-10-30 12:53:50 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-30 21:36:38
218.150.220.198 attackspambots
2019-10-30T13:16:23.865105abusebot-5.cloudsearch.cf sshd\[17023\]: Invalid user hp from 218.150.220.198 port 54240
2019-10-30 21:25:55
81.22.45.85 attack
2019-10-30T13:59:16.414391+01:00 lumpi kernel: [2262748.678604] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.85 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=62160 PROTO=TCP SPT=56090 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-30 21:14:29
131.221.130.138 attackbots
445/tcp 445/tcp 445/tcp...
[2019-10-27/30]5pkt,1pt.(tcp)
2019-10-30 21:15:50
51.83.78.109 attackbotsspam
Oct 30 13:58:08 sd-53420 sshd\[25273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109  user=root
Oct 30 13:58:10 sd-53420 sshd\[25273\]: Failed password for root from 51.83.78.109 port 51736 ssh2
Oct 30 14:02:14 sd-53420 sshd\[25607\]: Invalid user tariq from 51.83.78.109
Oct 30 14:02:14 sd-53420 sshd\[25607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
Oct 30 14:02:16 sd-53420 sshd\[25607\]: Failed password for invalid user tariq from 51.83.78.109 port 36396 ssh2
...
2019-10-30 21:33:25
82.209.86.184 attack
Chat Spam
2019-10-30 21:19:18
36.90.250.160 attack
445/tcp 445/tcp
[2019-10-28]2pkt
2019-10-30 21:42:26
212.103.50.78 attackspam
[portscan] Port scan
2019-10-30 21:39:21
61.10.2.39 attack
1433/tcp 445/tcp...
[2019-10-15/30]7pkt,2pt.(tcp)
2019-10-30 21:31:03
125.224.233.101 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/125.224.233.101/ 
 
 TW - 1H : (119)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 125.224.233.101 
 
 CIDR : 125.224.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 4 
  3H - 15 
  6H - 31 
 12H - 56 
 24H - 112 
 
 DateTime : 2019-10-30 12:53:51 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-30 21:35:57
113.108.126.6 attackspam
21/tcp 21/tcp 21/tcp
[2019-10-30]3pkt
2019-10-30 21:57:14
179.228.127.175 attackbotsspam
Automatic report - Port Scan Attack
2019-10-30 21:35:29
62.162.103.206 attack
Automatic report - Banned IP Access
2019-10-30 21:40:45
164.132.47.139 attackbotsspam
2019-10-30T11:53:40.606586abusebot-2.cloudsearch.cf sshd\[7901\]: Invalid user User1 from 164.132.47.139 port 40534
2019-10-30 21:44:21
182.138.228.127 attack
60001/tcp 60001/tcp 60001/tcp
[2019-10-28/29]3pkt
2019-10-30 21:16:38

Recently Reported IPs

104.248.208.127 104.248.236.188 104.248.232.59 104.248.24.82
104.248.239.141 104.248.249.230 104.248.240.127 104.248.241.202
104.248.232.168 13.226.31.19 104.248.36.113 104.248.42.192
104.248.38.6 104.248.36.231 104.248.58.12 104.248.40.110
104.248.51.7 104.248.81.80 104.248.7.103 104.248.58.50