Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.48.162 attack
Sep 15 09:52:09 host sshd[15076]: Invalid user dell from 104.248.48.162 port 37303
Sep 15 09:52:09 host sshd[15092]: Invalid user aadmin from 104.248.48.162 port 37153
Sep 15 09:52:09 host  sshd[15079]: Invalid user grid from 104.248.48.162 port 37421
Sep 15 09:52:09 host sshd[15086]: Invalid user admin from 104.248.48.162 port 37165
2022-09-15 11:26:03
104.248.48.16 attackbotsspam
2020-06-15T22:08:06.595669shield sshd\[2039\]: Invalid user tech from 104.248.48.16 port 47284
2020-06-15T22:08:06.600015shield sshd\[2039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.48.16
2020-06-15T22:08:09.132939shield sshd\[2039\]: Failed password for invalid user tech from 104.248.48.16 port 47284 ssh2
2020-06-15T22:12:34.040808shield sshd\[3687\]: Invalid user ubuntu from 104.248.48.16 port 47792
2020-06-15T22:12:34.044435shield sshd\[3687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.48.16
2020-06-16 06:42:32
104.248.48.16 attackbots
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-15 09:45:29
104.248.48.57 attack
ssh brute-force
2020-06-09 07:49:11
104.248.48.218 attack
ssh brute force
2020-04-13 06:52:05
104.248.48.99 attack
Invalid user fake from 104.248.48.99 port 48194
2020-03-24 06:29:18
104.248.48.199 attackspambots
10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined
node-superagent/4.1.0
2019-07-12 06:39:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.48.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.48.54.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040102 1800 900 604800 86400

;; Query time: 159 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 23:36:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.48.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.48.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.192.61.53 attackspam
23/tcp
[2019-09-23]1pkt
2019-09-24 06:32:41
190.3.214.19 attack
445/tcp
[2019-09-23]1pkt
2019-09-24 06:44:06
41.45.235.252 attackspam
Sep 23 23:53:38 master sshd[30953]: Failed password for invalid user admin from 41.45.235.252 port 38508 ssh2
2019-09-24 06:45:12
35.195.0.27 attack
993/tcp
[2019-09-23]1pkt
2019-09-24 07:03:31
177.135.93.227 attackbots
F2B jail: sshd. Time: 2019-09-24 00:46:49, Reported by: VKReport
2019-09-24 06:54:14
89.248.174.214 attack
09/23/2019-17:10:28.371603 89.248.174.214 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-09-24 06:27:31
66.155.4.213 attack
Automatic report - Banned IP Access
2019-09-24 06:36:50
70.89.88.3 attack
2019-09-24T05:14:35.436559enmeeting.mahidol.ac.th sshd\[20093\]: Invalid user user from 70.89.88.3 port 51915
2019-09-24T05:14:35.455070enmeeting.mahidol.ac.th sshd\[20093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.89.88.3
2019-09-24T05:14:37.815144enmeeting.mahidol.ac.th sshd\[20093\]: Failed password for invalid user user from 70.89.88.3 port 51915 ssh2
...
2019-09-24 06:48:36
40.127.70.180 attack
2019-09-23T22:46:14.059206abusebot-8.cloudsearch.cf sshd\[17817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.70.180  user=root
2019-09-24 07:03:02
118.174.32.106 attack
445/tcp
[2019-09-23]1pkt
2019-09-24 06:54:34
194.102.35.245 attack
Sep 24 00:12:41 MK-Soft-VM5 sshd[17143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.245 
Sep 24 00:12:43 MK-Soft-VM5 sshd[17143]: Failed password for invalid user ubnt from 194.102.35.245 port 49024 ssh2
...
2019-09-24 06:59:57
195.251.124.77 attackbots
445/tcp
[2019-09-23]1pkt
2019-09-24 06:58:50
109.194.54.126 attack
Sep 23 12:47:25 sachi sshd\[27277\]: Invalid user kubernetes from 109.194.54.126
Sep 23 12:47:25 sachi sshd\[27277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Sep 23 12:47:27 sachi sshd\[27277\]: Failed password for invalid user kubernetes from 109.194.54.126 port 40010 ssh2
Sep 23 12:51:47 sachi sshd\[27633\]: Invalid user target from 109.194.54.126
Sep 23 12:51:47 sachi sshd\[27633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
2019-09-24 06:58:04
37.114.177.171 attackbotsspam
Sep 23 23:17:02 master sshd[30911]: Failed password for invalid user admin from 37.114.177.171 port 38005 ssh2
2019-09-24 06:50:58
132.145.21.100 attack
2019-09-24T01:14:40.343852tmaserv sshd\[31202\]: Failed password for invalid user carmella from 132.145.21.100 port 56051 ssh2
2019-09-24T01:26:12.547758tmaserv sshd\[32009\]: Invalid user admin from 132.145.21.100 port 60964
2019-09-24T01:26:12.551878tmaserv sshd\[32009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.21.100
2019-09-24T01:26:14.595884tmaserv sshd\[32009\]: Failed password for invalid user admin from 132.145.21.100 port 60964 ssh2
2019-09-24T01:30:05.382212tmaserv sshd\[32063\]: Invalid user ldapuser from 132.145.21.100 port 24938
2019-09-24T01:30:05.387631tmaserv sshd\[32063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.21.100
...
2019-09-24 06:38:03

Recently Reported IPs

104.248.48.243 104.248.49.14 104.248.55.66 104.248.57.165
104.248.57.246 104.248.6.52 104.248.6.76 104.248.68.106
104.248.71.255 104.248.71.91 104.248.76.125 104.248.79.225
104.248.83.139 104.248.84.21 104.248.87.116 104.248.88.224
104.248.91.155 104.248.91.236 104.248.91.43 104.248.93.232