Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.248.80.221 attackbots
Port scan: Attack repeated for 24 hours
2020-09-20 23:59:38
104.248.80.221 attackbotsspam
" "
2020-09-20 15:52:56
104.248.80.221 attack
" "
2020-09-20 07:43:05
104.248.80.221 attackbotsspam
firewall-block, port(s): 24699/tcp
2020-08-27 14:51:34
104.248.80.221 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-27 02:34:38
104.248.80.221 attackspam
Port scan: Attack repeated for 24 hours
2020-08-25 16:10:02
104.248.80.221 attackspam
" "
2020-08-02 13:43:40
104.248.80.221 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-07-29 12:35:49
104.248.80.221 attack
firewall-block, port(s): 20915/tcp
2020-07-11 22:50:45
104.248.80.221 attackbotsspam
firewall-block, port(s): 25955/tcp
2020-05-20 15:07:42
104.248.80.221 attackspam
Port scan(s) denied
2020-05-10 17:17:12
104.248.80.221 attackspam
firewall-block, port(s): 20473/tcp
2020-05-09 05:43:20
104.248.80.221 attack
" "
2020-05-07 02:53:31
104.248.80.221 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 1572 resulting in total of 13 scans from 104.248.0.0/16 block.
2020-04-25 23:47:06
104.248.80.78 attackspambots
2019-09-23T04:30:02.967889abusebot-8.cloudsearch.cf sshd\[12401\]: Invalid user membership from 104.248.80.78 port 48970
2019-09-23 12:53:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.80.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.80.169.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:12:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 169.80.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.80.248.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.212 attackbots
08/14/2019-01:08:02.338405 80.82.77.212 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2019-08-14 14:34:28
128.199.136.129 attackspambots
Invalid user training from 128.199.136.129 port 48094
2019-08-14 14:42:23
112.85.42.88 attackspambots
Aug 14 09:18:18 ubuntu-2gb-nbg1-dc3-1 sshd[29989]: Failed password for root from 112.85.42.88 port 59572 ssh2
Aug 14 09:18:23 ubuntu-2gb-nbg1-dc3-1 sshd[29989]: error: maximum authentication attempts exceeded for root from 112.85.42.88 port 59572 ssh2 [preauth]
...
2019-08-14 15:19:31
123.206.81.59 attackbots
Aug 14 09:04:48 nextcloud sshd\[9810\]: Invalid user psybnc from 123.206.81.59
Aug 14 09:04:48 nextcloud sshd\[9810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.81.59
Aug 14 09:04:50 nextcloud sshd\[9810\]: Failed password for invalid user psybnc from 123.206.81.59 port 37302 ssh2
...
2019-08-14 15:23:28
167.71.229.187 attackspambots
:
2019-08-14 14:40:16
171.241.53.192 attackspam
Aug 14 02:04:01 XXX sshd[43703]: Invalid user admin from 171.241.53.192 port 55240
2019-08-14 15:22:36
219.153.247.202 attack
Fail2Ban - FTP Abuse Attempt
2019-08-14 15:13:18
92.63.194.27 attackproxy
Send attack brutal force to my vpn server to find connection user and password
2019-08-14 14:40:32
185.176.27.186 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-14 15:10:33
157.230.128.195 attackbots
Invalid user ubuntu from 157.230.128.195 port 37620
2019-08-14 14:39:05
67.55.92.88 attackspambots
Aug 14 07:25:10 debian sshd\[18642\]: Invalid user thunder from 67.55.92.88 port 34952
Aug 14 07:25:10 debian sshd\[18642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88
...
2019-08-14 14:54:09
78.186.208.216 attackbots
Aug 14 08:42:45 XXX sshd[51675]: Invalid user sensivity from 78.186.208.216 port 54303
2019-08-14 15:08:09
182.61.44.136 attackbots
Aug 14 02:02:46 XXXXXX sshd[36900]: Invalid user ahmad from 182.61.44.136 port 36238
2019-08-14 15:22:13
92.53.102.44 attack
SpamReport
2019-08-14 15:12:43
185.156.1.99 attack
Aug 14 06:35:35 mail sshd\[27885\]: Failed password for root from 185.156.1.99 port 49714 ssh2
Aug 14 06:51:11 mail sshd\[28366\]: Invalid user admin from 185.156.1.99 port 38582
...
2019-08-14 15:07:26

Recently Reported IPs

104.248.195.63 104.248.192.204 104.248.24.27 104.248.31.238
104.248.160.52 104.248.142.185 104.248.80.75 104.248.84.116
104.249.210.113 104.248.84.30 104.248.81.126 104.248.83.242
104.248.203.112 104.252.179.138 104.252.179.210 104.252.179.216
104.252.179.21 104.252.179.219 104.252.179.30 104.252.179.118