Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.85.113.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.85.113.248.			IN	A

;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:32:49 CST 2023
;; MSG SIZE  rcvd: 107
Host info
248.113.85.104.in-addr.arpa domain name pointer a104-85-113-248.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.113.85.104.in-addr.arpa	name = a104-85-113-248.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.115.37.19 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-05 00:13:56
193.187.119.188 attackbots
Apr  4 11:21:08 NPSTNNYC01T sshd[15896]: Failed password for root from 193.187.119.188 port 44204 ssh2
Apr  4 11:26:04 NPSTNNYC01T sshd[16154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.187.119.188
Apr  4 11:26:05 NPSTNNYC01T sshd[16154]: Failed password for invalid user xics from 193.187.119.188 port 54040 ssh2
...
2020-04-05 00:14:16
140.143.189.58 attackbots
SSH invalid-user multiple login try
2020-04-05 00:11:59
190.6.199.22 attack
firewall-block, port(s): 8080/tcp
2020-04-04 23:59:58
178.212.157.110 attackspambots
Apr  4 15:26:10 master sshd[3975]: Failed password for invalid user admin from 178.212.157.110 port 44217 ssh2
Apr  4 15:26:19 master sshd[3977]: Failed password for invalid user admin from 178.212.157.110 port 44260 ssh2
2020-04-05 00:15:18
222.186.42.75 attackbots
Apr  4 17:56:46 server sshd[20992]: Failed password for root from 222.186.42.75 port 44588 ssh2
Apr  4 17:56:50 server sshd[20992]: Failed password for root from 222.186.42.75 port 44588 ssh2
Apr  4 17:56:53 server sshd[20992]: Failed password for root from 222.186.42.75 port 44588 ssh2
2020-04-05 00:05:49
218.92.0.184 attack
SSH Brute-Force attacks
2020-04-04 23:38:40
194.146.36.72 attackspam
SpamScore above: 10.0
2020-04-04 23:27:17
78.188.119.233 attackspambots
scan z
2020-04-05 00:12:26
101.71.2.164 attackspam
SSH Brute-Forcing (server1)
2020-04-05 00:34:48
36.84.11.220 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-05 00:27:12
192.241.200.167 attackspambots
Fail2Ban Ban Triggered
2020-04-04 23:58:07
219.78.162.24 attackbots
firewall-block, port(s): 5555/tcp
2020-04-04 23:53:32
172.104.124.229 attackbotsspam
firewall-block, port(s): 8888/tcp
2020-04-04 23:40:30
27.65.103.70 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-04-04 23:58:56

Recently Reported IPs

104.84.154.53 104.85.130.37 104.84.59.204 104.84.48.13
104.84.83.93 104.85.161.76 104.84.66.9 104.85.169.152
104.84.70.13 104.85.175.234 104.85.147.179 104.85.180.37
104.84.238.255 104.85.10.25 104.83.176.42 104.85.194.216
104.84.215.51 104.85.176.227 104.85.189.50 104.85.179.142