Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       208.80.248.0 - 208.80.251.255
CIDR:           208.80.248.0/22
NetName:        CDNETWORKSUS-01
NetHandle:      NET-208-80-248-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   CDNetworks Inc. (CDNET)
RegDate:        2007-08-03
Updated:        2021-12-14
Comment:        Any abuse related problem, please contact sod@cdnetworks.com
Ref:            https://rdap.arin.net/registry/ip/208.80.248.0


OrgName:        CDNetworks Inc.
OrgId:          CDNET
Address:        1550 Valley Vista Dr., Suite 110
City:           Diamond Bar
StateProv:      CA
PostalCode:     91765
Country:        US
RegDate:        2007-01-05
Updated:        2020-01-22
Ref:            https://rdap.arin.net/registry/entity/CDNET


OrgTechHandle: NOCAN2-ARIN
OrgTechName:   NOC and TroubleShooting
OrgTechPhone:  +1-877-937-4236 
OrgTechEmail:  netops@cdnetworks.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

OrgAbuseHandle: IAA24-ARIN
OrgAbuseName:   IP Addressing Abuse
OrgAbusePhone:  +1-877-937-4236 
OrgAbuseEmail:  ABUSE@cdnetworks.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAA24-ARIN

OrgNOCHandle: NOCAN2-ARIN
OrgNOCName:   NOC and TroubleShooting
OrgNOCPhone:  +1-877-937-4236 
OrgNOCEmail:  netops@cdnetworks.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

RAbuseHandle: IAA24-ARIN
RAbuseName:   IP Addressing Abuse
RAbusePhone:  +1-877-937-4236 
RAbuseEmail:  ABUSE@cdnetworks.com
RAbuseRef:    https://rdap.arin.net/registry/entity/IAA24-ARIN

RTechHandle: NOCAN2-ARIN
RTechName:   NOC and TroubleShooting
RTechPhone:  +1-877-937-4236 
RTechEmail:  netops@cdnetworks.com
RTechRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN

RNOCHandle: NOCAN2-ARIN
RNOCName:   NOC and TroubleShooting
RNOCPhone:  +1-877-937-4236 
RNOCEmail:  netops@cdnetworks.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOCAN2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.80.248.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.80.248.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031000 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 17:13:36 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 25.248.80.208.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 208.80.248.25.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
198.96.155.3 attackbots
sshd jail - ssh hack attempt
2020-09-05 18:43:37
81.41.135.82 attackspam
GET / HTTP/1.1 403 0 "-" "Mozilla/5.0 zgrab/0.x"
2020-09-05 18:30:33
14.127.74.87 attackbotsspam
firewall-block, port(s): 445/tcp
2020-09-05 19:00:14
92.81.222.217 attack
"Unauthorized connection attempt on SSHD detected"
2020-09-05 18:57:35
42.113.196.55 attackbotsspam
Unauthorized connection attempt from IP address 42.113.196.55 on Port 445(SMB)
2020-09-05 18:26:37
221.126.242.254 attack
Unauthorized connection attempt from IP address 221.126.242.254 on Port 445(SMB)
2020-09-05 19:17:35
27.153.254.70 attack
SSH Brute-Force attacks
2020-09-05 18:46:00
177.189.244.193 attackbots
Sep  5 10:37:26 instance-2 sshd[21983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193 
Sep  5 10:37:27 instance-2 sshd[21983]: Failed password for invalid user ftp_user from 177.189.244.193 port 56867 ssh2
Sep  5 10:42:24 instance-2 sshd[22051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193
2020-09-05 18:53:03
183.247.151.247 attack
SSH invalid-user multiple login try
2020-09-05 19:02:35
115.92.104.6 attackbotsspam
Attempted connection to port 445.
2020-09-05 18:40:00
20.41.86.104 attackbotsspam
Port Scan: TCP/443
2020-09-05 18:31:31
89.133.45.112 attack
Automatic report - Port Scan Attack
2020-09-05 18:57:56
5.160.243.153 attackspam
$f2bV_matches
2020-09-05 19:05:31
114.143.115.98 attackspam
Unauthorized connection attempt from IP address 114.143.115.98 on Port 445(SMB)
2020-09-05 18:48:44
185.170.114.25 attack
(sshd) Failed SSH login from 185.170.114.25 (DE/Germany/this-is-a-tor-node---10.artikel5ev.de): 5 in the last 3600 secs
2020-09-05 18:44:08

Recently Reported IPs

165.232.43.198 143.198.165.121 80.94.92.158 107.172.20.103
167.172.149.199 167.172.90.204 60.190.252.115 104.28.94.138
82.213.153.144 146.190.82.177 110.38.242.96 60.190.252.139
192.168.50.17 205.198.70.172 230.160.191.239 157.245.197.148
216.167.122.108 83.228.220.90 8.211.148.234 165.245.187.143