Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.104.6.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.104.6.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 18:32:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 239.6.104.248.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.6.104.248.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.232.1.155 attackbotsspam
Sep 12 18:26:17 xeon sshd[41930]: Failed password for root from 132.232.1.155 port 41338 ssh2
2020-09-13 02:37:26
51.210.107.217 attackspambots
Invalid user elvis501 from 51.210.107.217 port 45778
2020-09-13 02:40:31
60.246.3.33 attackspambots
Automatic report - Banned IP Access
2020-09-13 02:54:40
147.0.22.179 attackbots
" "
2020-09-13 02:52:11
82.118.236.186 attackbotsspam
ssh brute force
2020-09-13 02:51:56
222.186.175.217 attackspam
Sep 12 20:21:49 vserver sshd\[7424\]: Failed password for root from 222.186.175.217 port 17442 ssh2Sep 12 20:21:52 vserver sshd\[7424\]: Failed password for root from 222.186.175.217 port 17442 ssh2Sep 12 20:21:55 vserver sshd\[7424\]: Failed password for root from 222.186.175.217 port 17442 ssh2Sep 12 20:21:58 vserver sshd\[7424\]: Failed password for root from 222.186.175.217 port 17442 ssh2
...
2020-09-13 02:22:24
103.9.0.209 attackbots
SSH bruteforce
2020-09-13 02:49:31
36.233.154.181 attackbotsspam
Icarus honeypot on github
2020-09-13 02:34:56
77.31.191.111 attackbotsspam
Invalid user pi from 77.31.191.111 port 54014
2020-09-13 02:45:36
94.102.49.191 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-13 02:32:53
193.29.15.169 attack
 UDP 193.29.15.169:57608 -> port 53, len 64
2020-09-13 02:52:34
64.57.253.25 attackbotsspam
Sep 12 17:05:02 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: Invalid user sir from 64.57.253.25
Sep 12 17:05:02 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25
Sep 12 17:05:04 Ubuntu-1404-trusty-64-minimal sshd\[18292\]: Failed password for invalid user sir from 64.57.253.25 port 60744 ssh2
Sep 12 17:12:03 Ubuntu-1404-trusty-64-minimal sshd\[21109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25  user=root
Sep 12 17:12:05 Ubuntu-1404-trusty-64-minimal sshd\[21109\]: Failed password for root from 64.57.253.25 port 47888 ssh2
2020-09-13 02:43:40
115.236.60.26 attackspambots
2020-09-12 07:20:59.113397-0500  localhost screensharingd[45225]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 115.236.60.26 :: Type: VNC DES
2020-09-13 02:39:18
89.248.168.217 attack
Port Scan: UDP/1028
2020-09-13 02:34:30
14.241.245.179 attackbotsspam
2020-09-12T18:39:30.695495shield sshd\[20547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.245.179  user=root
2020-09-12T18:39:33.151993shield sshd\[20547\]: Failed password for root from 14.241.245.179 port 54438 ssh2
2020-09-12T18:43:42.158229shield sshd\[21333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.245.179  user=root
2020-09-12T18:43:44.544247shield sshd\[21333\]: Failed password for root from 14.241.245.179 port 38004 ssh2
2020-09-12T18:47:44.082696shield sshd\[22847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.245.179  user=root
2020-09-13 02:53:18

Recently Reported IPs

188.131.187.1 76.243.168.107 94.84.253.225 132.79.67.10
50.186.231.50 4.148.29.66 178.27.120.150 55.119.199.161
179.158.181.37 113.69.221.183 215.73.140.23 114.162.91.37
114.89.40.102 174.33.225.192 221.204.59.237 32.86.177.205
225.141.166.102 60.111.198.213 61.213.154.212 235.203.1.204