Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.129.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.129.46.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:31:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
46.129.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.129.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
98.0.174.246 attack
20/6/13@08:28:27: FAIL: Alarm-Network address from=98.0.174.246
...
2020-06-13 20:59:35
79.137.34.248 attackbotsspam
Invalid user monitor from 79.137.34.248 port 42235
2020-06-13 20:22:32
92.53.84.9 attackbotsspam
k+ssh-bruteforce
2020-06-13 20:47:28
170.210.214.50 attackbotsspam
prod8
...
2020-06-13 20:31:03
46.38.150.153 attackbots
Jun 13 14:26:11 relay postfix/smtpd\[2666\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 13 14:26:24 relay postfix/smtpd\[24047\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 13 14:27:35 relay postfix/smtpd\[12614\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 13 14:27:51 relay postfix/smtpd\[24263\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 13 14:28:59 relay postfix/smtpd\[12614\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-13 20:29:56
212.70.149.2 attack
2020-06-13T06:34:21.699150linuxbox-skyline auth[353744]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=brigitte rhost=212.70.149.2
...
2020-06-13 20:36:30
159.89.130.178 attackbots
2020-06-13T12:33:40.817296server.espacesoutien.com sshd[31471]: Invalid user lauro from 159.89.130.178 port 60398
2020-06-13T12:33:40.829286server.espacesoutien.com sshd[31471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.130.178
2020-06-13T12:33:40.817296server.espacesoutien.com sshd[31471]: Invalid user lauro from 159.89.130.178 port 60398
2020-06-13T12:33:43.017421server.espacesoutien.com sshd[31471]: Failed password for invalid user lauro from 159.89.130.178 port 60398 ssh2
...
2020-06-13 20:37:19
141.98.9.157 attackspambots
Jun 13 12:39:49 scw-6657dc sshd[1291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
Jun 13 12:39:49 scw-6657dc sshd[1291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
Jun 13 12:39:50 scw-6657dc sshd[1291]: Failed password for invalid user admin from 141.98.9.157 port 35929 ssh2
...
2020-06-13 20:41:09
45.141.84.68 attackspam
RDP Bruteforce
2020-06-13 20:32:20
51.161.45.174 attackspam
Jun 13 12:40:47 game-panel sshd[22947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.45.174
Jun 13 12:40:48 game-panel sshd[22947]: Failed password for invalid user sup from 51.161.45.174 port 55578 ssh2
Jun 13 12:43:44 game-panel sshd[23034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.45.174
2020-06-13 20:46:08
35.200.203.6 attackspambots
2020-06-13T07:28:37.639231morrigan.ad5gb.com sshd[22082]: Invalid user admin from 35.200.203.6 port 45218
2020-06-13T07:28:39.234194morrigan.ad5gb.com sshd[22082]: Failed password for invalid user admin from 35.200.203.6 port 45218 ssh2
2020-06-13T07:28:39.853428morrigan.ad5gb.com sshd[22082]: Disconnected from invalid user admin 35.200.203.6 port 45218 [preauth]
2020-06-13 20:48:41
54.37.138.225 attackspam
2020-06-13T14:25:12.627895sd-86998 sshd[48949]: Invalid user guest from 54.37.138.225 port 38932
2020-06-13T14:25:12.632971sd-86998 sshd[48949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-54-37-138.eu
2020-06-13T14:25:12.627895sd-86998 sshd[48949]: Invalid user guest from 54.37.138.225 port 38932
2020-06-13T14:25:14.414890sd-86998 sshd[48949]: Failed password for invalid user guest from 54.37.138.225 port 38932 ssh2
2020-06-13T14:28:45.194452sd-86998 sshd[488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-54-37-138.eu  user=root
2020-06-13T14:28:47.889788sd-86998 sshd[488]: Failed password for root from 54.37.138.225 port 40634 ssh2
...
2020-06-13 20:39:35
106.54.242.120 attackspambots
Invalid user odroid from 106.54.242.120 port 59786
2020-06-13 20:28:54
14.192.241.34 attackspambots
Automatic report - Banned IP Access
2020-06-13 20:46:41
106.253.177.150 attackbots
Jun 13 14:06:52 minden010 sshd[25957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
Jun 13 14:06:54 minden010 sshd[25957]: Failed password for invalid user yumi from 106.253.177.150 port 54230 ssh2
Jun 13 14:11:39 minden010 sshd[28432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
...
2020-06-13 20:18:56

Recently Reported IPs

101.109.176.98 104.149.133.198 104.149.134.114 104.149.133.195
104.149.138.74 104.149.139.206 101.109.177.101 104.149.140.173
104.149.140.164 104.149.140.169 104.149.140.174 101.109.177.110
101.109.177.153 101.109.177.155 101.109.177.19 101.109.177.209
101.109.177.217 104.151.205.113 104.151.205.103 104.151.205.116