Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.130.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.130.73.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023020300 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 03 13:49:18 CST 2023
;; MSG SIZE  rcvd: 107
Host info
73.130.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.130.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.86.164.107 attack
WordPress login Brute force / Web App Attack on client site.
2020-02-12 05:00:38
203.177.60.238 attackbotsspam
20/2/11@08:39:48: FAIL: Alarm-Network address from=203.177.60.238
...
2020-02-12 05:33:45
200.211.124.166 attackbots
445/tcp 445/tcp 445/tcp...
[2019-12-15/2020-02-11]7pkt,1pt.(tcp)
2020-02-12 05:20:09
223.197.165.54 attack
81/tcp 23/tcp...
[2020-01-06/02-11]5pkt,2pt.(tcp)
2020-02-12 05:31:22
218.77.80.51 attack
'IP reached maximum auth failures for a one day block'
2020-02-12 05:10:50
179.186.168.89 attack
Unauthorized connection attempt detected from IP address 179.186.168.89 to port 23
2020-02-12 05:06:09
152.136.37.135 attackbots
2020-02-11T16:43:09.572349  sshd[5070]: Invalid user aeu from 152.136.37.135 port 55522
2020-02-11T16:43:09.585782  sshd[5070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.37.135
2020-02-11T16:43:09.572349  sshd[5070]: Invalid user aeu from 152.136.37.135 port 55522
2020-02-11T16:43:11.735329  sshd[5070]: Failed password for invalid user aeu from 152.136.37.135 port 55522 ssh2
2020-02-11T16:48:19.413289  sshd[5237]: Invalid user yqi from 152.136.37.135 port 56340
...
2020-02-12 05:31:47
5.188.206.50 attack
escription	OS-WINDOWS Microsoft Windows Terminal server RDP over non-standard port attempt
2020-02-12 04:56:46
177.160.10.200 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 05:11:22
110.167.168.10 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2019-12-12/2020-02-11]4pkt,1pt.(tcp)
2020-02-12 05:24:46
51.77.140.111 attack
Triggered by Fail2Ban at Ares web server
2020-02-12 05:33:29
45.79.168.138 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-02-12 05:22:06
120.237.159.248 attack
2020-02-11T18:49:21.443466  sshd[7294]: Invalid user rbe from 120.237.159.248 port 50580
2020-02-11T18:49:21.457188  sshd[7294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.159.248
2020-02-11T18:49:21.443466  sshd[7294]: Invalid user rbe from 120.237.159.248 port 50580
2020-02-11T18:49:23.444285  sshd[7294]: Failed password for invalid user rbe from 120.237.159.248 port 50580 ssh2
2020-02-11T18:53:39.098614  sshd[7331]: Invalid user krp from 120.237.159.248 port 47568
...
2020-02-12 05:07:50
27.40.72.11 attack
Feb 11 14:39:57 debian-2gb-nbg1-2 kernel: \[3687630.412091\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=27.40.72.11 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=40 ID=31687 PROTO=TCP SPT=31116 DPT=23 WINDOW=11662 RES=0x00 SYN URGP=0
2020-02-12 05:24:33
192.241.227.209 attackbots
firewall-block, port(s): 514/tcp
2020-02-12 04:53:57

Recently Reported IPs

65.76.251.223 185.192.69.220 4.235.230.237 43.17.115.76
149.52.104.60 172.16.10.51 5.78.69.132 39.248.156.248
118.230.0.7 24.168.18.200 222.44.102.62 155.195.109.16
142.80.199.71 88.98.59.154 131.52.136.146 64.159.122.0
221.178.126.112 237.129.90.34 32.245.48.154 100.83.237.138