Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.135.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.135.26.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:14:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
26.135.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.135.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.74.119.50 attackbotsspam
DATE:2020-06-20 12:10:51, IP:137.74.119.50, PORT:ssh SSH brute force auth (docker-dc)
2020-06-20 18:48:54
122.162.108.30 attackbotsspam
Jun 20 10:50:09 scw-6657dc sshd[31492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.162.108.30  user=root
Jun 20 10:50:09 scw-6657dc sshd[31492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.162.108.30  user=root
Jun 20 10:50:11 scw-6657dc sshd[31492]: Failed password for root from 122.162.108.30 port 35660 ssh2
...
2020-06-20 18:54:21
106.12.205.237 attackbotsspam
Invalid user vagrant from 106.12.205.237 port 33298
2020-06-20 18:21:19
180.153.57.251 attackspambots
Invalid user sftp from 180.153.57.251 port 58813
2020-06-20 18:32:52
185.140.12.49 attack
Invalid user rado from 185.140.12.49 port 39342
2020-06-20 18:45:49
200.108.139.242 attack
Invalid user ubnt from 200.108.139.242 port 34303
2020-06-20 18:44:45
218.92.0.172 attackspambots
Jun 20 13:10:16 ift sshd\[26371\]: Failed password for root from 218.92.0.172 port 48814 ssh2Jun 20 13:10:21 ift sshd\[26371\]: Failed password for root from 218.92.0.172 port 48814 ssh2Jun 20 13:10:24 ift sshd\[26371\]: Failed password for root from 218.92.0.172 port 48814 ssh2Jun 20 13:10:28 ift sshd\[26371\]: Failed password for root from 218.92.0.172 port 48814 ssh2Jun 20 13:10:32 ift sshd\[26371\]: Failed password for root from 218.92.0.172 port 48814 ssh2
...
2020-06-20 18:23:59
218.28.108.237 attackbotsspam
$lgm
2020-06-20 19:00:08
124.160.96.249 attack
Jun 20 12:25:43 h2779839 sshd[32547]: Invalid user cw from 124.160.96.249 port 20175
Jun 20 12:25:43 h2779839 sshd[32547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
Jun 20 12:25:43 h2779839 sshd[32547]: Invalid user cw from 124.160.96.249 port 20175
Jun 20 12:25:46 h2779839 sshd[32547]: Failed password for invalid user cw from 124.160.96.249 port 20175 ssh2
Jun 20 12:29:18 h2779839 sshd[32598]: Invalid user kk from 124.160.96.249 port 32444
Jun 20 12:29:18 h2779839 sshd[32598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
Jun 20 12:29:18 h2779839 sshd[32598]: Invalid user kk from 124.160.96.249 port 32444
Jun 20 12:29:20 h2779839 sshd[32598]: Failed password for invalid user kk from 124.160.96.249 port 32444 ssh2
Jun 20 12:32:53 h2779839 sshd[32663]: Invalid user SSH-2.0-OpenSSH_7.2p2 from 124.160.96.249 port 38596
...
2020-06-20 18:52:28
111.229.101.155 attackspam
2020-06-20T01:40:56.2074701495-001 sshd[9920]: Invalid user helix from 111.229.101.155 port 42070
2020-06-20T01:40:56.2122181495-001 sshd[9920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155
2020-06-20T01:40:56.2074701495-001 sshd[9920]: Invalid user helix from 111.229.101.155 port 42070
2020-06-20T01:40:58.2391051495-001 sshd[9920]: Failed password for invalid user helix from 111.229.101.155 port 42070 ssh2
2020-06-20T01:42:43.6643751495-001 sshd[9982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155  user=root
2020-06-20T01:42:45.3800821495-001 sshd[9982]: Failed password for root from 111.229.101.155 port 35072 ssh2
...
2020-06-20 18:52:46
77.247.108.119 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 8443 proto: TCP cat: Misc Attack
2020-06-20 18:25:50
175.6.35.166 attackbotsspam
prod8
...
2020-06-20 18:32:03
106.75.3.52 attack
Unauthorized connection attempt detected from IP address 106.75.3.52 to port 3333
2020-06-20 18:34:17
139.199.0.28 attackspam
Invalid user user from 139.199.0.28 port 33012
2020-06-20 18:58:56
3.230.143.72 attackspambots
2020-06-20T09:51:17.505883abusebot-5.cloudsearch.cf sshd[20577]: Invalid user admin from 3.230.143.72 port 43518
2020-06-20T09:51:17.511560abusebot-5.cloudsearch.cf sshd[20577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-230-143-72.compute-1.amazonaws.com
2020-06-20T09:51:17.505883abusebot-5.cloudsearch.cf sshd[20577]: Invalid user admin from 3.230.143.72 port 43518
2020-06-20T09:51:19.663850abusebot-5.cloudsearch.cf sshd[20577]: Failed password for invalid user admin from 3.230.143.72 port 43518 ssh2
2020-06-20T09:56:25.260265abusebot-5.cloudsearch.cf sshd[20624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-230-143-72.compute-1.amazonaws.com  user=root
2020-06-20T09:56:26.694789abusebot-5.cloudsearch.cf sshd[20624]: Failed password for root from 3.230.143.72 port 37172 ssh2
2020-06-20T09:59:21.091822abusebot-5.cloudsearch.cf sshd[20630]: Invalid user bys from 3.230.143.72 port 37822
...
2020-06-20 18:56:11

Recently Reported IPs

25.206.152.78 104.149.140.122 104.149.143.86 104.149.148.38
104.149.149.26 104.149.151.94 104.149.155.134 104.149.155.34
104.149.18.226 104.149.182.35 104.149.182.41 104.149.188.54
104.149.199.138 104.149.201.141 104.149.201.180 54.26.251.125
104.149.201.189 74.166.12.158 104.149.206.208 104.149.209.250