Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.149.143.178 attackbots
Unauthorized connection attempt detected from IP address 104.149.143.178 to port 445
2020-01-16 17:37:37
104.149.143.186 attack
Too many connections or unauthorized access detected from Yankee banned ip
2019-08-08 04:28:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.14.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.14.71.			IN	A

;; AUTHORITY SECTION:
.			410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 12:04:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 71.14.149.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 71.14.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
59.55.44.27 attackspambots
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x
2019-06-29 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.55.44.27
2019-06-29 15:56:22
138.68.12.43 attackspam
Jun 29 04:16:47 s64-1 sshd[32246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43
Jun 29 04:16:49 s64-1 sshd[32246]: Failed password for invalid user student from 138.68.12.43 port 35270 ssh2
Jun 29 04:19:11 s64-1 sshd[32280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43
...
2019-06-29 16:17:04
139.59.180.53 attackspam
Jun 29 07:58:16 MK-Soft-VM6 sshd\[13339\]: Invalid user applmgr from 139.59.180.53 port 59172
Jun 29 07:58:17 MK-Soft-VM6 sshd\[13339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53
Jun 29 07:58:19 MK-Soft-VM6 sshd\[13339\]: Failed password for invalid user applmgr from 139.59.180.53 port 59172 ssh2
...
2019-06-29 16:00:21
68.183.106.84 attackspam
Invalid user amssys from 68.183.106.84 port 45096
2019-06-29 15:38:58
189.164.124.57 attackbots
Jun 29 00:32:43 srv01 sshd[30842]: reveeclipse mapping checking getaddrinfo for dsl-189-164-124-57-dyn.prod-infinhostnameum.com.mx [189.164.124.57] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 29 00:32:43 srv01 sshd[30842]: Invalid user test from 189.164.124.57
Jun 29 00:32:43 srv01 sshd[30842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.164.124.57 
Jun 29 00:32:45 srv01 sshd[30842]: Failed password for invalid user test from 189.164.124.57 port 58199 ssh2
Jun 29 00:32:47 srv01 sshd[30842]: Received disconnect from 189.164.124.57: 11: Bye Bye [preauth]
Jun 29 00:41:58 srv01 sshd[31249]: reveeclipse mapping checking getaddrinfo for dsl-189-164-124-57-dyn.prod-infinhostnameum.com.mx [189.164.124.57] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 29 00:41:58 srv01 sshd[31249]: Invalid user tester from 189.164.124.57
Jun 29 00:41:58 srv01 sshd[31249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2019-06-29 15:55:40
89.40.115.49 attackspambots
Lines containing failures of 89.40.115.49
Jun 28 08:45:13 hvs postfix/smtpd[3935]: warning: hostname host49-115-40-89.static.arubacloud.fr does not resolve to address 89.40.115.49
Jun 28 08:45:13 hvs postfix/smtpd[3935]: connect from unknown[89.40.115.49]
Jun x@x
Jun 28 08:45:14 hvs postfix/smtpd[3935]: disconnect from unknown[89.40.115.49] ehlo=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=4/6
Jun 28 09:10:29 hvs postfix/smtpd[4103]: warning: hostname host49-115-40-89.static.arubacloud.fr does not resolve to address 89.40.115.49
Jun 28 09:10:29 hvs postfix/smtpd[4103]: connect from unknown[89.40.115.49]
Jun x@x
Jun 28 09:10:30 hvs postfix/smtpd[4103]: disconnect from unknown[89.40.115.49] ehlo=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=4/6
Jun 28 09:52:53 hvs postfix/smtpd[4389]: warning: hostname host49-115-40-89.static.arubacloud.fr does not resolve to address 89.40.115.49
Jun 28 09:52:53 hvs postfix/smtpd[4389]: connect from unknown[89.........
------------------------------
2019-06-29 15:29:21
113.172.210.25 attack
2019-06-29T09:00:45.762426mail01 postfix/smtpd[4076]: NOQUEUE: reject: RCPT from unknown[113.172.210.25]: 550
2019-06-29 15:33:57
14.172.30.108 attackspam
2019-06-29T01:06:38.110919centos sshd\[10172\]: Invalid user admin from 14.172.30.108 port 60702
2019-06-29T01:06:38.115768centos sshd\[10172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.172.30.108
2019-06-29T01:06:40.152068centos sshd\[10172\]: Failed password for invalid user admin from 14.172.30.108 port 60702 ssh2
2019-06-29 16:05:56
173.208.200.154 attackspam
20 attempts against mh-misbehave-ban on pine.magehost.pro
2019-06-29 15:58:02
206.189.130.251 attack
Jun 29 01:04:42 localhost sshd\[20425\]: Invalid user beltrami from 206.189.130.251
Jun 29 01:04:42 localhost sshd\[20425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.251
Jun 29 01:04:45 localhost sshd\[20425\]: Failed password for invalid user beltrami from 206.189.130.251 port 46928 ssh2
Jun 29 01:07:00 localhost sshd\[20609\]: Invalid user admin from 206.189.130.251
Jun 29 01:07:00 localhost sshd\[20609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.251
...
2019-06-29 15:55:19
190.0.159.69 attackbotsspam
Jun 29 06:11:52 tanzim-HP-Z238-Microtower-Workstation sshd\[9292\]: Invalid user edubuntu from 190.0.159.69
Jun 29 06:11:52 tanzim-HP-Z238-Microtower-Workstation sshd\[9292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.69
Jun 29 06:11:54 tanzim-HP-Z238-Microtower-Workstation sshd\[9292\]: Failed password for invalid user edubuntu from 190.0.159.69 port 53575 ssh2
...
2019-06-29 15:42:53
185.220.101.70 attackbots
Jun 29 01:07:52 vps sshd[27875]: Failed password for root from 185.220.101.70 port 59883 ssh2
Jun 29 01:07:55 vps sshd[27875]: Failed password for root from 185.220.101.70 port 59883 ssh2
Jun 29 01:08:00 vps sshd[27875]: Failed password for root from 185.220.101.70 port 59883 ssh2
Jun 29 01:08:04 vps sshd[27875]: Failed password for root from 185.220.101.70 port 59883 ssh2
...
2019-06-29 15:31:03
177.154.230.126 attackbotsspam
Brute force attempt
2019-06-29 15:54:29
112.14.32.207 attackspambots
Jun  7 09:37:58 mercury auth[27085]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=112.14.32.207
...
2019-06-29 15:33:27
121.202.28.73 attackbots
" "
2019-06-29 15:57:11

Recently Reported IPs

104.149.134.210 104.149.158.13 104.149.158.14 199.67.105.57
104.152.110.251 104.152.110.71 104.152.111.222 104.152.168.24
104.152.168.37 104.152.168.43 104.152.224.15 104.153.12.65
59.185.14.67 104.153.120.97 104.153.59.203 104.153.8.65
104.154.103.255 104.154.111.184 104.154.118.190 104.154.133.134