Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.146.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.146.154.		IN	A

;; AUTHORITY SECTION:
.			269	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032602 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 27 08:46:36 CST 2022
;; MSG SIZE  rcvd: 108
Host info
154.146.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.146.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.94.158 attackbots
FTP Brute-Force reported by Fail2Ban
2019-10-17 03:30:29
222.122.31.133 attackspambots
F2B jail: sshd. Time: 2019-10-16 21:29:37, Reported by: VKReport
2019-10-17 03:47:36
31.211.86.13 attackspam
11 probes eg: /wp-includes/SimplePie/Cache/default.php
2019-10-17 03:29:10
118.175.4.22 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-17 03:23:13
222.186.175.216 attackbots
Oct 16 21:33:20 dcd-gentoo sshd[12480]: User root from 222.186.175.216 not allowed because none of user's groups are listed in AllowGroups
Oct 16 21:33:25 dcd-gentoo sshd[12480]: error: PAM: Authentication failure for illegal user root from 222.186.175.216
Oct 16 21:33:20 dcd-gentoo sshd[12480]: User root from 222.186.175.216 not allowed because none of user's groups are listed in AllowGroups
Oct 16 21:33:25 dcd-gentoo sshd[12480]: error: PAM: Authentication failure for illegal user root from 222.186.175.216
Oct 16 21:33:20 dcd-gentoo sshd[12480]: User root from 222.186.175.216 not allowed because none of user's groups are listed in AllowGroups
Oct 16 21:33:25 dcd-gentoo sshd[12480]: error: PAM: Authentication failure for illegal user root from 222.186.175.216
Oct 16 21:33:25 dcd-gentoo sshd[12480]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.216 port 21576 ssh2
...
2019-10-17 03:35:36
106.13.144.8 attackbots
Oct 16 22:13:29 server sshd\[31208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8  user=root
Oct 16 22:13:31 server sshd\[31208\]: Failed password for root from 106.13.144.8 port 52644 ssh2
Oct 16 22:29:37 server sshd\[2834\]: Invalid user timemachine from 106.13.144.8
Oct 16 22:29:37 server sshd\[2834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8 
Oct 16 22:29:38 server sshd\[2834\]: Failed password for invalid user timemachine from 106.13.144.8 port 35232 ssh2
...
2019-10-17 03:46:48
203.206.172.68 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 03:28:40
116.113.99.171 attack
Port Scan
2019-10-17 03:52:36
118.24.197.243 attackbots
Oct 16 21:30:51 MK-Soft-VM7 sshd[21295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.197.243 
Oct 16 21:30:54 MK-Soft-VM7 sshd[21295]: Failed password for invalid user init from 118.24.197.243 port 37420 ssh2
...
2019-10-17 03:45:31
91.222.19.225 attackbotsspam
Brute force SMTP login attempted.
...
2019-10-17 03:48:54
5.196.64.109 attack
43 probes eg: /feed
2019-10-17 03:29:21
177.170.159.238 attackspam
scan z
2019-10-17 03:39:52
180.96.28.87 attackspambots
Automatic report - Banned IP Access
2019-10-17 03:17:57
201.222.70.167 attackbotsspam
Automatic report - Port Scan Attack
2019-10-17 03:37:17
139.212.93.195 attackspambots
Port Scan
2019-10-17 03:44:58

Recently Reported IPs

104.149.139.163 104.149.183.20 104.149.186.90 104.149.190.45
104.149.198.9 104.149.199.150 104.149.202.10 104.149.209.16
104.149.227.166 104.149.8.243 29.243.184.190 104.152.108.160
104.152.108.17 104.152.108.223 104.152.109.107 104.155.63.5
104.155.77.78 104.156.51.230 104.16.146.70 104.16.147.70