Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.158.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.158.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:09:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.158.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.158.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.163.181.11 attackspam
Name: skyreverythype
Email: malinoleg91@mail.ru
Phone: 89159933471
Street: Москва
City: Москва
Zip: 153123
Message: https://skyrevery.ru/airplanes/citation-cj3/ - Частный самолет Cessna Citation CJ3+ (Цесна Си Джей) - SkyRevery - подробнее на нашем сайте https://skyrevery.ru - skyrevery.ru https://skyrevery.ru/ - Аренда частного самолета с экипажем в компании SkyRevery – это выбор тех, кто ценит свое время и живет по своему расписанию! Аренда частного самолета помогает экономить самый важный ресурс – время. Арендовав частный самолет, именно Вы решаете, когда и куда полетите. Для выполнения чартерных рейсов мы предлагаем частные самолеты иностранного производства, гарантирующие высокий уровень комфорта и безопасности полета.
2020-01-15 09:11:22
80.14.253.7 attackspam
Jan 15 05:55:47 sso sshd[20966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.14.253.7
Jan 15 05:55:49 sso sshd[20966]: Failed password for invalid user admin from 80.14.253.7 port 60190 ssh2
...
2020-01-15 13:15:00
58.58.224.158 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:11:31
222.122.63.243 attackbotsspam
Jan 15 01:42:48 vmanager6029 sshd\[25203\]: Invalid user user2 from 222.122.63.243 port 38514
Jan 15 01:42:48 vmanager6029 sshd\[25203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.63.243
Jan 15 01:42:50 vmanager6029 sshd\[25203\]: Failed password for invalid user user2 from 222.122.63.243 port 38514 ssh2
2020-01-15 09:26:05
91.204.250.48 attackbots
Unauthorized connection attempt detected from IP address 91.204.250.48 to port 80 [J]
2020-01-15 09:23:07
177.8.244.38 attackspambots
Jan 15 02:03:34 vpn01 sshd[16114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.244.38
Jan 15 02:03:36 vpn01 sshd[16114]: Failed password for invalid user ubuntu from 177.8.244.38 port 53531 ssh2
...
2020-01-15 09:14:19
177.190.116.17 attackbots
Automatic report - Port Scan Attack
2020-01-15 09:12:26
139.59.91.165 attackspambots
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-15 09:26:31
159.138.155.128 attackspam
badbot
2020-01-15 09:21:43
51.68.65.174 attackbotsspam
Jan 15 05:51:53 SilenceServices sshd[419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.65.174
Jan 15 05:51:55 SilenceServices sshd[419]: Failed password for invalid user sites from 51.68.65.174 port 55958 ssh2
Jan 15 05:55:48 SilenceServices sshd[2117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.65.174
2020-01-15 13:16:47
117.193.44.99 attackspambots
20/1/14@23:55:50: FAIL: Alarm-Network address from=117.193.44.99
...
2020-01-15 13:13:07
49.232.60.2 attackbotsspam
Unauthorized connection attempt detected from IP address 49.232.60.2 to port 2220 [J]
2020-01-15 13:08:38
218.92.0.165 attackspam
Jan 15 01:39:04 sd-53420 sshd\[21257\]: User root from 218.92.0.165 not allowed because none of user's groups are listed in AllowGroups
Jan 15 01:39:04 sd-53420 sshd\[21257\]: Failed none for invalid user root from 218.92.0.165 port 36115 ssh2
Jan 15 01:39:05 sd-53420 sshd\[21257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
Jan 15 01:39:07 sd-53420 sshd\[21257\]: Failed password for invalid user root from 218.92.0.165 port 36115 ssh2
Jan 15 01:39:23 sd-53420 sshd\[21274\]: User root from 218.92.0.165 not allowed because none of user's groups are listed in AllowGroups
...
2020-01-15 09:06:39
134.175.152.157 attack
Invalid user zewa from 134.175.152.157 port 44770
2020-01-15 09:20:36
88.230.7.159 attack
1579064144 - 01/15/2020 05:55:44 Host: 88.230.7.159/88.230.7.159 Port: 445 TCP Blocked
2020-01-15 13:10:32

Recently Reported IPs

104.149.152.30 104.149.161.87 104.149.161.91 104.149.163.86
104.149.165.20 104.149.161.93 104.149.164.164 104.149.164.162
104.155.114.78 104.155.106.98 104.155.116.210 104.155.12.33
104.155.122.117 104.155.142.55 104.155.125.8 104.155.16.15
104.155.160.159 104.155.167.187 104.155.168.175 104.155.17.198