Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.149.239.173 attack
RDP Bruteforce
2020-01-25 01:17:50
104.149.221.230 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/104.149.221.230/ 
 US - 1H : (283)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN40676 
 
 IP : 104.149.221.230 
 
 CIDR : 104.149.220.0/22 
 
 PREFIX COUNT : 1030 
 
 UNIQUE IP COUNT : 801536 
 
 
 WYKRYTE ATAKI Z ASN40676 :  
  1H - 3 
  3H - 3 
  6H - 5 
 12H - 7 
 24H - 7 
 
 DateTime : 2019-10-17 05:48:05 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-17 18:03:49
104.149.239.225 attack
Automatic report - XMLRPC Attack
2019-10-14 03:17:58
104.149.216.154 attackbots
xmlrpc attack
2019-09-17 03:35:42
104.149.216.154 attack
xmlrpc attack
2019-08-30 02:43:29
104.149.216.154 attackspambots
WordPress brute force
2019-08-29 06:49:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.2.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.2.139.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 04:39:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
139.2.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.2.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.54.248 attackspambots
Oct 22 06:48:05 site2 sshd\[38808\]: Invalid user uwsgi from 111.231.54.248Oct 22 06:48:07 site2 sshd\[38808\]: Failed password for invalid user uwsgi from 111.231.54.248 port 36756 ssh2Oct 22 06:52:38 site2 sshd\[38889\]: Failed password for root from 111.231.54.248 port 55425 ssh2Oct 22 06:56:48 site2 sshd\[38986\]: Invalid user ark from 111.231.54.248Oct 22 06:56:49 site2 sshd\[38986\]: Failed password for invalid user ark from 111.231.54.248 port 45934 ssh2
...
2019-10-22 13:25:17
169.197.108.189 attackbotsspam
UTC: 2019-10-21 port: 443/tcp
2019-10-22 14:07:03
40.74.115.36 attack
Oct 22 05:43:08 ip-172-31-1-72 sshd[26620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.74.115.36  user=r.r
Oct 22 05:43:10 ip-172-31-1-72 sshd[26620]: Failed password for r.r from 40.74.115.36 port 46260 ssh2
Oct 22 05:47:36 ip-172-31-1-72 sshd[26682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.74.115.36  user=r.r
Oct 22 05:47:38 ip-172-31-1-72 sshd[26682]: Failed password for r.r from 40.74.115.36 port 59474 ssh2
Oct 22 05:52:22 ip-172-31-1-72 sshd[26755]: Invalid user simone from 40.74.115.36
Oct 22 05:52:22 ip-172-31-1-72 sshd[26755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.74.115.36

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=40.74.115.36
2019-10-22 14:07:30
2.135.188.7 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/2.135.188.7/ 
 
 KZ - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KZ 
 NAME ASN : ASN9198 
 
 IP : 2.135.188.7 
 
 CIDR : 2.135.188.0/22 
 
 PREFIX COUNT : 1223 
 
 UNIQUE IP COUNT : 1472256 
 
 
 ATTACKS DETECTED ASN9198 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 4 
 24H - 5 
 
 DateTime : 2019-10-22 05:56:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-22 13:52:23
164.52.24.168 attack
UTC: 2019-10-21 port: 25/tcp
2019-10-22 13:53:48
23.91.98.16 attackspam
2019-10-22T07:54:44.070935scmdmz1 sshd\[30485\]: Invalid user oracle from 23.91.98.16 port 43302
2019-10-22T07:54:44.073854scmdmz1 sshd\[30485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.91.98.16
2019-10-22T07:54:46.028051scmdmz1 sshd\[30485\]: Failed password for invalid user oracle from 23.91.98.16 port 43302 ssh2
...
2019-10-22 13:57:51
178.62.237.38 attackspam
Oct 22 07:06:20 dedicated sshd[9505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.237.38  user=root
Oct 22 07:06:22 dedicated sshd[9505]: Failed password for root from 178.62.237.38 port 33282 ssh2
2019-10-22 13:25:40
125.160.17.32 attackspam
UTC: 2019-10-21 port: 22/tcp
2019-10-22 13:57:33
71.6.199.23 attackspam
UTC: 2019-10-21 port: 389/udp
2019-10-22 13:26:02
113.88.159.216 attackbotsspam
PHI,WP GET /wp-login.php
2019-10-22 13:59:12
118.24.173.104 attackspam
Oct 22 07:39:21 OPSO sshd\[19395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104  user=root
Oct 22 07:39:23 OPSO sshd\[19395\]: Failed password for root from 118.24.173.104 port 46550 ssh2
Oct 22 07:44:06 OPSO sshd\[20300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104  user=root
Oct 22 07:44:08 OPSO sshd\[20300\]: Failed password for root from 118.24.173.104 port 34836 ssh2
Oct 22 07:48:53 OPSO sshd\[21128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104  user=root
2019-10-22 13:49:21
171.229.164.135 attackbots
Oct 22 06:55:40 taivassalofi sshd[190890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.229.164.135
Oct 22 06:55:43 taivassalofi sshd[190890]: Failed password for invalid user admin from 171.229.164.135 port 60447 ssh2
...
2019-10-22 14:13:19
201.131.185.126 attackspambots
Oct 22 06:55:47 taivassalofi sshd[190903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.185.126
Oct 22 06:55:48 taivassalofi sshd[190903]: Failed password for invalid user admin from 201.131.185.126 port 38908 ssh2
...
2019-10-22 14:08:37
178.150.216.229 attackspambots
2019-10-22T03:56:26.354169abusebot.cloudsearch.cf sshd\[21700\]: Invalid user viable from 178.150.216.229 port 35310
2019-10-22 13:42:52
106.13.1.203 attack
Oct 22 06:56:56 h2177944 sshd\[14257\]: Invalid user real from 106.13.1.203 port 49838
Oct 22 06:56:56 h2177944 sshd\[14257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.203
Oct 22 06:56:58 h2177944 sshd\[14257\]: Failed password for invalid user real from 106.13.1.203 port 49838 ssh2
Oct 22 07:02:11 h2177944 sshd\[14932\]: Invalid user av from 106.13.1.203 port 57708
...
2019-10-22 13:50:50

Recently Reported IPs

104.149.192.109 104.151.29.107 104.151.29.97 104.151.29.99
147.216.39.85 104.152.108.159 104.152.109.190 104.152.109.74
104.152.110.124 104.152.110.59 104.152.169.31 104.152.48.231
104.153.12.165 104.153.8.165 104.153.81.224 104.153.82.120
104.154.113.180 104.154.114.78 104.154.143.33 104.154.220.24