Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.225.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.225.158.		IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:49:23 CST 2022
;; MSG SIZE  rcvd: 108
Host info
158.225.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.225.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.233.204.215 attackbotsspam
23/tcp
[2019-09-30]1pkt
2019-09-30 15:07:26
178.20.41.83 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-30 14:37:41
31.185.104.21 attack
Sep 30 03:56:32 thevastnessof sshd[23137]: Failed password for root from 31.185.104.21 port 34967 ssh2
...
2019-09-30 14:38:38
123.20.22.229 attackspam
8000/tcp
[2019-09-30]1pkt
2019-09-30 14:56:27
201.26.84.196 attackspam
8080/tcp
[2019-09-30]1pkt
2019-09-30 15:07:52
196.196.83.111 attack
445/tcp
[2019-09-30]1pkt
2019-09-30 15:10:51
83.211.174.38 attackspambots
Sep 30 08:25:30 dev0-dcfr-rnet sshd[737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.211.174.38
Sep 30 08:25:33 dev0-dcfr-rnet sshd[737]: Failed password for invalid user admin from 83.211.174.38 port 35396 ssh2
Sep 30 08:29:52 dev0-dcfr-rnet sshd[740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.211.174.38
2019-09-30 14:40:34
110.77.236.20 attackbotsspam
8080/tcp
[2019-09-30]1pkt
2019-09-30 15:04:11
118.91.181.28 attackspambots
Automatic report - Port Scan Attack
2019-09-30 14:54:53
14.186.139.20 attack
34567/tcp
[2019-09-30]1pkt
2019-09-30 15:00:52
123.22.4.169 attack
8000/tcp
[2019-09-30]1pkt
2019-09-30 14:34:13
217.65.27.132 attackspambots
Sep 30 08:00:01 [host] sshd[19843]: Invalid user efms from 217.65.27.132
Sep 30 08:00:01 [host] sshd[19843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132
Sep 30 08:00:03 [host] sshd[19843]: Failed password for invalid user efms from 217.65.27.132 port 50530 ssh2
2019-09-30 15:00:22
95.85.60.251 attackspambots
Sep 29 20:26:50 hpm sshd\[13118\]: Invalid user eric from 95.85.60.251
Sep 29 20:26:50 hpm sshd\[13118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
Sep 29 20:26:53 hpm sshd\[13118\]: Failed password for invalid user eric from 95.85.60.251 port 33242 ssh2
Sep 29 20:31:58 hpm sshd\[13536\]: Invalid user rl from 95.85.60.251
Sep 29 20:31:58 hpm sshd\[13536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
2019-09-30 14:47:37
198.27.106.140 attackbotsspam
198.27.106.140 - - - [30/Sep/2019:03:56:01 +0000] "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 400 166 "-" "-" "-" "-"
2019-09-30 15:06:41
222.186.31.144 attack
Sep 30 08:43:20 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
Sep 30 08:43:22 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
Sep 30 08:43:24 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
...
2019-09-30 14:51:20

Recently Reported IPs

104.149.225.151 104.149.225.169 104.149.39.76 104.149.39.74
104.149.225.187 104.149.225.185 104.25.218.37 104.149.39.78
104.149.50.105 104.149.225.162 104.15.107.1 104.15.118.117
104.25.22.106 104.15.174.213 104.149.56.21 104.15.89.95
104.15.225.28 104.15.98.241 104.149.79.169 104.149.79.160