Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.236.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.236.199.		IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 05:10:31 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 199.236.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 199.236.149.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
65.155.30.101 attack
Automatic report - Banned IP Access
2020-09-05 16:43:07
192.241.224.140 attackspam
192.241.224.140 - - [04/Sep/2020:12:48:33 -0400] "GET /owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f HTTP/1.1" 444 0 "-" "Mozilla/5.0 zgrab/0.x"
...
2020-09-05 16:22:58
122.51.167.108 attack
Bruteforce detected by fail2ban
2020-09-05 16:46:57
91.225.172.109 attack
Honeypot attack, port: 445, PTR: 91-225-172-109.dynamic.kuznetsovsk.net.
2020-09-05 16:29:47
154.124.116.155 attackspambots
Sep  4 18:48:22 mellenthin postfix/smtpd[32476]: NOQUEUE: reject: RCPT from unknown[154.124.116.155]: 554 5.7.1 Service unavailable; Client host [154.124.116.155] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/154.124.116.155; from= to= proto=ESMTP helo=<[154.124.116.155]>
2020-09-05 16:31:02
212.64.4.3 attack
(sshd) Failed SSH login from 212.64.4.3 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 18:51:38 server2 sshd[25090]: Invalid user gangadhar from 212.64.4.3
Sep  4 18:51:38 server2 sshd[25090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.4.3 
Sep  4 18:51:40 server2 sshd[25090]: Failed password for invalid user gangadhar from 212.64.4.3 port 47326 ssh2
Sep  4 18:55:12 server2 sshd[27195]: Invalid user teresa from 212.64.4.3
Sep  4 18:55:12 server2 sshd[27195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.4.3
2020-09-05 16:34:28
71.6.232.5 attackbotsspam
Unauthorized connection attempt from IP address 71.6.232.5 on Port 137(NETBIOS)
2020-09-05 16:46:34
188.27.43.58 attack
Automatic report - Port Scan Attack
2020-09-05 16:52:45
118.24.82.81 attackspam
Invalid user operatore from 118.24.82.81 port 61443
2020-09-05 17:05:32
223.255.28.203 attackspam
Sep  5 09:53:36 h2427292 sshd\[10215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.255.28.203  user=minecraft
Sep  5 09:53:39 h2427292 sshd\[10215\]: Failed password for minecraft from 223.255.28.203 port 36221 ssh2
Sep  5 10:02:37 h2427292 sshd\[10272\]: Invalid user rq from 223.255.28.203
...
2020-09-05 17:08:37
81.4.109.159 attackbots
Sep  5 09:54:35 amit sshd\[29550\]: Invalid user raspberry from 81.4.109.159
Sep  5 09:54:35 amit sshd\[29550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.109.159
Sep  5 09:54:37 amit sshd\[29550\]: Failed password for invalid user raspberry from 81.4.109.159 port 59932 ssh2
...
2020-09-05 17:03:18
182.182.51.163 attack
Sep  4 18:48:28 mellenthin postfix/smtpd[32476]: NOQUEUE: reject: RCPT from unknown[182.182.51.163]: 554 5.7.1 Service unavailable; Client host [182.182.51.163] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/182.182.51.163; from= to= proto=ESMTP helo=<[182.182.51.163]>
2020-09-05 16:27:43
103.210.237.14 attackbotsspam
Port Scan
...
2020-09-05 16:43:36
181.225.79.66 attackbots
Invalid user admin from 181.225.79.66 port 38428
2020-09-05 16:57:20
45.95.168.227 attackbotsspam
DATE:2020-09-04 23:41:55, IP:45.95.168.227, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-05 16:24:28

Recently Reported IPs

104.149.236.195 104.149.236.210 104.149.249.180 104.152.108.211
104.152.111.134 104.152.181.231 104.152.183.26 104.152.211.109
104.152.250.55 104.153.193.166 104.153.197.163 104.153.197.236
104.154.157.196 104.154.211.187 104.154.252.174 104.154.74.10
104.154.96.24 104.155.100.125 104.155.126.20 104.155.133.1