Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.3.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.3.3.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 02:50:50 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 3.3.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 3.3.149.104.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.75.103.54 attackspam
Unauthorized connection attempt from IP address 94.75.103.54 on Port 445(SMB)
2019-11-10 04:03:46
87.255.193.18 attack
Unauthorized connection attempt from IP address 87.255.193.18 on Port 445(SMB)
2019-11-10 04:22:44
114.5.81.67 attackbotsspam
Nov  9 16:15:59 venus sshd\[7966\]: Invalid user pi from 114.5.81.67 port 41662
Nov  9 16:15:59 venus sshd\[7968\]: Invalid user pi from 114.5.81.67 port 41668
Nov  9 16:15:59 venus sshd\[7966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.81.67
...
2019-11-10 04:24:15
106.13.188.147 attackbotsspam
Nov  9 16:16:22 ms-srv sshd[55629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.188.147  user=root
Nov  9 16:16:24 ms-srv sshd[55629]: Failed password for invalid user root from 106.13.188.147 port 49636 ssh2
2019-11-10 04:02:26
103.209.20.42 attackbots
Unauthorized connection attempt from IP address 103.209.20.42 on Port 445(SMB)
2019-11-10 04:15:04
196.1.228.149 attack
Unauthorized connection attempt from IP address 196.1.228.149 on Port 445(SMB)
2019-11-10 04:24:42
118.170.62.203 attack
Unauthorized connection attempt from IP address 118.170.62.203 on Port 445(SMB)
2019-11-10 04:18:23
58.69.162.235 attackspambots
Unauthorized connection attempt from IP address 58.69.162.235 on Port 445(SMB)
2019-11-10 04:29:32
189.47.164.88 attackbots
Unauthorised access (Nov  9) SRC=189.47.164.88 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=22302 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-10 04:01:03
176.63.27.143 attackspam
TCP Port Scanning
2019-11-10 04:09:01
212.32.245.153 attackspam
Rude login attack (4 tries in 1d)
2019-11-10 04:12:09
42.231.128.211 attackspambots
Automatic report - Port Scan Attack
2019-11-10 04:25:14
94.191.102.171 attack
Nov  9 17:16:08 cavern sshd[8986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.102.171
2019-11-10 04:18:38
190.145.177.2 attackbotsspam
Unauthorized connection attempt from IP address 190.145.177.2 on Port 445(SMB)
2019-11-10 04:16:17
187.194.109.61 attack
Unauthorized connection attempt from IP address 187.194.109.61 on Port 445(SMB)
2019-11-10 04:07:12

Recently Reported IPs

104.149.249.103 104.149.30.81 104.15.147.187 104.152.108.153
50.157.72.14 104.152.108.16 104.152.108.69 104.152.108.7
104.152.108.89 104.152.109.101 104.152.109.115 104.152.109.119
104.152.109.198 104.152.109.233 104.152.110.22 141.62.45.126
104.152.110.241 104.152.110.49 104.152.111.176 104.152.111.247