Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.53.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.53.200.			IN	A

;; AUTHORITY SECTION:
.			44	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 01:11:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 200.53.149.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 200.53.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
61.247.47.21 attackspambots
Email rejected due to spam filtering
2020-07-13 21:21:21
71.221.125.77 attackspambots
Jul 13 14:18:43 efa1 sshd[6646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71-221-125-77.klln.qwest.net  user=admin
Jul 13 14:18:45 efa1 sshd[6646]: Failed password for admin from 71.221.125.77 port 57224 ssh2
Jul 13 14:18:46 efa1 sshd[6658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71-221-125-77.klln.qwest.net  user=r.r
Jul 13 14:18:48 efa1 sshd[6658]: Failed password for r.r from 71.221.125.77 port 57377 ssh2
Jul 13 14:18:49 efa1 sshd[6668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71-221-125-77.klln.qwest.net  user=admin

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=71.221.125.77
2020-07-13 21:30:56
37.59.229.31 attackbots
(sshd) Failed SSH login from 37.59.229.31 (FR/France/ip31.ip-37-59-229.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 13 14:11:54 amsweb01 sshd[7098]: Invalid user bryan from 37.59.229.31 port 39902
Jul 13 14:11:55 amsweb01 sshd[7098]: Failed password for invalid user bryan from 37.59.229.31 port 39902 ssh2
Jul 13 14:20:37 amsweb01 sshd[8690]: Invalid user suzana from 37.59.229.31 port 33628
Jul 13 14:20:39 amsweb01 sshd[8690]: Failed password for invalid user suzana from 37.59.229.31 port 33628 ssh2
Jul 13 14:23:25 amsweb01 sshd[9164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.229.31  user=admin
2020-07-13 21:31:41
49.232.16.47 attackbots
Jul 13 15:27:15 piServer sshd[16056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.16.47 
Jul 13 15:27:18 piServer sshd[16056]: Failed password for invalid user quc from 49.232.16.47 port 49736 ssh2
Jul 13 15:31:24 piServer sshd[16394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.16.47 
...
2020-07-13 21:36:54
194.61.24.177 attackbots
Jul 13 14:23:31 v2202003116398111542 sshd[2625830]: Invalid user 0 from 194.61.24.177 port 49311
Jul 13 14:23:34 v2202003116398111542 sshd[2625830]: Disconnecting invalid user 0 194.61.24.177 port 49311: Change of username or service not allowed: (0,ssh-connection) -> (22,ssh-connection) [preauth]
Jul 13 14:23:39 v2202003116398111542 sshd[2625836]: Invalid user 22 from 194.61.24.177 port 14957
Jul 13 14:23:39 v2202003116398111542 sshd[2625836]: error: maximum authentication attempts exceeded for invalid user 22 from 194.61.24.177 port 14957 ssh2 [preauth]
Jul 13 14:23:42 v2202003116398111542 sshd[2625847]: Invalid user 22 from 194.61.24.177 port 24823
...
2020-07-13 21:10:57
93.107.187.162 attack
Jul 13 12:23:38 *** sshd[11047]: Invalid user utsav from 93.107.187.162
2020-07-13 21:14:51
102.149.121.181 attackbots
Jul  9 04:54:52 localhost postfix/smtpd[367827]: lost connection after DATA from unknown[102.149.121.181]
Jul  9 04:55:16 localhost postfix/smtpd[369022]: lost connection after DATA from unknown[102.149.121.181]
Jul  9 10:26:51 localhost postfix/smtpd[693147]: lost connection after DATA from unknown[102.149.121.181]
Jul  9 10:27:18 localhost postfix/smtpd[689098]: lost connection after DATA from unknown[102.149.121.181]
Jul  9 10:27:34 localhost postfix/smtpd[689098]: lost connection after DATA from unknown[102.149.121.181]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.149.121.181
2020-07-13 21:03:00
14.202.193.117 attackspam
14.202.193.117 - - [13/Jul/2020:15:07:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:24 +0200] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-07-13 21:12:20
85.53.160.67 attack
Jul 13 09:23:09 ws19vmsma01 sshd[144558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.53.160.67
Jul 13 09:23:11 ws19vmsma01 sshd[144558]: Failed password for invalid user tammie from 85.53.160.67 port 48722 ssh2
...
2020-07-13 21:13:27
37.59.37.69 attackspambots
Jul 13 14:44:11 server sshd[6856]: Failed password for invalid user tv from 37.59.37.69 port 54330 ssh2
Jul 13 14:48:42 server sshd[19537]: Failed password for invalid user test from 37.59.37.69 port 52333 ssh2
Jul 13 14:53:21 server sshd[25617]: Failed password for invalid user gny from 37.59.37.69 port 50336 ssh2
2020-07-13 21:16:27
162.243.10.64 attackspambots
2020-07-13T12:45:14.752767mail.csmailer.org sshd[525]: Invalid user ispconfig from 162.243.10.64 port 39610
2020-07-13T12:45:14.756684mail.csmailer.org sshd[525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64
2020-07-13T12:45:14.752767mail.csmailer.org sshd[525]: Invalid user ispconfig from 162.243.10.64 port 39610
2020-07-13T12:45:16.340962mail.csmailer.org sshd[525]: Failed password for invalid user ispconfig from 162.243.10.64 port 39610 ssh2
2020-07-13T12:48:32.933837mail.csmailer.org sshd[771]: Invalid user store from 162.243.10.64 port 37468
...
2020-07-13 21:01:40
5.78.159.166 attackspambots
Email rejected due to spam filtering
2020-07-13 21:35:26
45.163.144.2 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-13 21:33:03
111.230.236.93 attack
Jul 13 14:48:03 eventyay sshd[24748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.236.93
Jul 13 14:48:05 eventyay sshd[24748]: Failed password for invalid user sa from 111.230.236.93 port 46298 ssh2
Jul 13 14:49:42 eventyay sshd[24786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.236.93
...
2020-07-13 21:12:01
91.168.110.88 attackbots
2020-07-13T12:23:33.672Z CLOSE host=91.168.110.88 port=29015 fd=4 time=20.016 bytes=9
...
2020-07-13 21:24:12

Recently Reported IPs

104.149.53.198 104.149.53.194 104.149.30.146 104.149.53.202
104.149.51.150 104.149.53.196 104.149.53.199 104.149.51.141
114.26.158.49 114.26.158.69 104.149.53.231 104.149.53.213
104.149.53.246 104.149.53.226 104.149.53.235 104.149.53.220
104.149.53.250 104.149.53.251 104.149.53.249 104.149.62.131