Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.53.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.53.238.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 15:41:02 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 238.53.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.53.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
141.98.9.157 attackspambots
2020-06-06T14:18:19.235782homeassistant sshd[18296]: Failed password for invalid user admin from 141.98.9.157 port 41545 ssh2
2020-06-07T03:59:19.441503homeassistant sshd[2330]: Invalid user admin from 141.98.9.157 port 36873
2020-06-07T03:59:19.463362homeassistant sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
...
2020-06-07 12:09:51
168.196.165.26 attackspambots
Jun  7 03:51:47 vlre-nyc-1 sshd\[3917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26  user=root
Jun  7 03:51:50 vlre-nyc-1 sshd\[3917\]: Failed password for root from 168.196.165.26 port 42417 ssh2
Jun  7 03:55:13 vlre-nyc-1 sshd\[3997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26  user=root
Jun  7 03:55:15 vlre-nyc-1 sshd\[3997\]: Failed password for root from 168.196.165.26 port 39369 ssh2
Jun  7 03:58:50 vlre-nyc-1 sshd\[4066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26  user=root
...
2020-06-07 12:29:03
82.149.13.45 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-07 08:27:51
202.148.17.82 attackbotsspam
RDP Brute-Force (Grieskirchen RZ2)
2020-06-07 12:28:31
51.79.55.87 attackbotsspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-07 08:19:48
182.122.6.219 attackspam
Jun  6 16:45:54 nxxxxxxx0 sshd[16422]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.6.219] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  6 16:45:54 nxxxxxxx0 sshd[16422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.6.219  user=r.r
Jun  6 16:45:56 nxxxxxxx0 sshd[16422]: Failed password for r.r from 182.122.6.219 port 64444 ssh2
Jun  6 16:45:57 nxxxxxxx0 sshd[16422]: Received disconnect from 182.122.6.219: 11: Bye Bye [preauth]
Jun  6 16:55:30 nxxxxxxx0 sshd[17117]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.6.219] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  6 16:55:30 nxxxxxxx0 sshd[17117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.6.219  user=r.r
Jun  6 16:55:33 nxxxxxxx0 sshd[17117]: Failed password for r.r from 182.122.6.219 port 30146 ssh2
Jun  6 16:55:33 nxxxxxxx0 sshd[17117]: Received disconnect from 182.122.6.219: 11: By........
-------------------------------
2020-06-07 08:21:48
141.98.9.161 attackbotsspam
2020-06-06T14:18:29.809173homeassistant sshd[18372]: Failed password for invalid user admin from 141.98.9.161 port 37221 ssh2
2020-06-07T03:59:29.657395homeassistant sshd[2401]: Invalid user admin from 141.98.9.161 port 39095
2020-06-07T03:59:29.668639homeassistant sshd[2401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
...
2020-06-07 12:01:57
207.154.234.102 attackspambots
Jun  6 18:11:34 Host-KLAX-C sshd[1956]: User root from 207.154.234.102 not allowed because not listed in AllowUsers
...
2020-06-07 08:28:08
46.101.113.206 attackbotsspam
Jun  7 06:00:54 PorscheCustomer sshd[26923]: Failed password for root from 46.101.113.206 port 55602 ssh2
Jun  7 06:04:11 PorscheCustomer sshd[27041]: Failed password for root from 46.101.113.206 port 59286 ssh2
...
2020-06-07 12:07:41
185.232.65.105 attackbotsspam
Jun  7 07:23:14 ift sshd\[17318\]: Failed password for root from 185.232.65.105 port 52796 ssh2Jun  7 07:23:17 ift sshd\[17326\]: Failed password for root from 185.232.65.105 port 33418 ssh2Jun  7 07:23:20 ift sshd\[17331\]: Failed password for root from 185.232.65.105 port 43318 ssh2Jun  7 07:23:23 ift sshd\[17334\]: Failed password for root from 185.232.65.105 port 53584 ssh2Jun  7 07:23:26 ift sshd\[17338\]: Failed password for root from 185.232.65.105 port 32824 ssh2
...
2020-06-07 12:24:58
46.38.145.252 attackspambots
2020-06-06T22:12:41.493411linuxbox-skyline auth[188579]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=sql01 rhost=46.38.145.252
...
2020-06-07 12:20:02
59.120.189.230 attackbotsspam
Jun  6 18:45:45 vps46666688 sshd[2356]: Failed password for root from 59.120.189.230 port 58168 ssh2
...
2020-06-07 08:23:26
134.209.226.157 attackbots
detected by Fail2Ban
2020-06-07 12:00:32
111.229.120.31 attackbots
Wordpress malicious attack:[sshd]
2020-06-07 12:11:52
187.103.103.26 attackspambots
Port probing on unauthorized port 445
2020-06-07 12:05:18

Recently Reported IPs

104.149.53.241 104.149.53.242 104.149.53.240 104.149.53.243
104.149.74.78 104.149.74.77 104.149.74.81 104.149.74.80
104.149.74.83 104.149.74.85 104.149.74.86 104.149.74.95
104.149.74.92 104.149.74.90 104.149.74.87 104.149.77.10
104.149.74.98 104.149.76.18 104.149.74.97 104.149.74.94