Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.53.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.53.239.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:16:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 239.53.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.53.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
145.239.5.234 attack
WordPress brute force
2020-03-27 07:57:25
163.172.87.232 attackspambots
Invalid user shaun from 163.172.87.232 port 55801
2020-03-27 07:55:46
167.114.211.94 attack
[portscan] Port scan
2020-03-27 08:05:04
113.54.156.94 attack
Invalid user work from 113.54.156.94 port 34302
2020-03-27 08:15:03
14.29.232.81 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-03-27 08:25:34
211.157.179.38 attackbots
Invalid user csserver from 211.157.179.38 port 55670
2020-03-27 08:00:56
119.96.189.97 attackspambots
bruteforce detected
2020-03-27 08:06:05
114.32.213.55 attack
scan z
2020-03-27 08:31:46
66.70.142.220 attack
Mar 27 04:24:44 gw1 sshd[17968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.142.220
Mar 27 04:24:46 gw1 sshd[17968]: Failed password for invalid user rv from 66.70.142.220 port 46876 ssh2
...
2020-03-27 08:12:07
198.211.123.183 attackbots
Mar 26 22:18:18 XXX sshd[45502]: Invalid user zimbra from 198.211.123.183 port 43826
2020-03-27 08:02:46
198.211.110.116 attack
Invalid user ra from 198.211.110.116 port 49202
2020-03-27 08:07:50
211.22.154.223 attackbots
Invalid user simulation from 211.22.154.223 port 53828
2020-03-27 08:16:15
170.130.187.6 attack
Unauthorized connection attempt detected from IP address 170.130.187.6 to port 2048
2020-03-27 07:58:42
46.136.173.103 attack
Mar 26 05:03:36 XXX sshd[22410]: Invalid user gj from 46.136.173.103 port 46531
2020-03-27 08:18:49
159.89.194.103 attackbotsspam
Invalid user sshuser from 159.89.194.103 port 36896
2020-03-27 08:06:57

Recently Reported IPs

104.149.53.230 104.149.59.27 104.149.62.142 104.149.62.154
104.149.62.155 104.149.62.189 104.149.63.138 104.149.63.147
104.149.63.154 104.149.74.73 104.149.85.112 104.152.108.115
104.152.108.206 104.152.109.108 104.152.109.154 104.152.109.2
104.152.109.214 104.152.109.41 104.152.109.71 104.152.109.72