Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.77.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.77.12.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 06:56:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 12.77.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 104.149.77.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.204 attackspambots
Triggered by Fail2Ban at Ares web server
2019-07-20 13:10:06
89.109.11.209 attack
Jul 20 07:03:37 dedicated sshd[31453]: Invalid user katie from 89.109.11.209 port 57613
2019-07-20 13:08:55
93.125.99.117 attack
Attack to wordpress xmlrpc
2019-07-20 13:16:19
138.68.48.118 attackbots
Jul 20 06:47:10 mail sshd\[19188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118
Jul 20 06:47:11 mail sshd\[19188\]: Failed password for invalid user reza from 138.68.48.118 port 48748 ssh2
Jul 20 06:51:53 mail sshd\[19738\]: Invalid user santana from 138.68.48.118 port 46516
Jul 20 06:51:53 mail sshd\[19738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118
Jul 20 06:51:54 mail sshd\[19738\]: Failed password for invalid user santana from 138.68.48.118 port 46516 ssh2
2019-07-20 13:11:00
220.255.137.57 attackspam
Automatic report - Port Scan Attack
2019-07-20 13:14:26
212.129.36.131 attackbots
Jul 20 03:33:00 esset sshd\[17546\]: refused connect from 212.129.36.131 \(212.129.36.131\)
Jul 20 03:33:00 esset sshd\[17548\]: refused connect from 212.129.36.131 \(212.129.36.131\)
2019-07-20 12:53:36
140.143.57.159 attackspam
Jul 17 06:35:07 eola sshd[31623]: Invalid user patrick from 140.143.57.159 port 42490
Jul 17 06:35:07 eola sshd[31623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.159 
Jul 17 06:35:09 eola sshd[31623]: Failed password for invalid user patrick from 140.143.57.159 port 42490 ssh2
Jul 17 06:35:10 eola sshd[31623]: Received disconnect from 140.143.57.159 port 42490:11: Bye Bye [preauth]
Jul 17 06:35:10 eola sshd[31623]: Disconnected from 140.143.57.159 port 42490 [preauth]
Jul 17 06:46:28 eola sshd[32411]: Invalid user wp from 140.143.57.159 port 60950
Jul 17 06:46:28 eola sshd[32411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.159 
Jul 17 06:46:30 eola sshd[32411]: Failed password for invalid user wp from 140.143.57.159 port 60950 ssh2
Jul 17 06:46:30 eola sshd[32411]: Received disconnect from 140.143.57.159 port 60950:11: Bye Bye [preauth]
Jul 17 06:46:30 eola s........
-------------------------------
2019-07-20 13:06:57
116.241.118.65 attackbots
Telnetd brute force attack detected by fail2ban
2019-07-20 13:15:47
45.236.244.130 attackspambots
Jul 20 05:38:19 v22018076622670303 sshd\[6584\]: Invalid user profile from 45.236.244.130 port 53290
Jul 20 05:38:19 v22018076622670303 sshd\[6584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.236.244.130
Jul 20 05:38:21 v22018076622670303 sshd\[6584\]: Failed password for invalid user profile from 45.236.244.130 port 53290 ssh2
...
2019-07-20 12:39:04
178.218.32.54 attackbotsspam
Jul 20 06:34:38 rpi sshd[6189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.218.32.54 
Jul 20 06:34:40 rpi sshd[6189]: Failed password for invalid user pass from 178.218.32.54 port 33772 ssh2
2019-07-20 13:18:42
179.96.142.52 attack
failed_logins
2019-07-20 13:03:48
92.222.71.125 attackbotsspam
web-1 [ssh] SSH Attack
2019-07-20 13:35:47
54.38.184.235 attackbotsspam
Jul 20 06:19:48 SilenceServices sshd[20809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235
Jul 20 06:19:50 SilenceServices sshd[20809]: Failed password for invalid user kai from 54.38.184.235 port 50434 ssh2
Jul 20 06:24:18 SilenceServices sshd[23896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235
2019-07-20 12:36:38
220.181.108.106 attackbotsspam
Automatic report - Banned IP Access
2019-07-20 12:37:41
85.72.37.122 attack
Jul 20 06:24:36 icinga sshd[2780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.72.37.122
Jul 20 06:24:37 icinga sshd[2780]: Failed password for invalid user tina from 85.72.37.122 port 36398 ssh2
...
2019-07-20 13:14:04

Recently Reported IPs

104.149.77.11 104.149.84.165 104.152.108.146 104.152.108.169
104.152.108.38 104.152.108.72 104.152.109.158 104.152.109.25
104.152.109.37 104.152.109.47 104.152.110.13 104.152.110.169
104.152.110.227 104.152.168.25 104.152.72.22 251.120.215.37
104.153.197.240 104.153.197.76 104.153.216.35 104.155.208.60