Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.8.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.8.243.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 27 08:47:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 243.8.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 243.8.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
192.241.239.81 attackspambots
Port Scan/VNC login attempt
...
2020-09-19 12:23:51
111.85.96.173 attackspambots
s3.hscode.pl - SSH Attack
2020-09-19 07:45:16
111.254.34.229 attackspam
Unauthorized connection attempt from IP address 111.254.34.229 on Port 445(SMB)
2020-09-19 07:52:04
149.56.15.136 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-19T03:13:07Z
2020-09-19 12:02:18
42.2.125.4 attack
Sep 18 07:00:14 scw-focused-cartwright sshd[17103]: Failed password for root from 42.2.125.4 port 55468 ssh2
2020-09-19 07:52:57
31.163.152.203 attack
Listed on    zen-spamhaus also barracudaCentral and abuseat.org   / proto=6  .  srcport=26229  .  dstport=23  .     (2884)
2020-09-19 12:05:50
185.38.3.138 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-09-19 12:05:20
51.83.33.88 attack
SSH Bruteforce Attempt on Honeypot
2020-09-19 12:24:55
94.73.34.22 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-19 12:08:53
106.54.117.51 attackspambots
Sep 18 18:57:33 haigwepa sshd[20387]: Failed password for root from 106.54.117.51 port 41798 ssh2
...
2020-09-19 07:41:00
122.165.206.136 attack
Unauthorized connection attempt from IP address 122.165.206.136 on Port 445(SMB)
2020-09-19 07:40:40
113.254.181.160 attack
Sep 18 17:00:17 scw-focused-cartwright sshd[28958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.254.181.160
Sep 18 17:00:19 scw-focused-cartwright sshd[28958]: Failed password for invalid user pi from 113.254.181.160 port 40052 ssh2
2020-09-19 07:48:47
81.215.102.154 attackspambots
Unauthorized connection attempt from IP address 81.215.102.154 on Port 445(SMB)
2020-09-19 07:44:13
77.222.116.152 attackspam
Sep 18 17:01:28 ssh2 sshd[28728]: User root from pool-77-222-116-152.is74.ru not allowed because not listed in AllowUsers
Sep 18 17:01:28 ssh2 sshd[28728]: Failed password for invalid user root from 77.222.116.152 port 56564 ssh2
Sep 18 17:01:28 ssh2 sshd[28728]: Connection closed by invalid user root 77.222.116.152 port 56564 [preauth]
...
2020-09-19 12:13:22
167.71.187.10 attackspam
Automatic report - Banned IP Access
2020-09-19 07:50:17

Recently Reported IPs

104.149.227.166 29.243.184.190 104.152.108.160 104.152.108.17
104.152.108.223 104.152.109.107 104.155.63.5 104.155.77.78
104.156.51.230 104.16.146.70 104.16.147.70 104.16.169.43
104.16.176.20 167.74.24.58 5.188.49.15 104.168.161.66
104.168.163.103 104.168.163.52 104.168.165.139 104.168.165.194