Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.91.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.91.14.			IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 16:32:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.91.149.104.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 104.149.91.14.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
124.156.172.11 attackspam
Nov 20 15:47:03 MK-Soft-VM5 sshd[19196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.172.11 
Nov 20 15:47:05 MK-Soft-VM5 sshd[19196]: Failed password for invalid user server from 124.156.172.11 port 51568 ssh2
...
2019-11-20 22:50:21
198.23.251.238 attack
Nov 20 19:47:02 gw1 sshd[10884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.251.238
Nov 20 19:47:04 gw1 sshd[10884]: Failed password for invalid user 1234 from 198.23.251.238 port 56826 ssh2
...
2019-11-20 22:50:33
14.226.92.156 attack
Unauthorized connection attempt from IP address 14.226.92.156 on Port 445(SMB)
2019-11-20 22:58:44
85.73.176.230 attack
Automatic report - Port Scan Attack
2019-11-20 22:41:52
117.67.142.70 attack
badbot
2019-11-20 22:28:40
63.88.23.205 attackspam
63.88.23.205 was recorded 19 times by 8 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 19, 96, 367
2019-11-20 22:33:01
175.175.67.126 attack
3389BruteforceFW21
2019-11-20 22:52:39
175.154.203.70 attackspam
badbot
2019-11-20 22:33:23
207.253.227.226 attackbotsspam
Unauthorised access (Nov 20) SRC=207.253.227.226 LEN=40 TTL=243 ID=11647 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Nov 17) SRC=207.253.227.226 LEN=40 TTL=243 ID=59184 TCP DPT=1433 WINDOW=1024 SYN
2019-11-20 23:00:42
216.169.91.106 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:43:16
115.213.170.199 attack
badbot
2019-11-20 22:37:15
106.13.45.212 attack
2019-11-20 12:41:00,571 fail2ban.actions: WARNING [ssh] Ban 106.13.45.212
2019-11-20 22:42:32
184.75.211.131 attackspam
(From mohamed.spence@outlook.com) Need to find powerful online marketing that isn't full of crap? Sorry to bug you on your contact form but actually that was kinda the point. We can send your advertising text to sites through their contact forms just like you're getting this note right now. You can specify targets by keyword or just start mass blasts to sites in any country you choose. So let's assume you want to blast an ad to all the contractors in the USA, we'll grab websites for just those and post your promo to them. As long as you're advertising something that's relevant to that business category then you'll get an amazing response! 

Write a quick note to eliza3644will@gmail.com to get info and prices
2019-11-20 22:34:29
1.29.109.212 attackspam
badbot
2019-11-20 22:42:49
190.129.95.194 attackbotsspam
Unauthorized connection attempt from IP address 190.129.95.194 on Port 445(SMB)
2019-11-20 22:53:07

Recently Reported IPs

104.149.216.166 104.152.109.31 228.48.218.37 104.152.110.14
104.152.169.25 104.152.65.10 104.153.120.98 104.154.249.238
104.154.41.203 104.155.141.33 104.155.195.40 104.155.197.171
104.155.214.189 104.155.216.134 104.155.24.104 104.155.43.245
104.155.51.216 104.155.74.170 104.156.225.207 104.156.227.185