Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.49.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.164.49.113.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 11:45:30 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 113.49.164.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.49.164.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.48.82.106 attackspambots
IP: 144.48.82.106
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS33387 NOCIX
   Myanmar (MM)
   CIDR 144.48.82.0/24
Log Date: 28/02/2020 4:33:56 PM UTC
2020-02-29 01:50:17
165.22.198.13 attackbotsspam
Feb 28 16:00:27 XXX sshd[57316]: Invalid user fake from 165.22.198.13 port 58856
2020-02-29 01:50:35
34.82.109.43 attackbots
tcp 60001
2020-02-29 02:19:06
109.196.82.214 attack
2020-02-28 10:11:00 H=ac214.itcomp.pl [109.196.82.214]:55325 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/109.196.82.214)
2020-02-28 10:11:01 H=ac214.itcomp.pl [109.196.82.214]:55325 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2020-02-28 10:11:02 H=ac214.itcomp.pl [109.196.82.214]:55325 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2020-02-29 01:51:39
164.132.107.245 attack
Feb 28 08:02:50 hanapaa sshd\[23895\]: Invalid user testuser from 164.132.107.245
Feb 28 08:02:50 hanapaa sshd\[23895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-164-132-107.eu
Feb 28 08:02:52 hanapaa sshd\[23895\]: Failed password for invalid user testuser from 164.132.107.245 port 50684 ssh2
Feb 28 08:11:27 hanapaa sshd\[24618\]: Invalid user adminuser from 164.132.107.245
Feb 28 08:11:27 hanapaa sshd\[24618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-164-132-107.eu
2020-02-29 02:17:13
113.161.87.40 attack
1582896583 - 02/28/2020 14:29:43 Host: 113.161.87.40/113.161.87.40 Port: 445 TCP Blocked
2020-02-29 02:09:09
18.203.154.252 attack
Feb 28 17:52:24 vps647732 sshd[23857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.203.154.252
Feb 28 17:52:26 vps647732 sshd[23857]: Failed password for invalid user javier from 18.203.154.252 port 48602 ssh2
...
2020-02-29 02:02:05
14.141.24.110 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-02-29 01:55:20
222.186.175.216 attackspam
v+ssh-bruteforce
2020-02-29 01:55:58
216.83.57.141 attackbots
Feb 28 23:21:46 gw1 sshd[28965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.57.141
Feb 28 23:21:48 gw1 sshd[28965]: Failed password for invalid user svnuser from 216.83.57.141 port 51022 ssh2
...
2020-02-29 02:27:34
201.243.9.82 attackbots
GET /wp-login.php HTTP/1.1
2020-02-29 02:02:56
198.108.67.105 attackspambots
2562/tcp 119/tcp 30083/tcp...
[2019-12-28/2020-02-28]102pkt,98pt.(tcp)
2020-02-29 02:17:49
189.8.3.10 attackbots
DATE:2020-02-28 14:27:26, IP:189.8.3.10, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-29 02:04:12
107.189.10.174 attackspam
Feb 28 16:25:20 XXXXXX sshd[26299]: Invalid user fake from 107.189.10.174 port 57852
2020-02-29 01:54:47
49.149.67.93 attackspam
20/2/28@09:23:25: FAIL: Alarm-Network address from=49.149.67.93
...
2020-02-29 01:58:16

Recently Reported IPs

119.37.165.254 103.1.210.133 254.231.121.195 106.46.121.144
208.34.125.54 126.65.165.206 137.40.149.87 97.121.204.76
148.235.70.175 85.157.30.216 25.105.209.35 182.220.207.184
70.162.32.95 115.161.216.112 145.157.217.250 198.110.19.9
223.253.144.255 11.117.13.110 210.104.31.156 238.230.80.245