Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.148.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.148.29.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 06:03:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 29.148.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.148.19.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.38.241.162 attack
Aug 16 03:04:23 hiderm sshd\[27788\]: Invalid user craig2 from 54.38.241.162
Aug 16 03:04:23 hiderm sshd\[27788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu
Aug 16 03:04:25 hiderm sshd\[27788\]: Failed password for invalid user craig2 from 54.38.241.162 port 39342 ssh2
Aug 16 03:13:43 hiderm sshd\[28657\]: Invalid user git from 54.38.241.162
Aug 16 03:13:43 hiderm sshd\[28657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu
2019-08-16 21:36:24
187.162.58.24 attackbotsspam
Aug 16 07:36:57 xtremcommunity sshd\[9866\]: Invalid user admin from 187.162.58.24 port 43494
Aug 16 07:36:57 xtremcommunity sshd\[9866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.58.24
Aug 16 07:36:58 xtremcommunity sshd\[9866\]: Failed password for invalid user admin from 187.162.58.24 port 43494 ssh2
Aug 16 07:41:26 xtremcommunity sshd\[10082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.58.24  user=root
Aug 16 07:41:28 xtremcommunity sshd\[10082\]: Failed password for root from 187.162.58.24 port 35972 ssh2
...
2019-08-16 22:35:49
167.71.37.106 attackspambots
Aug 16 15:47:18 v22018076622670303 sshd\[2971\]: Invalid user bea from 167.71.37.106 port 32828
Aug 16 15:47:18 v22018076622670303 sshd\[2971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.37.106
Aug 16 15:47:20 v22018076622670303 sshd\[2971\]: Failed password for invalid user bea from 167.71.37.106 port 32828 ssh2
...
2019-08-16 22:04:02
2.229.19.80 attack
139/tcp 139/tcp
[2019-08-16]2pkt
2019-08-16 22:23:49
68.183.236.66 attackspam
Aug 16 08:38:00 sshgateway sshd\[2709\]: Invalid user ahavi from 68.183.236.66
Aug 16 08:38:00 sshgateway sshd\[2709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.66
Aug 16 08:38:02 sshgateway sshd\[2709\]: Failed password for invalid user ahavi from 68.183.236.66 port 57294 ssh2
2019-08-16 21:42:55
50.126.95.22 attack
Aug 16 09:39:42 yabzik sshd[32711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.126.95.22
Aug 16 09:39:44 yabzik sshd[32711]: Failed password for invalid user ubuntu from 50.126.95.22 port 45126 ssh2
Aug 16 09:44:07 yabzik sshd[1938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.126.95.22
2019-08-16 21:53:59
108.62.202.220 attackbotsspam
Splunk® : port scan detected:
Aug 16 09:50:10 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=108.62.202.220 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=TCP SPT=36330 DPT=23309 WINDOW=65535 RES=0x00 SYN URGP=0
2019-08-16 21:57:12
211.23.61.194 attack
Aug 16 13:55:02 ip-172-31-62-245 sshd\[12043\]: Invalid user raju from 211.23.61.194\
Aug 16 13:55:04 ip-172-31-62-245 sshd\[12043\]: Failed password for invalid user raju from 211.23.61.194 port 35570 ssh2\
Aug 16 13:59:46 ip-172-31-62-245 sshd\[12076\]: Invalid user joana from 211.23.61.194\
Aug 16 13:59:48 ip-172-31-62-245 sshd\[12076\]: Failed password for invalid user joana from 211.23.61.194 port 54472 ssh2\
Aug 16 14:04:29 ip-172-31-62-245 sshd\[12115\]: Invalid user postmaster from 211.23.61.194\
2019-08-16 22:10:51
178.156.202.135 attack
Received: from slot0.abamarket.ga (cha135.carseatcoversuk.com [178.156.202.135]) by [snipped] with SMTP
	(version=TLS\Tls12
	cipher=Aes256 bits=256);
   Fri, 16 Aug 2019 12:46:19 +0800
Reply-To: 
From: "Mr NARESH KUMAR" 
To: "Recipients" 
Subject: SPAM: PLEASE CONFIRM PURCHASE ORDER
2019-08-16 22:30:58
179.108.244.123 attack
Aug 16 07:15:12 xeon postfix/smtpd[37781]: warning: unknown[179.108.244.123]: SASL PLAIN authentication failed: authentication failure
2019-08-16 22:24:54
129.211.20.121 attackspambots
Automatic report - Banned IP Access
2019-08-16 22:29:51
49.248.97.227 attackspambots
Automatic report - Banned IP Access
2019-08-16 22:13:30
66.249.66.95 attack
Automatic report - Banned IP Access
2019-08-16 21:49:09
36.237.106.8 attack
23/tcp
[2019-08-16]1pkt
2019-08-16 22:48:48
40.115.98.94 attackbots
Aug 16 13:06:22 heissa sshd\[25967\]: Invalid user knight from 40.115.98.94 port 41882
Aug 16 13:06:22 heissa sshd\[25967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.98.94
Aug 16 13:06:24 heissa sshd\[25967\]: Failed password for invalid user knight from 40.115.98.94 port 41882 ssh2
Aug 16 13:10:30 heissa sshd\[26520\]: Invalid user imre from 40.115.98.94 port 35472
Aug 16 13:10:30 heissa sshd\[26520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.98.94
2019-08-16 21:41:23

Recently Reported IPs

104.19.148.104 104.19.148.56 104.19.149.104 44.60.20.181
104.19.149.29 104.19.154.47 104.19.154.92 104.19.155.47
104.19.155.80 104.19.155.92 104.19.156.80 104.19.158.53
104.19.159.48 104.19.159.53 104.19.160.48 104.19.160.92
104.19.161.92 104.19.168.96 104.19.169.96 104.19.171.50