Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.39.144.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.39.144.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:31:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.144.39.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.144.39.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.61.180 attackbotsspam
Mar  4 15:40:14 MK-Soft-VM3 sshd[12815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.61.180 
Mar  4 15:40:16 MK-Soft-VM3 sshd[12815]: Failed password for invalid user omsagent from 49.234.61.180 port 59692 ssh2
...
2020-03-04 23:11:01
182.77.95.183 attackbots
1583328986 - 03/04/2020 14:36:26 Host: 182.77.95.183/182.77.95.183 Port: 445 TCP Blocked
2020-03-04 23:26:56
209.146.30.218 attackspam
445/tcp
[2020-03-04]1pkt
2020-03-04 23:25:58
128.199.70.211 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-04 23:46:40
85.226.234.101 attackbotsspam
Honeypot attack, port: 5555, PTR: ua-85-226-234-101.bbcust.telenor.se.
2020-03-04 23:42:19
84.55.115.222 attackspambots
Honeypot attack, port: 445, PTR: 84-55-115-222.customers.ownit.se.
2020-03-04 23:49:20
111.186.57.170 attackspam
Mar  4 15:20:05 vpn01 sshd[10017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.186.57.170
Mar  4 15:20:07 vpn01 sshd[10017]: Failed password for invalid user pellegrini from 111.186.57.170 port 47244 ssh2
...
2020-03-04 23:17:35
66.65.120.57 attackspambots
Brute-force attempt banned
2020-03-04 23:13:01
183.88.11.242 attackspam
1433/tcp
[2020-03-04]1pkt
2020-03-04 23:13:37
134.209.18.220 attackbots
Mar  4 15:51:43 ns381471 sshd[26491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.18.220
Mar  4 15:51:45 ns381471 sshd[26491]: Failed password for invalid user ec2-user from 134.209.18.220 port 49866 ssh2
2020-03-04 23:23:33
102.189.252.86 attackspambots
445/tcp
[2020-03-04]1pkt
2020-03-04 23:17:03
221.133.18.119 attackbots
$f2bV_matches
2020-03-04 23:49:49
177.139.183.236 attack
1433/tcp
[2020-03-04]1pkt
2020-03-04 23:39:01
221.143.48.143 attackspam
Mar  4 16:32:36 MK-Soft-VM7 sshd[15969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143 
Mar  4 16:32:38 MK-Soft-VM7 sshd[15969]: Failed password for invalid user map from 221.143.48.143 port 18084 ssh2
...
2020-03-04 23:43:44
212.129.249.202 attackbots
SSH Brute Force
2020-03-04 23:11:37

Recently Reported IPs

141.75.50.192 168.94.19.66 108.247.84.154 35.176.132.93
173.55.85.11 255.193.224.27 186.137.32.40 229.180.3.155
185.155.150.165 172.58.86.156 216.221.237.198 223.158.47.86
210.46.39.150 145.33.60.222 21.78.18.47 63.12.101.159
122.103.13.171 237.161.0.254 249.245.255.48 163.236.240.165