Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.41.149.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.41.149.144.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:26:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 144.149.41.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.149.41.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.80.144.136 attack
[Thu Mar 12 00:51:07 2020] - Syn Flood From IP: 183.80.144.136 Port: 60411
2020-03-23 16:37:37
115.75.227.184 attack
[Wed Mar 11 03:02:12 2020] - Syn Flood From IP: 115.75.227.184 Port: 51086
2020-03-23 17:11:30
200.150.69.26 attackbots
Unauthorized connection attempt detected from IP address 200.150.69.26 to port 2200
2020-03-23 17:18:45
149.210.227.223 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-23 17:12:09
103.238.70.96 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 16:35:42
139.59.4.62 attackbotsspam
Mar 23 03:20:41 mail sshd\[60409\]: Invalid user user from 139.59.4.62
Mar 23 03:20:42 mail sshd\[60409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.62
...
2020-03-23 16:38:40
185.47.65.30 attackbotsspam
Invalid user by from 185.47.65.30 port 48742
2020-03-23 16:56:25
72.130.188.9 attackbotsspam
Honeypot attack, port: 5555, PTR: cpe-72-130-188-9.hawaii.res.rr.com.
2020-03-23 16:47:30
223.176.54.203 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-03-23 16:28:10
87.166.145.221 attackbots
$f2bV_matches
2020-03-23 16:58:32
183.47.14.74 attackbotsspam
Mar 23 03:36:24 vps46666688 sshd[23590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.14.74
Mar 23 03:36:26 vps46666688 sshd[23590]: Failed password for invalid user camie from 183.47.14.74 port 56742 ssh2
...
2020-03-23 17:14:56
222.186.19.221 attack
SIP/5060 Probe, BF, Hack -
2020-03-23 16:46:17
51.104.23.11 attack
[portscan] Port scan
2020-03-23 17:08:46
58.176.5.121 attackbots
Port scan on 1 port(s): 50752
2020-03-23 17:05:33
39.165.17.134 attackbotsspam
Helo
2020-03-23 16:46:47

Recently Reported IPs

104.37.86.41 104.40.76.77 104.40.66.6 104.42.12.148
104.42.154.105 104.42.193.151 104.41.221.71 104.42.50.64
104.45.218.160 104.43.247.138 13.226.31.29 104.45.129.26
104.43.163.75 104.42.63.245 104.43.129.144 104.42.53.24
104.45.42.16 104.45.26.238 104.46.51.210 104.45.95.61