Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.104.0.0 - 149.104.255.255
CIDR:           149.104.0.0/16
NetName:        COGENT-149-104-16
NetHandle:      NET-149-104-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-02-03
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.104.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       149.104.64.0 - 149.104.127.255
CIDR:           149.104.64.0/18
NetName:        BEDGE-CGNT-NET-1
NetHandle:      NET-149-104-64-0-1
Parent:         COGENT-149-104-16 (NET-149-104-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   BEDGE CO LIMITED (BL-1081)
RegDate:        2023-05-26
Updated:        2023-05-26
Ref:            https://rdap.arin.net/registry/ip/149.104.64.0


OrgName:        BEDGE CO LIMITED
OrgId:          BL-1081
Address:        1117 CUSTIS PL
Address:        PHILADELPHIA, PA 19122-4141
City:           PHILADELPHIA
StateProv:      PA
PostalCode:     19122-4141
Country:        US
RegDate:        2023-03-22
Updated:        2024-03-25
Comment:        Geofeed https://www.bedge.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/BL-1081


OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end


# start

NetRange:       149.104.111.0 - 149.104.111.255
CIDR:           149.104.111.0/24
NetName:        KAOPUCLOUD-TW
NetHandle:      NET-149-104-111-0-1
Parent:         BEDGE-CGNT-NET-1 (NET-149-104-64-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       KaopuCloud-TW (C09926226)
RegDate:        2023-08-04
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/149.104.111.0


CustName:       KaopuCloud-TW
Address:        Taiwan,Taipei
City:           Taipei
StateProv:      
PostalCode:     
Country:        TW
RegDate:        2023-08-04
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/entity/C09926226

OrgTechHandle: FELIC24-ARIN
OrgTechName:   Felicia, Felicia 
OrgTechPhone:  +1-267-670-0790 
OrgTechEmail:  NOC@bedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

OrgAbuseHandle: FELIC24-ARIN
OrgAbuseName:   Felicia, Felicia 
OrgAbusePhone:  +1-267-670-0790 
OrgAbuseEmail:  NOC@bedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FELIC24-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at:
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.111.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.104.111.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 14:49:19 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 60.111.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 60.111.104.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.170 attack
Dec  5 20:21:58 sauna sshd[114698]: Failed password for root from 218.92.0.170 port 47852 ssh2
Dec  5 20:22:10 sauna sshd[114698]: error: maximum authentication attempts exceeded for root from 218.92.0.170 port 47852 ssh2 [preauth]
...
2019-12-06 02:32:55
188.166.181.139 attack
188.166.181.139 - - \[05/Dec/2019:17:12:57 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
188.166.181.139 - - \[05/Dec/2019:17:12:58 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-06 02:29:43
222.186.190.2 attackbotsspam
detected by Fail2Ban
2019-12-06 03:05:38
1.193.21.178 attackspambots
Unauthorized connection attempt from IP address 1.193.21.178 on Port 445(SMB)
2019-12-06 02:32:21
118.24.82.81 attackbotsspam
Dec  5 16:00:22 microserver sshd[22085]: Invalid user port from 118.24.82.81 port 39304
Dec  5 16:00:22 microserver sshd[22085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81
Dec  5 16:00:24 microserver sshd[22085]: Failed password for invalid user port from 118.24.82.81 port 39304 ssh2
Dec  5 16:06:57 microserver sshd[23008]: Invalid user test from 118.24.82.81 port 41903
Dec  5 16:06:57 microserver sshd[23008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81
Dec  5 16:20:13 microserver sshd[25126]: Invalid user webadmin from 118.24.82.81 port 47109
Dec  5 16:20:13 microserver sshd[25126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81
Dec  5 16:20:15 microserver sshd[25126]: Failed password for invalid user webadmin from 118.24.82.81 port 47109 ssh2
Dec  5 16:26:57 microserver sshd[26133]: Invalid user adelheid from 118.24.82.81 port 49724
Dec  5 1
2019-12-06 03:02:41
195.223.30.235 attack
Dec  5 20:27:35 server sshd\[4472\]: Invalid user chef from 195.223.30.235
Dec  5 20:27:35 server sshd\[4472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.30.235 
Dec  5 20:27:37 server sshd\[4472\]: Failed password for invalid user chef from 195.223.30.235 port 38423 ssh2
Dec  5 21:12:13 server sshd\[16539\]: Invalid user backup from 195.223.30.235
Dec  5 21:12:13 server sshd\[16539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.30.235 
...
2019-12-06 02:33:24
187.141.50.219 attackbots
Dec  5 07:17:31 hpm sshd\[23266\]: Invalid user hoerhammer from 187.141.50.219
Dec  5 07:17:31 hpm sshd\[23266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.50.219
Dec  5 07:17:33 hpm sshd\[23266\]: Failed password for invalid user hoerhammer from 187.141.50.219 port 35794 ssh2
Dec  5 07:24:03 hpm sshd\[23874\]: Invalid user w3ftp from 187.141.50.219
Dec  5 07:24:03 hpm sshd\[23874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.50.219
2019-12-06 02:35:04
122.51.167.241 attackbots
Dec  5 23:59:56 areeb-Workstation sshd[1966]: Failed password for postgres from 122.51.167.241 port 41686 ssh2
Dec  6 00:06:00 areeb-Workstation sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.241 
...
2019-12-06 02:39:25
180.71.47.198 attackspambots
[ssh] SSH attack
2019-12-06 02:57:41
91.204.188.50 attack
Dec  5 23:59:03 areeb-Workstation sshd[1905]: Failed password for root from 91.204.188.50 port 51232 ssh2
...
2019-12-06 02:40:06
118.70.68.98 attackspambots
Unauthorized connection attempt from IP address 118.70.68.98 on Port 445(SMB)
2019-12-06 03:12:24
202.130.122.50 attackspambots
Unauthorized connection attempt from IP address 202.130.122.50 on Port 445(SMB)
2019-12-06 03:00:21
222.186.175.161 attackbotsspam
Failed password for root from 222.186.175.161 port 23312 ssh2
2019-12-06 03:01:18
222.186.175.220 attack
Dec  5 19:41:50 ns381471 sshd[18570]: Failed password for root from 222.186.175.220 port 49990 ssh2
2019-12-06 02:44:50
177.101.255.26 attack
Dec  5 13:25:46 plusreed sshd[23822]: Invalid user octave from 177.101.255.26
...
2019-12-06 02:48:03

Recently Reported IPs

124.227.5.95 117.155.150.169 118.214.153.52 16.16.7.68
10.210.108.18 213.159.70.3 167.99.152.240 1.177.63.29
121.234.219.154 2606:4700:10::6814:9175 2606:4700:10::6816:295 2606:4700:10::6816:4407
2606:4700:10::6816:1483 109.167.82.145 80.94.95.40 185.13.98.57
2606:4700:10::6816:4024 2606:4700:10::6814:9416 2606:4700:10::ac43:2709 2606:4700:10::6814:5534