Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.50.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.104.50.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122701 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 28 03:28:51 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 4.50.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.50.104.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.84.33 attackspam
Aug  1 16:50:41 mail sshd\[27797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.33  user=root
...
2020-08-02 07:26:41
61.133.232.250 attackbots
Aug  2 00:48:41 root sshd[14555]: Failed password for root from 61.133.232.250 port 40287 ssh2
Aug  2 00:52:19 root sshd[15413]: Failed password for root from 61.133.232.250 port 13939 ssh2
...
2020-08-02 07:27:37
2.36.136.146 attack
Aug  1 18:15:23 ny01 sshd[9520]: Failed password for root from 2.36.136.146 port 41314 ssh2
Aug  1 18:19:18 ny01 sshd[9981]: Failed password for root from 2.36.136.146 port 54028 ssh2
2020-08-02 07:09:11
184.168.46.186 attackspambots
Automatic report - XMLRPC Attack
2020-08-02 07:19:58
45.91.202.156 attackspam
Aug  1 22:38:42 kh-dev-server sshd[1746]: Failed password for root from 45.91.202.156 port 37152 ssh2
...
2020-08-02 07:31:26
118.89.248.136 attackbots
Aug  1 14:00:01 dignus sshd[30129]: Failed password for root from 118.89.248.136 port 54154 ssh2
Aug  1 14:01:27 dignus sshd[30338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.248.136  user=root
Aug  1 14:01:29 dignus sshd[30338]: Failed password for root from 118.89.248.136 port 47394 ssh2
Aug  1 14:02:52 dignus sshd[30510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.248.136  user=root
Aug  1 14:02:55 dignus sshd[30510]: Failed password for root from 118.89.248.136 port 40558 ssh2
...
2020-08-02 07:04:16
45.176.213.117 attack
Aug  2 00:27:08 mail.srvfarm.net postfix/smtpd[1322466]: warning: unknown[45.176.213.117]: SASL PLAIN authentication failed: 
Aug  2 00:27:09 mail.srvfarm.net postfix/smtpd[1322466]: lost connection after AUTH from unknown[45.176.213.117]
Aug  2 00:27:41 mail.srvfarm.net postfix/smtps/smtpd[1365371]: warning: unknown[45.176.213.117]: SASL PLAIN authentication failed: 
Aug  2 00:27:42 mail.srvfarm.net postfix/smtps/smtpd[1365371]: lost connection after AUTH from unknown[45.176.213.117]
Aug  2 00:35:49 mail.srvfarm.net postfix/smtps/smtpd[1365372]: warning: unknown[45.176.213.117]: SASL PLAIN authentication failed:
2020-08-02 07:22:04
101.255.81.91 attackspambots
Tried sshing with brute force.
2020-08-02 07:17:34
120.53.108.120 attack
Automatic report - Banned IP Access
2020-08-02 07:15:39
187.141.128.42 attackspambots
SSH Invalid Login
2020-08-02 07:25:09
218.92.0.171 attackbots
2020-08-01T20:04:48.996816correo.[domain] sshd[47036]: Failed password for root from 218.92.0.171 port 64834 ssh2 2020-08-01T20:04:52.805801correo.[domain] sshd[47036]: Failed password for root from 218.92.0.171 port 64834 ssh2 2020-08-01T20:04:55.827417correo.[domain] sshd[47036]: Failed password for root from 218.92.0.171 port 64834 ssh2 ...
2020-08-02 07:16:46
208.68.39.220 attack
Fail2Ban
2020-08-02 07:28:28
49.74.219.26 attack
Aug  2 01:01:13 vpn01 sshd[19403]: Failed password for root from 49.74.219.26 port 17271 ssh2
...
2020-08-02 07:12:30
89.235.31.135 attackbots
(smtpauth) Failed SMTP AUTH login from 89.235.31.135 (CZ/Czechia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-02 01:16:22 plain authenticator failed for ([89.235.31.135]) [89.235.31.135]: 535 Incorrect authentication data (set_id=info@taninsanat.com)
2020-08-02 07:27:12
198.181.45.215 attackbots
Aug  1 22:38:51 kh-dev-server sshd[1756]: Failed password for root from 198.181.45.215 port 50064 ssh2
...
2020-08-02 07:28:56

Recently Reported IPs

5.242.106.172 249.9.180.140 162.62.253.60 148.19.116.53
39.142.228.95 176.131.96.229 234.40.47.130 200.253.22.128
172.67.168.231 172.144.22.139 211.132.60.183 172.198.202.140
39.70.88.125 40.179.162.44 222.255.249.240 74.143.38.189
211.73.173.66 199.237.168.45 192.180.241.102 147.45.33.138