Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.8.100.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.8.100.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:29:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 104.100.8.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.100.8.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.195.209.169 attackspam
DATE:2020-06-14 05:48:11, IP:37.195.209.169, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-14 18:02:57
201.236.226.19 attack
2020-06-14T14:46:55.689581billing sshd[24004]: Invalid user liwenxuan from 201.236.226.19 port 35017
2020-06-14T14:46:58.148414billing sshd[24004]: Failed password for invalid user liwenxuan from 201.236.226.19 port 35017 ssh2
2020-06-14T14:49:22.036694billing sshd[29495]: Invalid user admin from 201.236.226.19 port 52829
...
2020-06-14 17:48:24
144.91.98.31 attackspambots
Automatic report - XMLRPC Attack
2020-06-14 17:51:33
134.209.102.196 attackspam
Jun 14 10:36:18 gestao sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 
Jun 14 10:36:20 gestao sshd[10391]: Failed password for invalid user stephan from 134.209.102.196 port 60794 ssh2
Jun 14 10:40:04 gestao sshd[10574]: Failed password for root from 134.209.102.196 port 34020 ssh2
...
2020-06-14 17:54:52
106.13.168.31 attackspambots
Jun 14 11:10:33 eventyay sshd[8070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.31
Jun 14 11:10:36 eventyay sshd[8070]: Failed password for invalid user hhchung from 106.13.168.31 port 45522 ssh2
Jun 14 11:14:21 eventyay sshd[8166]: Failed password for root from 106.13.168.31 port 35846 ssh2
...
2020-06-14 17:39:23
51.68.251.202 attackspam
(sshd) Failed SSH login from 51.68.251.202 (NL/Netherlands/ip202.ip-51-68-251.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 14 10:11:22 ubnt-55d23 sshd[3778]: Invalid user kim from 51.68.251.202 port 41922
Jun 14 10:11:24 ubnt-55d23 sshd[3778]: Failed password for invalid user kim from 51.68.251.202 port 41922 ssh2
2020-06-14 17:52:25
106.12.95.20 attackbotsspam
(sshd) Failed SSH login from 106.12.95.20 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 14 08:42:37 srv sshd[6421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.20  user=root
Jun 14 08:42:39 srv sshd[6421]: Failed password for root from 106.12.95.20 port 52068 ssh2
Jun 14 09:28:21 srv sshd[6935]: Did not receive identification string from 106.12.95.20 port 44050
Jun 14 09:31:57 srv sshd[6983]: Invalid user pfdracin from 106.12.95.20 port 53186
Jun 14 09:32:00 srv sshd[6983]: Failed password for invalid user pfdracin from 106.12.95.20 port 53186 ssh2
2020-06-14 17:41:13
213.6.130.133 attack
SSH Brute Force
2020-06-14 18:16:54
194.62.202.162 attackspam
trying to access non-authorized port
2020-06-14 17:54:36
185.225.39.240 attackbots
2020-06-13 22:47:52.172925-0500  localhost smtpd[97519]: NOQUEUE: reject: RCPT from unknown[185.225.39.240]: 554 5.7.1 Service unavailable; Client host [185.225.39.240] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-06-14 18:08:16
159.192.143.249 attackbotsspam
2020-06-14T13:05:22.650176mail.standpoint.com.ua sshd[20234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249
2020-06-14T13:05:22.647549mail.standpoint.com.ua sshd[20234]: Invalid user server from 159.192.143.249 port 46042
2020-06-14T13:05:25.179901mail.standpoint.com.ua sshd[20234]: Failed password for invalid user server from 159.192.143.249 port 46042 ssh2
2020-06-14T13:09:05.467200mail.standpoint.com.ua sshd[20875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249  user=root
2020-06-14T13:09:07.273078mail.standpoint.com.ua sshd[20875]: Failed password for root from 159.192.143.249 port 46640 ssh2
...
2020-06-14 18:16:01
106.12.192.91 attack
ssh intrusion attempt
2020-06-14 17:54:10
104.131.249.57 attackspam
$f2bV_matches
2020-06-14 18:22:10
67.198.222.178 attack
2020-06-14T07:50:05.004798vps751288.ovh.net sshd\[4336\]: Invalid user 555222000 from 67.198.222.178 port 55322
2020-06-14T07:50:05.018594vps751288.ovh.net sshd\[4336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.222.178
2020-06-14T07:50:07.455237vps751288.ovh.net sshd\[4336\]: Failed password for invalid user 555222000 from 67.198.222.178 port 55322 ssh2
2020-06-14T07:51:18.293925vps751288.ovh.net sshd\[4338\]: Invalid user ABCabc123!@\# from 67.198.222.178 port 39898
2020-06-14T07:51:18.303286vps751288.ovh.net sshd\[4338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.198.222.178
2020-06-14 18:22:39
125.167.59.127 attack
DATE:2020-06-14 05:48:33, IP:125.167.59.127, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-14 17:48:48

Recently Reported IPs

47.89.245.32 179.203.15.90 90.94.39.116 180.27.235.31
129.170.26.217 27.173.26.191 98.132.21.79 201.18.106.222
136.206.145.224 163.221.113.114 95.181.164.128 161.78.146.149
74.212.249.97 114.65.34.103 232.160.59.137 86.47.215.89
7.180.11.228 138.132.168.20 32.89.44.36 77.229.0.190