Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.107.104.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.107.104.102.			IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082101 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 22 12:28:36 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 102.104.107.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 102.104.107.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.118.160.37 attackspam
29.06.2019 21:58:24 Connection to port 6001 blocked by firewall
2019-06-30 07:58:17
41.210.252.100 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:40:54,526 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.210.252.100)
2019-06-30 08:01:12
207.154.227.200 attackbots
Jun 29 14:30:45 cac1d2 sshd\[10544\]: Invalid user server1 from 207.154.227.200 port 55658
Jun 29 14:30:45 cac1d2 sshd\[10544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.227.200
Jun 29 14:30:47 cac1d2 sshd\[10544\]: Failed password for invalid user server1 from 207.154.227.200 port 55658 ssh2
...
2019-06-30 08:02:22
170.233.174.53 attackbotsspam
$f2bV_matches
2019-06-30 07:49:19
114.232.194.40 attackbotsspam
2019-06-29T20:39:05.334320 X postfix/smtpd[29426]: warning: unknown[114.232.194.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:54:46.310196 X postfix/smtpd[30852]: warning: unknown[114.232.194.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:55:27.045643 X postfix/smtpd[29428]: warning: unknown[114.232.194.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 08:18:57
51.255.174.215 attackspambots
Invalid user www from 51.255.174.215 port 33804
2019-06-30 08:13:12
114.232.123.147 attackbots
2019-06-29T20:10:05.088344 X postfix/smtpd[18850]: warning: unknown[114.232.123.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:10:30.384606 X postfix/smtpd[18860]: warning: unknown[114.232.123.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:55:31.021821 X postfix/smtpd[29426]: warning: unknown[114.232.123.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 08:17:57
191.241.242.12 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:36:39,455 INFO [amun_request_handler] PortScan Detected on Port: 445 (191.241.242.12)
2019-06-30 08:27:40
104.140.188.22 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-29 20:55:05]
2019-06-30 08:07:29
1.60.115.8 attackbots
" "
2019-06-30 08:11:35
106.13.107.106 attackspambots
Invalid user emeraude from 106.13.107.106 port 44050
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.107.106
Failed password for invalid user emeraude from 106.13.107.106 port 44050 ssh2
Invalid user stream from 106.13.107.106 port 38178
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.107.106
2019-06-30 08:23:56
119.183.162.129 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-29 20:54:43]
2019-06-30 08:27:03
185.173.35.21 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:42:44,152 INFO [amun_request_handler] PortScan Detected on Port: 139 (185.173.35.21)
2019-06-30 07:50:59
35.246.229.51 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-06-30 08:10:44
188.27.240.181 attack
Jun 30 01:11:22 srv-4 sshd\[21788\]: Invalid user workshop from 188.27.240.181
Jun 30 01:11:22 srv-4 sshd\[21788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.27.240.181
Jun 30 01:11:24 srv-4 sshd\[21788\]: Failed password for invalid user workshop from 188.27.240.181 port 37484 ssh2
...
2019-06-30 08:16:53

Recently Reported IPs

205.214.114.86 95.179.254.125 67.205.137.155 103.72.179.9
180.241.56.162 139.215.195.61 231.60.92.138 31.220.50.17
154.28.188.105 51.89.117.252 120.14.18.182 36.92.111.149
35.201.206.239 113.183.125.208 212.237.118.29 43.251.85.147
118.163.91.125 144.34.207.84 121.199.6.201 81.32.250.147