Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.92.214.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.92.214.166.			IN	A

;; AUTHORITY SECTION:
.			278	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023120702 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 08 08:52:52 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 166.214.92.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.214.92.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.27.160.239 attackbotsspam
Honeypot attack, port: 445, PTR: 5E1BA0EF.mobile.pool.telekom.hu.
2020-01-12 05:21:24
52.237.38.163 attackbotsspam
Brute forcing Wordpress login
2020-01-12 05:48:32
75.97.225.2 attack
Honeypot attack, port: 5555, PTR: 75.97.225.2.res-cmts.leh.ptd.net.
2020-01-12 05:51:25
171.212.201.213 attackspambots
Jan  6 07:10:03 web sshd[24958]: Did not receive identification string from 171.212.201.213 port 34601
Jan  6 07:14:30 web sshd[25085]: Invalid user osboxes from 171.212.201.213 port 35098
Jan  6 07:14:31 web sshd[25085]: Connection closed by 171.212.201.213 port 35098 [preauth]
Jan  6 07:14:32 web sshd[25087]: Invalid user openhabian from 171.212.201.213 port 35397
Jan  6 07:14:33 web sshd[25087]: Connection closed by 171.212.201.213 port 35397 [preauth]
Jan  6 07:14:35 web sshd[25096]: Invalid user nexthink from 171.212.201.213 port 35693
Jan  6 07:14:35 web sshd[25096]: Connection closed by 171.212.201.213 port 35693 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.212.201.213
2020-01-12 05:27:14
103.89.176.73 attackspam
Jan 11 16:05:20 ny01 sshd[13705]: Failed password for root from 103.89.176.73 port 40250 ssh2
Jan 11 16:08:31 ny01 sshd[13969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.73
Jan 11 16:08:33 ny01 sshd[13969]: Failed password for invalid user mbq from 103.89.176.73 port 36128 ssh2
2020-01-12 05:13:47
51.83.69.200 attack
2020-01-11T21:01:40.621127abusebot-8.cloudsearch.cf sshd[1348]: Invalid user mp from 51.83.69.200 port 44018
2020-01-11T21:01:40.627984abusebot-8.cloudsearch.cf sshd[1348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-83-69.eu
2020-01-11T21:01:40.621127abusebot-8.cloudsearch.cf sshd[1348]: Invalid user mp from 51.83.69.200 port 44018
2020-01-11T21:01:42.383840abusebot-8.cloudsearch.cf sshd[1348]: Failed password for invalid user mp from 51.83.69.200 port 44018 ssh2
2020-01-11T21:08:13.156919abusebot-8.cloudsearch.cf sshd[2246]: Invalid user mike from 51.83.69.200 port 37214
2020-01-11T21:08:13.165092abusebot-8.cloudsearch.cf sshd[2246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-83-69.eu
2020-01-11T21:08:13.156919abusebot-8.cloudsearch.cf sshd[2246]: Invalid user mike from 51.83.69.200 port 37214
2020-01-11T21:08:15.873983abusebot-8.cloudsearch.cf sshd[2246]: Failed password for 
...
2020-01-12 05:29:40
180.246.38.94 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:32:23
42.112.16.152 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:20:01
61.154.197.245 attackbotsspam
2020-01-11 15:07:35 dovecot_login authenticator failed for (gxvxt) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
2020-01-11 15:07:42 dovecot_login authenticator failed for (gslcm) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
2020-01-11 15:07:54 dovecot_login authenticator failed for (mfefr) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
...
2020-01-12 05:49:16
119.246.50.62 attack
Honeypot attack, port: 5555, PTR: 119246050062.ctinets.com.
2020-01-12 05:47:34
123.180.71.51 attackspam
2020-01-11 15:08:02 dovecot_login authenticator failed for (vlnpo) [123.180.71.51]:57018 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yanghao@lerctr.org)
2020-01-11 15:08:09 dovecot_login authenticator failed for (txvlk) [123.180.71.51]:57018 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yanghao@lerctr.org)
2020-01-11 15:08:20 dovecot_login authenticator failed for (hsver) [123.180.71.51]:57018 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yanghao@lerctr.org)
...
2020-01-12 05:25:36
195.225.108.247 attack
Tries to login WordPress (wp-login.php)
2020-01-12 05:36:38
164.138.165.12 attack
B: Magento admin pass /admin/ test (wrong country)
2020-01-12 05:23:20
118.27.15.188 attack
invalid user
2020-01-12 05:39:11
104.168.88.28 attackspambots
Jan 11 11:02:17 kapalua sshd\[23415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.88.28  user=root
Jan 11 11:02:19 kapalua sshd\[23415\]: Failed password for root from 104.168.88.28 port 37587 ssh2
Jan 11 11:05:12 kapalua sshd\[23791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.88.28  user=root
Jan 11 11:05:13 kapalua sshd\[23791\]: Failed password for root from 104.168.88.28 port 46444 ssh2
Jan 11 11:08:22 kapalua sshd\[24051\]: Invalid user office from 104.168.88.28
Jan 11 11:08:22 kapalua sshd\[24051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.88.28
2020-01-12 05:23:51

Recently Reported IPs

0.91.14.147 0.92.235.2 1.50.109.196 1.5.130.37
1.45.228.242 1.42.184.7 1.39.245.33 1.34.31.26
1.34.40.165 1.34.208.215 149.165.224.157 1.174.22.20
1.174.66.95 1.174.1.127 1.174.119.195 1.173.245.200
1.173.216.193 1.173.121.135 1.173.11.147 1.172.217.25