Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.62.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.62.166.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 10:40:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 166.62.149.104.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 166.62.149.104.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.154 attack
Nov  9 12:13:38 ny01 sshd[6052]: Failed password for root from 222.186.175.154 port 3280 ssh2
Nov  9 12:13:55 ny01 sshd[6052]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 3280 ssh2 [preauth]
Nov  9 12:14:06 ny01 sshd[6090]: Failed password for root from 222.186.175.154 port 24892 ssh2
2019-11-10 04:38:01
159.89.194.103 attackbots
$f2bV_matches
2019-11-10 04:41:41
212.64.67.116 attackbots
Nov  8 13:45:34 cumulus sshd[31372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116  user=r.r
Nov  8 13:45:35 cumulus sshd[31372]: Failed password for r.r from 212.64.67.116 port 48770 ssh2
Nov  8 13:45:36 cumulus sshd[31372]: Received disconnect from 212.64.67.116 port 48770:11: Bye Bye [preauth]
Nov  8 13:45:36 cumulus sshd[31372]: Disconnected from 212.64.67.116 port 48770 [preauth]
Nov  8 13:56:01 cumulus sshd[31738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116  user=r.r
Nov  8 13:56:03 cumulus sshd[31738]: Failed password for r.r from 212.64.67.116 port 37834 ssh2
Nov  8 13:56:03 cumulus sshd[31738]: Received disconnect from 212.64.67.116 port 37834:11: Bye Bye [preauth]
Nov  8 13:56:03 cumulus sshd[31738]: Disconnected from 212.64.67.116 port 37834 [preauth]
Nov  8 14:00:18 cumulus sshd[31859]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2019-11-10 04:21:40
79.74.90.79 attackspam
TCP Port Scanning
2019-11-10 04:54:15
1.1.230.30 attackbots
Unauthorized connection attempt from IP address 1.1.230.30 on Port 445(SMB)
2019-11-10 04:53:59
178.131.82.230 attackbotsspam
Unauthorized connection attempt from IP address 178.131.82.230 on Port 445(SMB)
2019-11-10 04:46:36
156.96.119.42 attack
1573322835 - 11/09/2019 19:07:15 Host: 156.96.119.42/156.96.119.42 Port: 5060 UDP Blocked
2019-11-10 04:42:52
51.75.32.141 attackbots
Nov  9 14:38:44 Tower sshd[36928]: Connection from 51.75.32.141 port 53198 on 192.168.10.220 port 22
Nov  9 14:38:46 Tower sshd[36928]: Invalid user test2 from 51.75.32.141 port 53198
Nov  9 14:38:46 Tower sshd[36928]: error: Could not get shadow information for NOUSER
Nov  9 14:38:46 Tower sshd[36928]: Failed password for invalid user test2 from 51.75.32.141 port 53198 ssh2
Nov  9 14:38:46 Tower sshd[36928]: Received disconnect from 51.75.32.141 port 53198:11: Bye Bye [preauth]
Nov  9 14:38:46 Tower sshd[36928]: Disconnected from invalid user test2 51.75.32.141 port 53198 [preauth]
2019-11-10 04:48:26
106.13.7.253 attackbots
Nov  9 15:22:54 plusreed sshd[25851]: Invalid user Raino from 106.13.7.253
...
2019-11-10 04:42:22
185.234.217.194 attackspam
Rude login attack (18 tries in 1d)
2019-11-10 04:26:34
118.170.62.203 attack
Unauthorized connection attempt from IP address 118.170.62.203 on Port 445(SMB)
2019-11-10 04:18:23
134.249.155.148 attackspam
Nov  9 21:55:30 ncomp sshd[8892]: Invalid user pi from 134.249.155.148
Nov  9 21:55:30 ncomp sshd[8894]: Invalid user pi from 134.249.155.148
2019-11-10 04:33:51
105.157.171.125 attack
TCP Port Scanning
2019-11-10 04:35:00
200.60.110.114 attackbots
Unauthorized connection attempt from IP address 200.60.110.114 on Port 445(SMB)
2019-11-10 04:23:01
218.92.0.202 attackbots
Nov  9 21:17:25 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
Nov  9 21:17:28 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
...
2019-11-10 04:52:16

Recently Reported IPs

104.149.62.162 104.149.62.144 104.149.62.153 104.149.62.170
104.149.62.156 104.149.62.179 104.149.62.180 104.149.62.177
104.149.62.171 104.149.62.182 104.149.62.174 104.149.62.185
104.149.62.187 104.149.62.173 104.149.62.181 104.149.62.190
104.149.63.130 104.149.63.142 104.149.63.146 104.149.63.131