Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.166.130.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.166.130.149.		IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024020800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 09 00:55:32 CST 2024
;; MSG SIZE  rcvd: 108
Host info
149.130.166.111.in-addr.arpa domain name pointer dns149.online.tj.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.130.166.111.in-addr.arpa	name = dns149.online.tj.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.14.171.86 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 22:32:36,066 INFO [amun_request_handler] PortScan Detected on Port: 445 (212.14.171.86)
2019-07-26 14:30:13
120.132.114.179 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-26 14:54:16
148.101.201.140 attackspambots
445/tcp 445/tcp
[2019-07-23/24]2pkt
2019-07-26 14:45:33
186.67.137.90 attackspambots
Invalid user zabbix from 186.67.137.90 port 42866
2019-07-26 14:10:42
61.49.147.171 attackspam
33300/tcp 33300/tcp 33300/tcp...
[2019-07-23/24]6pkt,1pt.(tcp)
2019-07-26 14:52:30
111.93.191.38 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 11:17:51,119 INFO [shellcode_manager] (111.93.191.38) no match, writing hexdump (5990481db4c7287451835e202ac716b6 :2372171) - MS17010 (EternalBlue)
2019-07-26 14:27:00
121.190.197.205 attackbots
Invalid user postgres from 121.190.197.205 port 51415
2019-07-26 14:25:57
125.94.40.8 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-26 14:58:08
123.4.66.142 attackspambots
23/tcp 23/tcp
[2019-07-23/25]2pkt
2019-07-26 15:05:43
212.156.136.114 attack
Jul 26 07:55:03 eventyay sshd[11815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.136.114
Jul 26 07:55:06 eventyay sshd[11815]: Failed password for invalid user daniel from 212.156.136.114 port 5335 ssh2
Jul 26 07:59:43 eventyay sshd[13151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.136.114
...
2019-07-26 14:10:07
183.153.75.176 attackspambots
23/tcp 60001/tcp
[2019-07-23/24]2pkt
2019-07-26 14:47:27
188.165.55.33 attackbots
Jul 26 02:38:49 plusreed sshd[11330]: Invalid user sf from 188.165.55.33
...
2019-07-26 14:47:03
118.24.221.190 attack
Jul 26 02:16:57 xtremcommunity sshd\[16098\]: Invalid user cecilia from 118.24.221.190 port 58780
Jul 26 02:16:57 xtremcommunity sshd\[16098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.221.190
Jul 26 02:16:58 xtremcommunity sshd\[16098\]: Failed password for invalid user cecilia from 118.24.221.190 port 58780 ssh2
Jul 26 02:21:59 xtremcommunity sshd\[16179\]: Invalid user tanya from 118.24.221.190 port 37561
Jul 26 02:21:59 xtremcommunity sshd\[16179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.221.190
...
2019-07-26 14:39:03
60.170.189.178 attackbotsspam
Automatic report - Port Scan Attack
2019-07-26 14:21:16
112.186.77.74 attackspam
2019-07-26T05:27:11.134059abusebot.cloudsearch.cf sshd\[23220\]: Invalid user mysql from 112.186.77.74 port 53412
2019-07-26T05:27:11.138559abusebot.cloudsearch.cf sshd\[23220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.74
2019-07-26 15:01:55

Recently Reported IPs

111.165.54.180 111.166.1.0 111.166.104.93 111.165.92.140
111.165.67.120 111.165.85.110 111.166.191.105 111.165.60.203
111.166.187.129 111.166.227.200 111.165.33.138 111.166.183.213
111.165.206.158 111.165.23.112 111.166.248.183 111.165.220.153
111.165.242.154 111.165.69.104 111.165.237.105 111.165.202.51