Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Paris

Region: Île-de-France

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.199.166.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.199.166.49.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020122200 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 22 19:11:01 CST 2020
;; MSG SIZE  rcvd: 118

Host info
Host 49.166.199.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.166.199.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.143.158.83 attackspam
unauthorized connection attempt
2020-02-26 17:41:26
212.95.137.51 attack
Invalid user rabbitmq from 212.95.137.51 port 41556
2020-02-26 17:41:08
175.205.62.112 attackspambots
unauthorized connection attempt
2020-02-26 17:23:33
122.11.138.145 attack
unauthorized connection attempt
2020-02-26 17:19:02
193.114.96.144 attackspam
unauthorized connection attempt
2020-02-26 17:53:35
95.239.105.28 attack
unauthorized connection attempt
2020-02-26 17:38:08
210.195.59.7 attackspam
23/tcp 23/tcp
[2020-02-26]2pkt
2020-02-26 17:33:02
77.42.91.114 attackspambots
unauthorized connection attempt
2020-02-26 17:21:23
77.42.125.16 attackspam
unauthorized connection attempt
2020-02-26 17:48:35
186.233.78.60 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=46461)(02261117)
2020-02-26 17:42:13
46.35.248.188 attack
unauthorized connection attempt
2020-02-26 17:49:50
187.188.96.139 attackbots
unauthorized connection attempt
2020-02-26 17:14:40
223.15.13.29 attackspam
unauthorized connection attempt
2020-02-26 17:51:01
185.176.27.14 attack
02/26/2020-01:18:48.376101 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-26 17:34:40
94.191.20.173 attackbotsspam
Feb 26 10:07:13 nextcloud sshd\[14638\]: Invalid user admin from 94.191.20.173
Feb 26 10:07:13 nextcloud sshd\[14638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.173
Feb 26 10:07:15 nextcloud sshd\[14638\]: Failed password for invalid user admin from 94.191.20.173 port 58218 ssh2
2020-02-26 17:20:14

Recently Reported IPs

121.134.233.172 186.179.47.134 157.45.180.247 103.154.240.67
80.18.35.214 83.31.85.21 64.225.46.221 193.123.143.171
45.232.92.207 3.238.254.126 45.190.137.146 45.177.247.99
168.196.104.186 138.204.185.157 77.204.104.245 37.164.160.63
109.12.231.83 187.130.151.21 49.228.99.2 183.83.42.213