Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.103.6.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.103.6.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:30:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 166.6.103.149.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 149.103.6.166.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.129.140.89 attack
Automatic report - SSH Brute-Force Attack
2019-11-18 22:59:51
159.65.180.64 attack
Nov 18 15:49:31 lnxmysql61 sshd[5191]: Failed password for backup from 159.65.180.64 port 52452 ssh2
Nov 18 15:52:51 lnxmysql61 sshd[5690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.180.64
Nov 18 15:52:54 lnxmysql61 sshd[5690]: Failed password for invalid user novak from 159.65.180.64 port 60706 ssh2
2019-11-18 22:58:12
1.52.195.7 attackspam
Autoban   1.52.195.7 AUTH/CONNECT
2019-11-18 22:22:28
1.220.145.45 attackbotsspam
Autoban   1.220.145.45 AUTH/CONNECT
2019-11-18 22:35:58
1.186.86.206 attack
Autoban   1.186.86.206 VIRUS
2019-11-18 22:40:52
1.239.66.77 attack
Autoban   1.239.66.77 VIRUS
2019-11-18 22:21:51
1.22.43.240 attackspam
Autoban   1.22.43.240 AUTH/CONNECT
2019-11-18 22:38:27
46.101.174.128 attackbots
Autoban   46.101.174.128 REJECT JAN
2019-11-18 22:51:30
1.186.86.208 attackspam
Autoban   1.186.86.208 VIRUS
2019-11-18 22:39:39
1.186.86.220 attackspam
Autoban   1.186.86.220 VIRUS
2019-11-18 22:37:52
139.59.77.237 attack
Nov 18 09:48:17 TORMINT sshd\[7792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237  user=root
Nov 18 09:48:18 TORMINT sshd\[7792\]: Failed password for root from 139.59.77.237 port 47499 ssh2
Nov 18 09:52:28 TORMINT sshd\[8124\]: Invalid user jacob from 139.59.77.237
Nov 18 09:52:28 TORMINT sshd\[8124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237
...
2019-11-18 22:54:57
112.27.129.78 attack
Autoban   112.27.129.78 ABORTED AUTH
2019-11-18 22:29:38
69.16.221.16 attack
Autoban   69.16.221.16 AUTH/CONNECT
2019-11-18 22:49:44
1.223.248.99 attack
Autoban   1.223.248.99 AUTH/CONNECT
2019-11-18 22:34:28
63.88.23.151 attack
63.88.23.151 was recorded 15 times by 8 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 15, 70, 218
2019-11-18 22:29:59

Recently Reported IPs

181.14.125.71 90.98.150.133 46.8.25.156 236.218.88.10
17.2.195.33 16.96.51.167 148.57.173.15 34.8.232.163
218.115.252.112 4.109.245.238 160.152.163.96 58.213.221.251
241.138.34.175 174.216.66.172 114.218.171.24 205.136.238.82
155.88.239.148 93.105.7.21 5.170.149.22 230.35.90.117