Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.120.75.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.120.75.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 241 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:50:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
166.75.120.149.in-addr.arpa domain name pointer 149-120.75-166.ne.fiberfirstdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.75.120.149.in-addr.arpa	name = 149-120.75-166.ne.fiberfirstdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.109.167.20 attack
Unauthorized connection attempt detected from IP address 150.109.167.20 to port 6000 [J]
2020-01-05 03:11:54
36.108.151.51 attack
Unauthorized connection attempt detected from IP address 36.108.151.51 to port 80 [J]
2020-01-05 03:21:23
154.83.195.226 attackbotsspam
Unauthorized connection attempt detected from IP address 154.83.195.226 to port 80 [T]
2020-01-05 03:45:47
124.227.201.214 attack
Unauthorized connection attempt detected from IP address 124.227.201.214 to port 3389 [J]
2020-01-05 03:29:42
61.219.17.4 attack
Unauthorized connection attempt detected from IP address 61.219.17.4 to port 445 [J]
2020-01-05 03:35:26
182.47.91.65 attack
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-05 03:43:58
180.68.187.168 attack
Unauthorized connection attempt detected from IP address 180.68.187.168 to port 23 [J]
2020-01-05 03:44:34
118.25.11.204 attackbots
SSH invalid-user multiple login try
2020-01-05 03:14:17
94.204.221.64 attackspambots
Unauthorized connection attempt detected from IP address 94.204.221.64 to port 5555 [J]
2020-01-05 03:32:07
88.20.240.208 attackspam
Unauthorized connection attempt detected from IP address 88.20.240.208 to port 81 [J]
2020-01-05 03:16:05
106.13.102.73 attack
Unauthorized connection attempt detected from IP address 106.13.102.73 to port 2220 [J]
2020-01-05 03:14:46
106.12.209.38 attackbots
Unauthorized connection attempt detected from IP address 106.12.209.38 to port 2220 [J]
2020-01-05 03:15:01
136.25.25.201 attackspambots
Jan  4 19:58:17 server sshd\[26296\]: Invalid user tn from 136.25.25.201
Jan  4 19:58:17 server sshd\[26296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.25.25.136.in-addr.arpa 
Jan  4 19:58:20 server sshd\[26296\]: Failed password for invalid user tn from 136.25.25.201 port 45558 ssh2
Jan  4 20:46:34 server sshd\[5104\]: Invalid user ofm from 136.25.25.201
Jan  4 20:46:34 server sshd\[5104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.25.25.136.in-addr.arpa 
...
2020-01-05 03:12:18
41.164.23.42 attackspam
Unauthorized connection attempt detected from IP address 41.164.23.42 to port 8080 [J]
2020-01-05 03:39:18
223.4.70.106 attack
Unauthorized connection attempt detected from IP address 223.4.70.106 to port 2220 [J]
2020-01-05 03:22:25

Recently Reported IPs

196.138.172.181 65.219.80.147 28.71.93.161 159.244.16.254
140.254.172.28 230.199.76.147 67.238.58.32 128.194.147.49
233.134.82.71 70.169.2.86 115.182.250.129 34.106.20.255
166.109.80.209 115.36.113.174 189.219.126.40 235.136.122.84
22.35.23.98 255.150.15.234 199.249.132.176 8.205.36.81