Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montréal

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.56.160.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.56.160.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120802 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 09 10:30:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
166.160.56.149.in-addr.arpa domain name pointer crawl-149-56-160-166.dataproviderbot.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.160.56.149.in-addr.arpa	name = crawl-149-56-160-166.dataproviderbot.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.27.176.178 attackbots
2020-10-05 08:36:41.553454-0500  localhost screensharingd[93897]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 163.27.176.178 :: Type: VNC DES
2020-10-05 22:14:28
68.183.110.49 attack
frenzy
2020-10-05 22:05:11
103.236.253.28 attackspam
2020-10-05T02:30:14.824882decisionconcepts.com sshd[41651]: Invalid user 29627 from 103.236.253.28 port 37983
2020-10-05T02:30:14.833527decisionconcepts.com sshd[41651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.28
2020-10-05T02:30:14.824882decisionconcepts.com sshd[41651]: Invalid user 29627 from 103.236.253.28 port 37983
2020-10-05T02:30:16.850974decisionconcepts.com sshd[41651]: Failed password for invalid user 29627 from 103.236.253.28 port 37983 ssh2
...
2020-10-05 22:08:29
94.182.222.66 attackspam
1433/tcp
[2020-10-04]1pkt
2020-10-05 21:49:28
45.148.122.102 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-05 22:14:13
45.4.107.96 attackbots
frenzy
2020-10-05 21:52:06
210.245.89.247 attack
Found on   CINS badguys     / proto=6  .  srcport=53269  .  dstport=8443  .     (2274)
2020-10-05 22:01:27
71.66.22.194 attackbotsspam
Automatic report - Banned IP Access
2020-10-05 22:07:11
163.19.200.153 attackspambots
2020-10-05 08:17:20.166199-0500  localhost screensharingd[92286]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 163.19.200.153 :: Type: VNC DES
2020-10-05 22:15:02
78.157.42.59 attackbots
IP 78.157.42.59 attacked honeypot on port: 1433 at 10/5/2020 1:56:50 AM
2020-10-05 22:26:42
85.209.0.103 attack
Automatic report - Banned IP Access
2020-10-05 22:24:22
165.227.169.7 attackspam
Oct  5 13:49:57 localhost sshd\[21135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
Oct  5 13:49:59 localhost sshd\[21135\]: Failed password for root from 165.227.169.7 port 37094 ssh2
Oct  5 13:53:47 localhost sshd\[21588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
Oct  5 13:53:49 localhost sshd\[21588\]: Failed password for root from 165.227.169.7 port 44224 ssh2
Oct  5 13:57:37 localhost sshd\[21908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
...
2020-10-05 21:54:24
211.193.58.225 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-05T10:03:31Z and 2020-10-05T10:10:12Z
2020-10-05 21:50:05
212.70.149.83 attackbots
Rude login attack (2396 tries in 1d)
2020-10-05 22:10:56
123.125.21.125 attack
sshd: Failed password for .... from 123.125.21.125 port 46344 ssh2 (8 attempts)
2020-10-05 22:06:54

Recently Reported IPs

149.56.150.85 74.7.241.154 59.225.190.230 193.24.211.230
91.231.89.245 91.231.89.104 162.216.150.10 103.91.210.121
43.229.185.51 182.91.102.82 123.158.60.208 35.203.210.166
190.80.51.230 10.128.87.163 159.203.134.35 172.174.130.0
172.236.228.73 79.133.41.235 47.250.10.106 43.139.62.161