Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.100.241.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.100.241.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:49:42 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.241.100.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.100.241.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.30.240.121 attackbotsspam
Jul 24 00:28:07 microserver sshd[51301]: Invalid user leonidas from 123.30.240.121 port 35994
Jul 24 00:28:07 microserver sshd[51301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.121
Jul 24 00:28:08 microserver sshd[51301]: Failed password for invalid user leonidas from 123.30.240.121 port 35994 ssh2
Jul 24 00:36:00 microserver sshd[53291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.121  user=root
Jul 24 00:36:01 microserver sshd[53291]: Failed password for root from 123.30.240.121 port 35564 ssh2
Jul 24 00:47:42 microserver sshd[56011]: Invalid user rodriguez from 123.30.240.121 port 49031
Jul 24 00:47:42 microserver sshd[56011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.121
Jul 24 00:47:43 microserver sshd[56011]: Failed password for invalid user rodriguez from 123.30.240.121 port 49031 ssh2
Jul 24 00:55:15 microserver sshd[58294]: Invalid us
2019-07-24 08:03:13
24.221.18.234 attack
Jul 23 22:16:44 s64-1 sshd[6423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.221.18.234
Jul 23 22:16:44 s64-1 sshd[6425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.221.18.234
Jul 23 22:16:46 s64-1 sshd[6423]: Failed password for invalid user pi from 24.221.18.234 port 57002 ssh2
...
2019-07-24 07:53:06
185.36.102.203 attack
[munged]::443 185.36.102.203 - - [24/Jul/2019:01:05:08 +0200] "POST /[munged]: HTTP/1.1" 200 9118 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-24 08:04:50
14.186.223.82 attackspam
Brute force attempt
2019-07-24 07:33:30
117.95.183.12 attack
" "
2019-07-24 07:34:28
210.92.91.208 attack
Brute force attempt
2019-07-24 07:35:20
219.128.20.71 attackspam
Jul 23 11:44:26 hgb10301 sshd[25004]: Bad protocol version identification '' from 219.128.20.71 port 42894
Jul 23 11:44:28 hgb10301 sshd[25005]: Invalid user support from 219.128.20.71 port 43024
Jul 23 11:44:29 hgb10301 sshd[25005]: Failed password for invalid user support from 219.128.20.71 port 43024 ssh2
Jul 23 11:44:30 hgb10301 sshd[25005]: Connection closed by 219.128.20.71 port 43024 [preauth]
Jul 23 11:44:31 hgb10301 sshd[25007]: Invalid user netscreen from 219.128.20.71 port 43835
Jul 23 11:44:33 hgb10301 sshd[25007]: Failed password for invalid user netscreen from 219.128.20.71 port 43835 ssh2
Jul 23 11:44:34 hgb10301 sshd[25007]: Connection closed by 219.128.20.71 port 43835 [preauth]
Jul 23 11:44:35 hgb10301 sshd[25009]: Invalid user nexthink from 219.128.20.71 port 44779
Jul 23 11:44:37 hgb10301 sshd[25009]: Failed password for invalid user nexthink from 219.128.20.71 port 44779 ssh2
Jul 23 11:44:37 hgb10301 sshd[25009]: Connection closed by 219.128.20.71 p........
-------------------------------
2019-07-24 07:35:03
123.206.21.48 attackbotsspam
SSH Bruteforce Attack
2019-07-24 07:21:59
209.97.182.100 attackbotsspam
Jul 24 00:15:08 debian sshd\[8360\]: Invalid user download from 209.97.182.100 port 48278
Jul 24 00:15:08 debian sshd\[8360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.182.100
...
2019-07-24 07:30:06
189.63.83.112 attackbotsspam
Tue, 23 Jul 2019 20:17:17 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-24 07:37:05
67.205.140.232 attack
WordPress brute force
2019-07-24 07:51:19
58.177.171.112 attackspam
Jul 23 23:45:16 MK-Soft-VM4 sshd\[5873\]: Invalid user del from 58.177.171.112 port 49096
Jul 23 23:45:16 MK-Soft-VM4 sshd\[5873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.177.171.112
Jul 23 23:45:17 MK-Soft-VM4 sshd\[5873\]: Failed password for invalid user del from 58.177.171.112 port 49096 ssh2
...
2019-07-24 08:02:04
188.254.38.186 attackbots
Automatic report - Banned IP Access
2019-07-24 07:25:06
92.118.160.53 attack
Honeypot attack, port: 445, PTR: 92.118.160.53.netsystemsresearch.com.
2019-07-24 07:44:30
185.173.35.37 attackspam
Honeypot attack, port: 139, PTR: 185.173.35.37.netsystemsresearch.com.
2019-07-24 07:31:51

Recently Reported IPs

241.144.28.161 198.164.142.148 44.52.178.147 198.212.80.17
23.10.175.8 170.115.29.40 232.253.252.76 51.140.175.170
229.102.218.187 150.154.69.24 150.220.99.33 4.255.154.218
154.57.23.16 137.252.228.26 2.61.126.4 171.41.18.112
145.194.173.164 51.198.252.180 22.93.99.118 58.86.240.43