Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.104.112.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.104.112.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:07:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 73.112.104.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.112.104.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.4.150 attackbotsspam
Automatic report - Banned IP Access
2019-08-02 07:18:30
5.196.69.70 attackspam
Aug  2 00:02:23 MK-Soft-Root1 sshd\[7943\]: Invalid user cent from 5.196.69.70 port 38710
Aug  2 00:02:23 MK-Soft-Root1 sshd\[7943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.69.70
Aug  2 00:02:25 MK-Soft-Root1 sshd\[7943\]: Failed password for invalid user cent from 5.196.69.70 port 38710 ssh2
...
2019-08-02 06:58:27
49.83.118.144 attack
Aug  1 08:47:47 hurricane sshd[7674]: Bad protocol version identification '' from 49.83.118.144 port 46407
Aug  1 08:47:49 hurricane sshd[7675]: Invalid user pi from 49.83.118.144 port 46613
Aug  1 08:47:49 hurricane sshd[7675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.118.144
Aug  1 08:47:51 hurricane sshd[7675]: Failed password for invalid user pi from 49.83.118.144 port 46613 ssh2
Aug  1 08:47:52 hurricane sshd[7675]: Connection closed by 49.83.118.144 port 46613 [preauth]
Aug  1 08:47:54 hurricane sshd[7677]: Invalid user pi from 49.83.118.144 port 47188
Aug  1 08:47:54 hurricane sshd[7677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.118.144


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.118.144
2019-08-02 07:23:28
112.85.42.194 attack
Aug  2 01:28:12 dcd-gentoo sshd[11550]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  2 01:28:12 dcd-gentoo sshd[11550]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  2 01:28:15 dcd-gentoo sshd[11550]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug  2 01:28:12 dcd-gentoo sshd[11550]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  2 01:28:15 dcd-gentoo sshd[11550]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug  2 01:28:15 dcd-gentoo sshd[11550]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.194 port 12017 ssh2
...
2019-08-02 07:35:04
201.250.80.49 attackbots
Telnet Server BruteForce Attack
2019-08-02 07:04:36
210.92.37.181 attackspambots
Aug  2 00:49:31 SilenceServices sshd[18606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.37.181
Aug  2 00:49:33 SilenceServices sshd[18606]: Failed password for invalid user pussy from 210.92.37.181 port 43292 ssh2
Aug  2 00:54:39 SilenceServices sshd[22797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.37.181
2019-08-02 07:03:03
185.220.101.1 attackbotsspam
Aug  2 01:27:59 ns341937 sshd[4392]: Failed password for root from 185.220.101.1 port 46651 ssh2
Aug  2 01:28:02 ns341937 sshd[4392]: Failed password for root from 185.220.101.1 port 46651 ssh2
Aug  2 01:28:05 ns341937 sshd[4392]: Failed password for root from 185.220.101.1 port 46651 ssh2
Aug  2 01:28:07 ns341937 sshd[4392]: Failed password for root from 185.220.101.1 port 46651 ssh2
...
2019-08-02 07:37:56
103.90.64.223 attack
8291/tcp
2019-08-02 07:16:33
14.115.104.89 attackbotsspam
Telnet Server BruteForce Attack
2019-08-02 07:01:28
164.132.209.242 attackbots
Aug  1 23:13:01 localhost sshd[21946]: Invalid user zk from 164.132.209.242 port 39088
Aug  1 23:13:01 localhost sshd[21946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.209.242
Aug  1 23:13:01 localhost sshd[21946]: Invalid user zk from 164.132.209.242 port 39088
Aug  1 23:13:02 localhost sshd[21946]: Failed password for invalid user zk from 164.132.209.242 port 39088 ssh2
...
2019-08-02 07:08:09
222.186.30.235 attackbotsspam
2019-08-01T23:28:07.282700abusebot-3.cloudsearch.cf sshd\[29617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.235  user=root
2019-08-02 07:36:55
104.131.29.92 attackspam
2019-08-01T15:49:37.126114abusebot.cloudsearch.cf sshd\[16934\]: Invalid user osmc from 104.131.29.92 port 56760
2019-08-02 06:54:25
105.73.80.253 attackbots
2019-08-01T16:27:11.395078abusebot-2.cloudsearch.cf sshd\[19220\]: Invalid user kon from 105.73.80.253 port 14915
2019-08-02 07:24:49
46.105.115.15 attack
blogonese.net 46.105.115.15 \[01/Aug/2019:23:52:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 46.105.115.15 \[01/Aug/2019:23:53:00 +0200\] "POST /wp-login.php HTTP/1.1" 200 5770 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-02 07:07:41
163.172.192.210 attackbotsspam
\[2019-08-01 18:45:23\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-01T18:45:23.942-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801011972592277524",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/53171",ACLName="no_extension_match"
\[2019-08-01 18:48:19\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-01T18:48:19.317-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901011972592277524",SessionID="0x7ff4d00cdaf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/54799",ACLName="no_extension_match"
\[2019-08-01 18:51:14\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-01T18:51:14.579-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1001011972592277524",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.192.210/51799"
2019-08-02 06:54:40

Recently Reported IPs

249.57.227.14 150.157.167.142 188.132.211.100 145.238.64.186
213.185.21.164 70.104.56.59 220.62.62.180 98.17.213.46
7.148.44.117 250.148.224.129 96.59.220.27 109.192.53.229
53.10.53.221 133.43.5.136 57.164.245.252 207.158.97.195
199.137.181.79 31.37.185.94 65.16.83.219 235.78.17.2