Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Washington

Region: Oklahoma

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.113.92.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.113.92.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:02:40 CST 2025
;; MSG SIZE  rcvd: 107
Host info
149.92.113.166.in-addr.arpa domain name pointer ip-166-113-92-149.static.oecfiber.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.92.113.166.in-addr.arpa	name = ip-166-113-92-149.static.oecfiber.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.130 attack
$f2bV_matches_ltvn
2019-12-04 03:40:29
66.70.189.93 attackspambots
Dec  3 16:32:58 vps666546 sshd\[12703\]: Invalid user shomita from 66.70.189.93 port 35098
Dec  3 16:32:58 vps666546 sshd\[12703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.93
Dec  3 16:33:00 vps666546 sshd\[12703\]: Failed password for invalid user shomita from 66.70.189.93 port 35098 ssh2
Dec  3 16:38:52 vps666546 sshd\[12889\]: Invalid user breton123 from 66.70.189.93 port 47256
Dec  3 16:38:52 vps666546 sshd\[12889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.93
...
2019-12-04 04:14:13
69.75.91.250 attack
Dec  3 15:25:16 dev postfix/smtpd\[11413\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Dec  3 15:25:17 dev postfix/smtpd\[11413\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Dec  3 15:25:18 dev postfix/smtpd\[11413\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Dec  3 15:25:18 dev postfix/smtpd\[11413\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
Dec  3 15:25:19 dev postfix/smtpd\[11413\]: warning: rrcs-69-75-91-250.west.biz.rr.com\[69.75.91.250\]: SASL LOGIN authentication failed: authentication failure
2019-12-04 04:08:57
137.99.47.234 attackspam
" "
2019-12-04 04:04:37
45.40.194.129 attack
Failed password for root from 45.40.194.129 port 51458 ssh2
2019-12-04 04:00:29
46.21.195.67 attack
Port 1433 Scan
2019-12-04 03:59:47
1.55.145.15 attack
Dec  3 20:40:22 server sshd\[13177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.145.15  user=uucp
Dec  3 20:40:25 server sshd\[13177\]: Failed password for uucp from 1.55.145.15 port 48500 ssh2
Dec  3 20:53:00 server sshd\[17305\]: Invalid user backup from 1.55.145.15
Dec  3 20:53:00 server sshd\[17305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.145.15 
Dec  3 20:53:02 server sshd\[17305\]: Failed password for invalid user backup from 1.55.145.15 port 55634 ssh2
...
2019-12-04 03:59:14
43.243.128.213 attack
Dec  3 20:37:46 MK-Soft-VM4 sshd[9797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.128.213 
Dec  3 20:37:49 MK-Soft-VM4 sshd[9797]: Failed password for invalid user xxxxxxx from 43.243.128.213 port 57870 ssh2
...
2019-12-04 03:48:14
113.31.112.11 attack
no
2019-12-04 03:40:04
177.92.16.186 attackbots
Dec  3 18:40:47 sso sshd[26192]: Failed password for root from 177.92.16.186 port 52449 ssh2
Dec  3 18:48:17 sso sshd[27182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
...
2019-12-04 04:06:12
124.205.224.179 attackspam
Dec  3 16:52:56 *** sshd[7725]: Failed password for invalid user www from 124.205.224.179 port 35515 ssh2
Dec  3 17:33:42 *** sshd[8340]: Failed password for invalid user daughtrey from 124.205.224.179 port 38809 ssh2
Dec  3 18:08:05 *** sshd[8936]: Failed password for invalid user bockus from 124.205.224.179 port 58245 ssh2
Dec  3 18:14:46 *** sshd[9062]: Failed password for invalid user emerine from 124.205.224.179 port 56484 ssh2
Dec  3 18:21:43 *** sshd[9180]: Failed password for invalid user tweidner from 124.205.224.179 port 54724 ssh2
Dec  3 18:28:34 *** sshd[9303]: Failed password for invalid user web from 124.205.224.179 port 52961 ssh2
Dec  3 18:50:15 *** sshd[9692]: Failed password for invalid user wwwadmin from 124.205.224.179 port 47648 ssh2
Dec  3 18:57:33 *** sshd[9784]: Failed password for invalid user taraschuk from 124.205.224.179 port 45823 ssh2
Dec  3 19:12:37 *** sshd[10102]: Failed password for invalid user lynea from 124.205.224.179 port 42169 ssh2
Dec  3 19:20:06 *** sshd[10198]: Faile
2019-12-04 04:04:12
177.191.167.68 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-04 04:05:33
193.188.22.188 attackspambots
2019-12-03T19:37:46.940012abusebot-7.cloudsearch.cf sshd\[5253\]: Invalid user media from 193.188.22.188 port 23984
2019-12-04 03:49:27
49.212.88.88 attack
Automatic report - XMLRPC Attack
2019-12-04 03:40:55
207.180.254.181 attackbots
Dec  3 20:25:10 dedicated sshd[26278]: Invalid user toto from 207.180.254.181 port 40794
2019-12-04 03:43:39

Recently Reported IPs

15.7.72.208 22.177.107.246 179.141.56.84 184.155.248.216
167.254.35.208 241.141.59.211 37.90.19.207 223.29.167.80
165.179.85.7 13.85.165.25 19.253.109.126 89.208.41.16
196.12.212.117 54.59.82.50 175.249.67.3 161.141.125.120
63.184.98.94 154.248.25.101 133.243.44.128 19.241.176.191