Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.122.175.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.122.175.49.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:43:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 49.175.122.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.175.122.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.125.149.197 attackbots
Invalid user james from 164.125.149.197 port 47784
2020-05-26 03:55:02
106.54.19.67 attackbots
SSH Brute-Forcing (server2)
2020-05-26 04:14:21
86.186.200.247 attack
Invalid user admin from 86.186.200.247 port 33696
2020-05-26 04:19:52
134.175.54.154 attack
Invalid user webusers from 134.175.54.154 port 43778
2020-05-26 04:01:45
159.203.189.152 attack
Invalid user url from 159.203.189.152 port 39916
2020-05-26 03:56:32
162.243.237.90 attackbotsspam
*Port Scan* detected from 162.243.237.90 (US/United States/New York/New York/-). 4 hits in the last 196 seconds
2020-05-26 03:55:55
106.13.126.15 attackspam
May 25 19:26:23 odroid64 sshd\[14723\]: Invalid user before from 106.13.126.15
May 25 19:26:23 odroid64 sshd\[14723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15
...
2020-05-26 04:16:00
109.116.41.238 attack
2020-05-25T19:46:23.577028shield sshd\[8884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.238  user=root
2020-05-25T19:46:25.610995shield sshd\[8884\]: Failed password for root from 109.116.41.238 port 33254 ssh2
2020-05-25T19:48:57.650562shield sshd\[9421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.238  user=games
2020-05-25T19:48:59.823876shield sshd\[9421\]: Failed password for games from 109.116.41.238 port 47772 ssh2
2020-05-25T19:51:26.321464shield sshd\[10423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.238  user=root
2020-05-26 04:11:37
106.250.131.11 attack
$f2bV_matches
2020-05-26 04:11:57
148.70.191.149 attackspam
May 25 16:35:22 163-172-32-151 sshd[24064]: Invalid user ervisor from 148.70.191.149 port 45294
...
2020-05-26 03:58:03
180.76.172.227 attackspambots
 TCP (SYN) 180.76.172.227:54452 -> port 11473, len 44
2020-05-26 03:51:36
79.120.193.211 attack
May 25 15:53:11 eventyay sshd[28271]: Failed password for root from 79.120.193.211 port 26155 ssh2
May 25 15:57:14 eventyay sshd[28412]: Failed password for root from 79.120.193.211 port 8054 ssh2
...
2020-05-26 04:20:50
104.128.90.118 attack
Invalid user sex from 104.128.90.118 port 41160
2020-05-26 04:17:15
122.51.86.120 attackbots
Invalid user eisenhut from 122.51.86.120 port 33082
2020-05-26 04:06:51
139.155.86.144 attackspam
Invalid user mtch from 139.155.86.144 port 48740
2020-05-26 04:00:12

Recently Reported IPs

149.6.56.178 204.71.98.232 143.173.163.229 181.129.33.205
136.120.17.83 53.188.160.190 228.253.177.254 133.135.221.191
61.199.27.20 104.5.139.55 159.53.249.224 100.222.156.6
156.27.75.155 233.44.94.73 196.110.101.161 201.247.203.182
156.59.166.45 18.26.79.115 235.213.29.155 27.128.77.179