Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.147.104.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.147.104.166.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:44:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
166.104.147.166.in-addr.arpa domain name pointer schmspsrvz2ts424-dmz.mycingular.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.104.147.166.in-addr.arpa	name = schmspsrvz2ts424-dmz.mycingular.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.229.197.81 attackspam
Apr 20 14:00:51 sso sshd[6501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.197.81
Apr 20 14:00:53 sso sshd[6501]: Failed password for invalid user home from 221.229.197.81 port 9224 ssh2
...
2020-04-20 20:03:05
178.80.154.10 attackspam
Automatic report - SSH Brute-Force Attack
2020-04-20 20:16:06
103.84.63.5 attackspam
$f2bV_matches
2020-04-20 19:41:30
106.12.93.25 attack
Apr 20 01:12:18 web1 sshd\[304\]: Invalid user ubuntu from 106.12.93.25
Apr 20 01:12:18 web1 sshd\[304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25
Apr 20 01:12:21 web1 sshd\[304\]: Failed password for invalid user ubuntu from 106.12.93.25 port 40442 ssh2
Apr 20 01:17:35 web1 sshd\[869\]: Invalid user postgres from 106.12.93.25
Apr 20 01:17:35 web1 sshd\[869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25
2020-04-20 19:49:00
112.3.30.18 attackbotsspam
sshd jail - ssh hack attempt
2020-04-20 19:53:35
107.174.20.91 attack
(sshd) Failed SSH login from 107.174.20.91 (US/United States/New York/Buffalo/91-20-174-107.reverse-dns/[AS20278 Nexeon Technologies, Inc.]): 1 in the last 3600 secs
2020-04-20 19:54:17
103.81.156.10 attackspam
Apr 20 06:03:02 MainVPS sshd[17850]: Invalid user nt from 103.81.156.10 port 59418
Apr 20 06:03:02 MainVPS sshd[17850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.10
Apr 20 06:03:02 MainVPS sshd[17850]: Invalid user nt from 103.81.156.10 port 59418
Apr 20 06:03:04 MainVPS sshd[17850]: Failed password for invalid user nt from 103.81.156.10 port 59418 ssh2
Apr 20 06:07:15 MainVPS sshd[21565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.10  user=root
Apr 20 06:07:16 MainVPS sshd[21565]: Failed password for root from 103.81.156.10 port 34268 ssh2
...
2020-04-20 19:53:49
36.155.115.95 attackspam
ssh brute force
2020-04-20 19:41:53
115.159.214.247 attack
$f2bV_matches
2020-04-20 19:43:35
77.107.41.216 attack
Unauthorized connection attempt detected from IP address 77.107.41.216 to port 23
2020-04-20 19:53:22
221.1.177.2 attack
Automatic report - Banned IP Access
2020-04-20 19:56:07
152.67.55.22 attackspam
Invalid user uftp from 152.67.55.22 port 40969
2020-04-20 20:19:18
198.245.50.81 attackspambots
Apr 20 12:38:26 v22018086721571380 sshd[26966]: Failed password for invalid user dk from 198.245.50.81 port 48174 ssh2
Apr 20 12:42:36 v22018086721571380 sshd[32334]: Failed password for invalid user ubuntu from 198.245.50.81 port 37020 ssh2
2020-04-20 19:51:01
180.76.103.63 attackbotsspam
Invalid user virtualuser from 180.76.103.63 port 46760
2020-04-20 20:14:56
194.58.97.245 attackbotsspam
Invalid user test3 from 194.58.97.245 port 55418
2020-04-20 20:10:29

Recently Reported IPs

158.103.201.218 114.68.174.73 175.182.215.250 109.198.32.41
24.201.59.64 93.37.90.22 18.115.197.81 236.107.252.117
193.173.106.232 116.193.4.156 133.56.143.117 252.208.182.106
20.215.214.216 163.80.107.243 138.239.200.141 83.105.135.63
190.75.148.45 38.243.113.156 157.26.1.33 156.201.68.198