Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: Cellco Partnership DBA Verizon Wireless

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.148.82.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15927
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.148.82.126.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 16 03:54:15 CST 2019
;; MSG SIZE  rcvd: 118
Host info
126.82.148.166.in-addr.arpa domain name pointer 126.sub-166-148-82.myvzw.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
126.82.148.166.in-addr.arpa	name = 126.sub-166-148-82.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.74.151.130 attack
Honeypot attack, port: 445, PTR: mail.alturoto.com.
2020-06-23 03:49:53
134.209.178.175 attackspam
Jun 22 20:32:39 vpn01 sshd[10804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.178.175
Jun 22 20:32:41 vpn01 sshd[10804]: Failed password for invalid user katrina from 134.209.178.175 port 35970 ssh2
...
2020-06-23 03:31:38
112.85.42.200 attackspam
Jun 22 21:01:42 home sshd[6600]: Failed password for root from 112.85.42.200 port 34691 ssh2
Jun 22 21:01:54 home sshd[6600]: error: maximum authentication attempts exceeded for root from 112.85.42.200 port 34691 ssh2 [preauth]
Jun 22 21:02:04 home sshd[6636]: Failed password for root from 112.85.42.200 port 2033 ssh2
...
2020-06-23 03:17:14
45.183.2.70 attackbotsspam
20/6/22@10:15:41: FAIL: Alarm-Network address from=45.183.2.70
...
2020-06-23 03:17:49
81.1.241.11 attack
Unauthorized connection attempt from IP address 81.1.241.11 on Port 445(SMB)
2020-06-23 03:43:25
93.81.196.12 attackbots
Mon Jun 22 15:01:17 2020 [pid 17531] [admin] FAIL LOGIN: Client "93.81.196.12"
Mon Jun 22 15:01:21 2020 [pid 17535] [admin] FAIL LOGIN: Client "93.81.196.12"
Mon Jun 22 15:01:24 2020 [pid 17540] [admin] FAIL LOGIN: Client "93.81.196.12"
Mon Jun 22 15:01:28 2020 [pid 17544] [admin] FAIL LOGIN: Client "93.81.196.12"
Mon Jun 22 15:01:32 2020 [pid 17548] [admin] FAIL LOGIN: Client "93.81.196.12"
...
2020-06-23 03:17:32
41.33.26.250 attackbots
Unauthorized connection attempt from IP address 41.33.26.250 on Port 445(SMB)
2020-06-23 03:49:23
200.59.10.42 attackbotsspam
Honeypot attack, port: 445, PTR: host042.200-59-10.cotelcam.net.ar.
2020-06-23 03:41:28
49.207.133.194 attackspambots
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-06-23 03:43:58
14.160.54.170 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-06-23 03:33:52
116.98.244.11 attackspam
Unauthorized connection attempt from IP address 116.98.244.11 on Port 445(SMB)
2020-06-23 03:26:26
175.138.241.242 attack
Unauthorized IMAP connection attempt
2020-06-23 03:47:32
31.125.100.24 attackspam
Bruteforce detected by fail2ban
2020-06-23 03:12:12
132.145.127.69 attack
Bruteforce detected by fail2ban
2020-06-23 03:32:27
49.232.27.254 attackspam
Jun 22 15:12:49 vps687878 sshd\[25398\]: Failed password for invalid user ericsson from 49.232.27.254 port 42676 ssh2
Jun 22 15:15:56 vps687878 sshd\[25622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254  user=root
Jun 22 15:15:58 vps687878 sshd\[25622\]: Failed password for root from 49.232.27.254 port 47902 ssh2
Jun 22 15:17:31 vps687878 sshd\[25870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.27.254  user=root
Jun 22 15:17:33 vps687878 sshd\[25870\]: Failed password for root from 49.232.27.254 port 36404 ssh2
...
2020-06-23 03:09:32

Recently Reported IPs

185.171.73.86 73.20.171.12 187.106.68.39 211.237.241.159
55.60.14.224 210.195.67.123 88.85.110.83 46.139.45.23
168.206.122.5 143.14.18.160 218.61.37.141 3.131.211.55
214.147.38.149 143.65.126.53 106.230.110.73 46.215.167.196
112.126.243.23 119.192.143.86 18.29.240.245 53.177.38.164