Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.149.109.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.149.109.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:07:53 CST 2025
;; MSG SIZE  rcvd: 108
Host info
104.109.149.166.in-addr.arpa domain name pointer 104.sub-166-149-109.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.109.149.166.in-addr.arpa	name = 104.sub-166-149-109.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.17.97.74 attackspambots
IP: 209.17.97.74
ASN: AS174 Cogent Communications
Port: World Wide Web HTTP 80
Found in one or more Blacklists
Date: 22/06/2019 2:59:36 PM UTC
2019-06-23 00:50:32
197.237.242.65 attack
IP: 197.237.242.65
ASN: AS15399 WANANCHI
Port: http protocol over TLS/SSL 443
Found in one or more Blacklists
Date: 22/06/2019 2:44:11 PM UTC
2019-06-23 01:07:38
185.176.27.118 attackbots
22.06.2019 14:44:38 Connection to port 5019 blocked by firewall
2019-06-23 00:47:42
201.160.134.218 attackspambots
IP: 201.160.134.218
ASN: AS28545 Cablemas Telecomunicaciones SA de CV
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 22/06/2019 2:44:17 PM UTC
2019-06-23 01:01:21
116.74.96.84 attack
firewall-block, port(s): 23/tcp
2019-06-23 00:18:38
162.243.136.28 attack
8090/tcp 7199/tcp 143/tcp...
[2019-04-22/06-21]70pkt,49pt.(tcp),9pt.(udp)
2019-06-23 00:25:41
189.164.115.184 attackspam
Jun 22 15:56:43 reporting5 sshd[15588]: reveeclipse mapping checking getaddrinfo for dsl-189-164-115-184-dyn.prod-infinhostnameum.com.mx [189.164.115.184] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 15:56:43 reporting5 sshd[15588]: Invalid user ghostname from 189.164.115.184
Jun 22 15:56:43 reporting5 sshd[15588]: Failed password for invalid user ghostname from 189.164.115.184 port 42218 ssh2
Jun 22 16:08:44 reporting5 sshd[22079]: reveeclipse mapping checking getaddrinfo for dsl-189-164-115-184-dyn.prod-infinhostnameum.com.mx [189.164.115.184] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 16:08:44 reporting5 sshd[22079]: Invalid user daniela from 189.164.115.184
Jun 22 16:08:44 reporting5 sshd[22079]: Failed password for invalid user daniela from 189.164.115.184 port 56218 ssh2
Jun 22 16:14:37 reporting5 sshd[25055]: reveeclipse mapping checking getaddrinfo for dsl-189-164-115-184-dyn.prod-infinhostnameum.com.mx [189.164.115.184] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 ........
-------------------------------
2019-06-23 00:41:55
46.143.211.37 attack
23/tcp
[2019-06-22]1pkt
2019-06-23 01:16:06
223.255.127.63 attackbotsspam
IP: 223.255.127.63
ASN: AS4847 China Networks Inter-Exchange
Port: IMAP over TLS protocol 993
Found in one or more Blacklists
Date: 22/06/2019 2:44:50 PM UTC
2019-06-23 00:31:23
118.24.173.104 attack
2019-06-22T15:15:48.668924abusebot-5.cloudsearch.cf sshd\[7351\]: Invalid user webadmin from 118.24.173.104 port 34719
2019-06-23 01:00:26
31.31.203.201 attack
Jun 22 15:41:44 spelly sshd[29333]: Did not receive identification string from 31.31.203.201
Jun 22 15:44:03 spelly sshd[29334]: Invalid user osm from 31.31.203.201
Jun 22 15:44:05 spelly sshd[29334]: Failed password for invalid user osm from 31.31.203.201 port 48434 ssh2
Jun 22 15:44:05 spelly sshd[29334]: Received disconnect from 31.31.203.201: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 22 15:44:24 spelly sshd[29336]: Invalid user forge from 31.31.203.201
Jun 22 15:44:25 spelly sshd[29336]: Failed password for invalid user forge from 31.31.203.201 port 60324 ssh2
Jun 22 15:44:25 spelly sshd[29336]: Received disconnect from 31.31.203.201: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 22 15:44:44 spelly sshd[29338]: Invalid user dell from 31.31.203.201
Jun 22 15:44:45 spelly sshd[29338]: Failed password for invalid user dell from 31.31.203.201 port 43596 ssh2
Jun 22 15:44:45 spelly sshd[29338]: Received disconnect from 31.31.203.201: 11: Normal ........
-------------------------------
2019-06-23 00:43:40
87.196.21.94 attack
Jun 22 14:45:07 *** sshd[792]: Invalid user appltest from 87.196.21.94
2019-06-23 00:20:31
198.108.67.104 attackbots
9997/tcp 8881/tcp 9108/tcp...
[2019-04-22/06-22]127pkt,117pt.(tcp)
2019-06-23 00:35:11
154.72.189.230 attack
8080/tcp
[2019-06-22]1pkt
2019-06-23 01:18:04
220.176.196.40 attackspambots
IP: 220.176.196.40
ASN: AS4134 No.31 Jin-rong Street
Port: IMAP over TLS protocol 993
Found in one or more Blacklists
Date: 22/06/2019 2:44:48 PM UTC
2019-06-23 00:33:15

Recently Reported IPs

171.215.184.117 50.94.221.68 3.18.213.39 34.150.150.198
154.114.251.212 145.63.156.157 74.82.28.131 192.30.77.159
139.15.227.59 215.199.192.61 182.225.74.31 196.86.229.177
166.146.176.81 87.146.84.252 117.86.123.150 6.21.131.177
50.99.73.116 67.201.114.133 248.209.219.70 134.249.83.48