Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: Cellco Partnership DBA Verizon Wireless

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.149.181.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29517
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.149.181.138.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 16 01:29:01 CST 2019
;; MSG SIZE  rcvd: 119
Host info
138.181.149.166.in-addr.arpa domain name pointer 138.sub-166-149-181.myvzw.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
138.181.149.166.in-addr.arpa	name = 138.sub-166-149-181.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.249.144.40 attackbotsspam
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.249.144.40
2019-11-22 04:44:49
159.89.10.77 attackspam
2019-11-21 19:58:58,230 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 159.89.10.77
2019-11-21 20:30:30,958 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 159.89.10.77
2019-11-21 21:03:23,448 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 159.89.10.77
2019-11-21 21:36:18,774 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 159.89.10.77
2019-11-21 22:06:59,403 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 159.89.10.77
...
2019-11-22 05:08:59
186.28.241.139 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:10:42
185.164.72.118 attackbots
Automatic report - Port Scan
2019-11-22 04:54:36
115.42.122.156 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 04:53:04
203.218.64.204 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:01:48
177.72.5.46 attackbots
SSH Brute-Force reported by Fail2Ban
2019-11-22 05:11:46
51.255.79.212 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/51.255.79.212/ 
 
 FR - 1H : (69)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 51.255.79.212 
 
 CIDR : 51.254.0.0/15 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 2 
  3H - 5 
  6H - 9 
 12H - 16 
 24H - 26 
 
 DateTime : 2019-11-21 15:48:38 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-22 05:10:11
115.42.122.83 attack
9000/tcp 26/tcp
[2019-11-18/21]2pkt
2019-11-22 04:37:48
117.50.46.176 attackbotsspam
2019-11-21T20:09:25.801828ns386461 sshd\[30267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.176  user=root
2019-11-21T20:09:27.648572ns386461 sshd\[30267\]: Failed password for root from 117.50.46.176 port 60568 ssh2
2019-11-21T20:28:35.186330ns386461 sshd\[15356\]: Invalid user admin from 117.50.46.176 port 37116
2019-11-21T20:28:35.191730ns386461 sshd\[15356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.176
2019-11-21T20:28:37.579991ns386461 sshd\[15356\]: Failed password for invalid user admin from 117.50.46.176 port 37116 ssh2
...
2019-11-22 05:04:53
115.223.203.26 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:03:16
46.101.43.224 attackspam
Nov 21 21:44:06 itv-usvr-01 sshd[28140]: Invalid user test from 46.101.43.224
Nov 21 21:44:06 itv-usvr-01 sshd[28140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224
Nov 21 21:44:06 itv-usvr-01 sshd[28140]: Invalid user test from 46.101.43.224
Nov 21 21:44:07 itv-usvr-01 sshd[28140]: Failed password for invalid user test from 46.101.43.224 port 53999 ssh2
Nov 21 21:48:53 itv-usvr-01 sshd[28270]: Invalid user um from 46.101.43.224
2019-11-22 04:58:52
159.89.9.140 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-22 05:09:15
51.79.68.99 attackspam
Nov 18 18:10:12 XXX sshd[29404]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]
Nov 18 18:10:13 XXX sshd[29406]: Invalid user admin from 51.79.68.99
Nov 18 18:10:13 XXX sshd[29406]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]
Nov 18 18:10:14 XXX sshd[29408]: Invalid user admin from 51.79.68.99
Nov 18 18:10:14 XXX sshd[29408]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]
Nov 18 18:10:15 XXX sshd[29410]: Invalid user user from 51.79.68.99
Nov 18 18:10:15 XXX sshd[29410]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]
Nov 18 18:10:16 XXX sshd[29412]: Invalid user ubnt from 51.79.68.99
Nov 18 18:10:16 XXX sshd[29412]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]
Nov 18 18:10:17 XXX sshd[29414]: Invalid user admin from 51.79.68.99
Nov 18 18:10:18 XXX sshd[29414]: Received disconnect from 51.79.68.99: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.79.68.99
2019-11-22 04:36:01
129.204.47.217 attack
Nov 21 17:28:44 ws19vmsma01 sshd[45226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.47.217
Nov 21 17:28:46 ws19vmsma01 sshd[45226]: Failed password for invalid user jarlin from 129.204.47.217 port 54373 ssh2
...
2019-11-22 04:34:48

Recently Reported IPs

177.94.246.200 35.66.136.137 212.206.70.123 166.141.223.207
98.237.209.173 68.16.77.111 154.66.196.32 100.144.124.30
103.100.128.28 53.94.245.111 121.217.186.56 86.98.59.142
174.171.111.170 78.64.24.221 199.131.60.251 58.192.34.12
212.110.131.69 134.98.41.65 185.232.21.119 103.98.79.42