Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.213.148.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.213.148.142.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060602 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 07 07:07:33 CST 2023
;; MSG SIZE  rcvd: 108
Host info
142.148.213.166.in-addr.arpa domain name pointer mobile-166-213-148-142.mycingular.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.148.213.166.in-addr.arpa	name = mobile-166-213-148-142.mycingular.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.209 attack
16.02.2020 06:06:48 SSH access blocked by firewall
2020-02-16 14:54:56
189.254.33.157 attackspam
Feb 15 20:19:28 tdfoods sshd\[25708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.33.157  user=root
Feb 15 20:19:29 tdfoods sshd\[25708\]: Failed password for root from 189.254.33.157 port 41616 ssh2
Feb 15 20:23:15 tdfoods sshd\[26006\]: Invalid user admin from 189.254.33.157
Feb 15 20:23:15 tdfoods sshd\[26006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.33.157
Feb 15 20:23:17 tdfoods sshd\[26006\]: Failed password for invalid user admin from 189.254.33.157 port 56791 ssh2
2020-02-16 14:24:36
14.163.165.54 attackbotsspam
High volume CMS login attempts. -cou
2020-02-16 14:23:26
222.186.31.83 attackspam
2020-02-16T06:21:18.650586abusebot-6.cloudsearch.cf sshd[23462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
2020-02-16T06:21:20.610480abusebot-6.cloudsearch.cf sshd[23462]: Failed password for root from 222.186.31.83 port 51302 ssh2
2020-02-16T06:21:22.743534abusebot-6.cloudsearch.cf sshd[23462]: Failed password for root from 222.186.31.83 port 51302 ssh2
2020-02-16T06:21:18.650586abusebot-6.cloudsearch.cf sshd[23462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
2020-02-16T06:21:20.610480abusebot-6.cloudsearch.cf sshd[23462]: Failed password for root from 222.186.31.83 port 51302 ssh2
2020-02-16T06:21:22.743534abusebot-6.cloudsearch.cf sshd[23462]: Failed password for root from 222.186.31.83 port 51302 ssh2
2020-02-16T06:21:18.650586abusebot-6.cloudsearch.cf sshd[23462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-02-16 14:48:11
180.94.71.38 attackbotsspam
Automatic report - Port Scan Attack
2020-02-16 14:11:51
144.121.28.206 attack
Invalid user upv from 144.121.28.206 port 4312
2020-02-16 14:57:25
219.78.17.216 attackspam
Telnetd brute force attack detected by fail2ban
2020-02-16 14:30:21
119.249.54.162 attack
Fail2Ban Ban Triggered
2020-02-16 14:43:59
189.173.103.33 attackspam
Automatic report - Port Scan Attack
2020-02-16 14:40:09
60.6.214.48 attack
Brute force attempt
2020-02-16 14:53:57
222.186.175.150 attackbots
Feb 16 03:10:53 firewall sshd[22719]: Failed password for root from 222.186.175.150 port 49570 ssh2
Feb 16 03:11:07 firewall sshd[22719]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 49570 ssh2 [preauth]
Feb 16 03:11:07 firewall sshd[22719]: Disconnecting: Too many authentication failures [preauth]
...
2020-02-16 14:12:24
164.132.201.87 attack
0,09-01/01 [bc01/m16] PostRequest-Spammer scoring: maputo01_x2b
2020-02-16 14:32:07
111.26.79.4 attackbotsspam
Fail2Ban Ban Triggered
2020-02-16 14:32:35
200.77.186.161 attack
postfix
2020-02-16 14:36:12
176.120.37.145 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 14:19:21

Recently Reported IPs

214.136.81.3 211.163.94.168 41.47.190.252 216.227.234.30
168.121.56.49 13.220.117.232 43.48.127.225 15.176.74.192
222.242.49.104 43.67.105.151 182.108.232.61 65.177.110.255
96.56.254.175 230.44.254.130 83.223.204.90 83.229.114.186
242.142.214.31 153.91.186.193 9.47.90.130 105.215.121.0