Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.242.64.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.242.64.47.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:04:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
47.64.242.166.in-addr.arpa domain name pointer 47.sub-166-242-64.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.64.242.166.in-addr.arpa	name = 47.sub-166-242-64.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.255.173.70 attackbotsspam
Tried sshing with brute force.
2020-04-18 23:28:09
223.206.250.231 attackbotsspam
Unauthorized connection attempt from IP address 223.206.250.231 on Port 445(SMB)
2020-04-18 23:05:51
66.115.173.18 attack
WordPress login Brute force / Web App Attack on client site.
2020-04-18 23:31:33
178.216.226.103 attackbots
Port probing on unauthorized port 445
2020-04-18 23:25:48
107.175.150.83 attack
Brute force attempt
2020-04-18 23:19:15
185.209.0.76 attack
Automatic report - Port Scan
2020-04-18 23:12:40
203.159.249.215 attackbots
SSH Brute-Forcing (server1)
2020-04-18 23:37:30
111.229.130.64 attackspambots
Apr 18 16:54:06 eventyay sshd[32022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.130.64
Apr 18 16:54:09 eventyay sshd[32022]: Failed password for invalid user test from 111.229.130.64 port 37790 ssh2
Apr 18 16:59:59 eventyay sshd[32182]: Failed password for root from 111.229.130.64 port 40730 ssh2
...
2020-04-18 23:01:30
171.231.244.180 spamattack
🖕🏻fucking dick. get covid and die hacking cunt
2020-04-18 23:11:39
116.102.55.178 attack
Unauthorized connection attempt from IP address 116.102.55.178 on Port 445(SMB)
2020-04-18 23:48:49
49.235.135.230 attackspambots
Apr 18 14:09:44 host5 sshd[7158]: Invalid user uq from 49.235.135.230 port 55566
...
2020-04-18 23:16:08
173.249.11.127 attack
Apr 18 16:54:22 piServer sshd[4503]: Failed password for root from 173.249.11.127 port 34220 ssh2
Apr 18 16:56:56 piServer sshd[4703]: Failed password for root from 173.249.11.127 port 46944 ssh2
...
2020-04-18 23:07:46
175.6.140.58 attackbots
Distributed brute force attack
2020-04-18 23:21:10
117.50.63.228 attack
SSH brute-force: detected 9 distinct usernames within a 24-hour window.
2020-04-18 23:22:30
51.91.120.67 attack
Apr 18 17:01:38 legacy sshd[3664]: Failed password for root from 51.91.120.67 port 53502 ssh2
Apr 18 17:03:36 legacy sshd[3721]: Failed password for root from 51.91.120.67 port 56266 ssh2
Apr 18 17:05:32 legacy sshd[3768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.120.67
...
2020-04-18 23:29:59

Recently Reported IPs

202.34.191.31 85.81.254.13 120.113.27.206 221.51.69.7
218.96.192.64 95.211.210.174 81.219.138.237 160.33.145.192
121.253.19.59 114.100.184.1 40.239.69.212 99.9.19.190
136.166.41.204 171.107.244.74 157.85.20.173 38.46.222.219
250.122.184.170 230.101.163.131 188.88.45.117 213.229.115.174