Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Verden an der Aller

Region: Lower Saxony

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.49.229.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.49.229.245.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072002 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 21 07:18:29 CST 2020
;; MSG SIZE  rcvd: 118
Host info
245.229.49.166.in-addr.arpa domain name pointer 166-49-229-245.gia.bt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.229.49.166.in-addr.arpa	name = 166-49-229-245.gia.bt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.99.228.12 attackspambots
Unauthorized connection attempt detected from IP address 85.99.228.12 to port 23
2020-05-16 13:06:51
220.165.15.228 attack
Invalid user uriel from 220.165.15.228 port 47586
2020-05-16 12:44:53
156.96.118.60 attackspambots
May 16 02:47:58  postfix/smtpd: warning: unknown[156.96.118.60]: SASL LOGIN authentication failed
May 16 02:48:06  postfix/smtpd: warning: unknown[156.96.118.60]: SASL LOGIN authentication failed
2020-05-16 12:42:54
222.186.175.163 attackbots
May 16 04:50:12 minden010 sshd[11478]: Failed password for root from 222.186.175.163 port 1028 ssh2
May 16 04:50:23 minden010 sshd[11478]: Failed password for root from 222.186.175.163 port 1028 ssh2
May 16 04:50:23 minden010 sshd[11478]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 1028 ssh2 [preauth]
...
2020-05-16 12:47:57
106.13.239.120 attack
Invalid user ut2k4server from 106.13.239.120 port 56708
2020-05-16 13:18:28
177.53.7.41 attack
email spam
2020-05-16 13:21:06
138.68.50.18 attackbotsspam
Invalid user training from 138.68.50.18 port 44196
2020-05-16 13:18:10
106.13.179.45 attack
invalid login attempt (stinger)
2020-05-16 13:00:28
132.145.110.173 attackbotsspam
May 16 04:38:17 andromeda sshd\[7891\]: Invalid user shelladmin from 132.145.110.173 port 19977
May 16 04:38:17 andromeda sshd\[7891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.110.173
May 16 04:38:19 andromeda sshd\[7891\]: Failed password for invalid user shelladmin from 132.145.110.173 port 19977 ssh2
2020-05-16 12:51:31
94.102.52.57 attackspam
May 16 04:36:57 vps339862 kernel: \[8815532.873778\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=94.102.52.57 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=3141 PROTO=TCP SPT=56296 DPT=22923 SEQ=3276512229 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
May 16 04:40:11 vps339862 kernel: \[8815726.756392\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=94.102.52.57 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=8932 PROTO=TCP SPT=56296 DPT=22890 SEQ=28947877 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
May 16 04:41:51 vps339862 kernel: \[8815827.363329\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=94.102.52.57 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=41196 PROTO=TCP SPT=56296 DPT=22967 SEQ=3807393648 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
May 16 04:45:55 vps339862 kernel: \[8816071.256949\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e
...
2020-05-16 12:49:41
45.55.6.42 attackspam
May 16 04:29:27 server sshd[54925]: Failed password for invalid user jesse from 45.55.6.42 port 51750 ssh2
May 16 04:42:00 server sshd[64738]: Failed password for invalid user oracle from 45.55.6.42 port 46856 ssh2
May 16 04:47:12 server sshd[3482]: Failed password for invalid user oraprod from 45.55.6.42 port 50416 ssh2
2020-05-16 12:59:02
178.128.122.126 attackspambots
May 16 04:54:02 eventyay sshd[19796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.126
May 16 04:54:04 eventyay sshd[19796]: Failed password for invalid user minerva from 178.128.122.126 port 57292 ssh2
May 16 04:57:03 eventyay sshd[19857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.126
...
2020-05-16 12:53:08
106.12.198.175 attackspambots
Invalid user teampspeak3 from 106.12.198.175 port 54274
2020-05-16 12:36:35
45.142.195.7 attackspambots
May 16 04:27:52 mail postfix/smtpd\[30453\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 16 04:28:43 mail postfix/smtpd\[30819\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 16 04:29:32 mail postfix/smtpd\[30884\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 16 04:59:41 mail postfix/smtpd\[31296\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-05-16 12:50:31
58.87.68.211 attackbotsspam
$f2bV_matches
2020-05-16 12:44:38

Recently Reported IPs

101.177.147.226 69.94.140.231 161.150.119.241 52.63.201.216
216.49.98.111 31.207.38.123 113.37.247.185 71.64.211.143
123.155.192.174 61.117.13.212 184.168.46.186 32.208.164.156
198.160.126.79 35.24.150.91 111.72.196.37 196.154.152.69
1.235.108.26 217.61.98.62 220.61.88.92 137.142.160.171