Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.55.49.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.55.49.187.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:48:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 187.49.55.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 187.49.55.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.50.134.199 attack
TCP Port Scanning
2020-09-19 03:42:47
128.14.141.119 attack
 UDP 128.14.141.119:59702 -> port 32788, len 68
2020-09-19 03:35:46
52.191.166.171 attackbots
fail2ban detected brute force on sshd
2020-09-19 03:24:21
128.199.240.146 attack
Sep 18 21:05:16 minden010 sshd[31289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.146
Sep 18 21:05:18 minden010 sshd[31289]: Failed password for invalid user ts3 from 128.199.240.146 port 34790 ssh2
Sep 18 21:13:47 minden010 sshd[2746]: Failed password for root from 128.199.240.146 port 35768 ssh2
...
2020-09-19 03:22:30
168.205.124.246 attackspambots
$f2bV_matches
2020-09-19 03:34:25
69.162.124.230 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-19 03:46:32
41.72.197.182 attackbotsspam
SSH login attempt
2020-09-19 03:18:32
185.38.3.138 attack
Sep 18 18:55:33 PorscheCustomer sshd[12124]: Failed password for root from 185.38.3.138 port 58298 ssh2
Sep 18 18:59:32 PorscheCustomer sshd[12298]: Failed password for root from 185.38.3.138 port 39738 ssh2
...
2020-09-19 03:44:25
124.165.205.126 attack
2020-09-18T21:21[Censored Hostname] sshd[2216]: Failed password for root from 124.165.205.126 port 50412 ssh2
2020-09-18T21:22[Censored Hostname] sshd[2220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.165.205.126  user=root
2020-09-18T21:22[Censored Hostname] sshd[2220]: Failed password for root from 124.165.205.126 port 35782 ssh2[...]
2020-09-19 03:35:58
177.19.176.234 attack
Sep 18 21:23:35 ns382633 sshd\[2488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.176.234  user=root
Sep 18 21:23:38 ns382633 sshd\[2488\]: Failed password for root from 177.19.176.234 port 58230 ssh2
Sep 18 21:37:24 ns382633 sshd\[5731\]: Invalid user test from 177.19.176.234 port 51040
Sep 18 21:37:24 ns382633 sshd\[5731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.176.234
Sep 18 21:37:26 ns382633 sshd\[5731\]: Failed password for invalid user test from 177.19.176.234 port 51040 ssh2
2020-09-19 03:45:48
221.163.8.108 attackbotsspam
SSH Brute-Forcing (server1)
2020-09-19 03:29:35
139.155.38.67 attack
prod6
...
2020-09-19 03:17:46
128.72.0.212 attack
RDPBruteGSL24
2020-09-19 03:38:04
79.101.80.123 attack
Brute forcing email accounts
2020-09-19 03:40:11
123.1.154.200 attackbots
Sep 18 21:09:30 fhem-rasp sshd[13411]: Invalid user dev from 123.1.154.200 port 44884
...
2020-09-19 03:25:12

Recently Reported IPs

128.156.118.133 192.171.82.209 134.138.161.116 70.202.198.226
9.241.133.150 180.119.232.110 225.176.53.179 113.46.120.49
98.225.214.198 201.156.227.124 224.168.161.199 193.48.37.120
17.83.173.96 207.83.0.7 158.112.27.190 23.248.87.146
194.93.145.242 50.227.163.93 26.43.250.200 145.178.6.254