Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.89.213.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.89.213.148.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 00:33:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
148.213.89.166.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 148.213.89.166.in-addr.arpa.: No answer

Authoritative answers can be found from:
89.166.in-addr.arpa
	origin = dns1.p07.nsone.net
	mail addr = hostmaster.nsone.net
	serial = 1642173110
	refresh = 3600
	retry = 300
	expire = 2419200
	minimum = 3600
Related IP info:
Related comments:
IP Type Details Datetime
36.233.101.79 attackspam
37215/tcp
[2019-07-24]1pkt
2019-07-25 05:36:09
78.128.113.68 attack
Jul 24 22:40:32 mail postfix/smtpd\[24295\]: warning: unknown\[78.128.113.68\]: SASL PLAIN authentication failed: \
Jul 24 22:40:39 mail postfix/smtpd\[23305\]: warning: unknown\[78.128.113.68\]: SASL PLAIN authentication failed: \
Jul 24 23:17:33 mail postfix/smtpd\[26251\]: warning: unknown\[78.128.113.68\]: SASL PLAIN authentication failed: \
Jul 24 23:17:40 mail postfix/smtpd\[25600\]: warning: unknown\[78.128.113.68\]: SASL PLAIN authentication failed: \
2019-07-25 05:34:16
198.108.66.124 attackbots
firewall-block, port(s): 8883/tcp
2019-07-25 05:40:11
185.176.27.18 attackspam
firewall-block, port(s): 13802/tcp
2019-07-25 05:42:08
111.203.152.87 attack
SSH Brute-Force reported by Fail2Ban
2019-07-25 05:33:36
104.248.49.171 attackspam
Jul 24 17:16:32 plusreed sshd[28561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.49.171  user=root
Jul 24 17:16:34 plusreed sshd[28561]: Failed password for root from 104.248.49.171 port 49296 ssh2
...
2019-07-25 05:21:11
23.94.167.126 attackbots
firewall-block, port(s): 445/tcp
2019-07-25 05:53:34
111.246.91.226 attackbots
5555/tcp
[2019-07-24]1pkt
2019-07-25 05:38:48
193.169.252.140 attackbotsspam
SMTP:25. Blocked 1206 login attempts over 12.6 days.
Arsehole may now have given up.
2019-07-25 05:13:04
188.246.226.71 attackbotsspam
Splunk® : port scan detected:
Jul 24 12:40:39 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=188.246.226.71 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x20 TTL=246 ID=17401 PROTO=TCP SPT=46419 DPT=34727 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-25 05:26:47
134.209.53.220 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-25 05:11:32
171.25.193.77 attack
Jul 24 17:47:38 xtremcommunity sshd\[4974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.77  user=root
Jul 24 17:47:40 xtremcommunity sshd\[4974\]: Failed password for root from 171.25.193.77 port 28217 ssh2
Jul 24 17:47:43 xtremcommunity sshd\[4974\]: Failed password for root from 171.25.193.77 port 28217 ssh2
Jul 24 17:47:46 xtremcommunity sshd\[4974\]: Failed password for root from 171.25.193.77 port 28217 ssh2
Jul 24 17:47:49 xtremcommunity sshd\[4974\]: Failed password for root from 171.25.193.77 port 28217 ssh2
...
2019-07-25 05:54:51
162.244.80.125 attack
" "
2019-07-25 05:49:16
200.52.60.227 attackbotsspam
Automatic report - Port Scan Attack
2019-07-25 05:24:56
223.197.243.5 attackspam
SSH Brute-Force reported by Fail2Ban
2019-07-25 05:53:49

Recently Reported IPs

117.254.160.225 57.181.238.175 11.90.150.146 195.239.113.217
182.150.20.55 155.170.147.217 201.25.185.204 164.84.111.165
164.84.111.84 164.84.111.161 27.110.185.244 184.8.187.5
72.4.44.102 95.163.144.202 174.251.212.216 92.101.51.46
70.125.88.101 86.252.73.53 30.242.126.92 51.77.2.8