Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.99.92.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.99.92.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 00:37:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 105.92.99.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.99.92.105.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
122.199.24.189 attackbotsspam
ssh failed login
2019-10-25 01:16:54
210.120.63.89 attackbots
Invalid user nagios from 210.120.63.89 port 52942
2019-10-25 00:57:12
78.212.88.184 attack
19/10/24@12:09:07: FAIL: IoT-SSH address from=78.212.88.184
...
2019-10-25 00:41:25
142.93.39.29 attackbots
Oct 24 16:23:57 arianus sshd\[9380\]: Unable to negotiate with 142.93.39.29 port 42172: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-10-25 01:12:46
87.66.207.225 attack
Invalid user adriaan from 87.66.207.225 port 35540
2019-10-25 00:39:24
34.92.145.16 attack
Invalid user smtpuser from 34.92.145.16 port 50514
2019-10-25 00:51:06
37.59.43.216 attack
Invalid user test from 37.59.43.216 port 44980
2019-10-25 00:50:18
217.32.246.90 attackspam
Invalid user backlog from 217.32.246.90 port 49590
2019-10-25 00:55:27
149.202.65.173 attack
frenzy
2019-10-25 01:12:23
34.97.216.211 attackbots
Invalid user test from 34.97.216.211 port 45008
2019-10-25 00:50:43
122.4.241.6 attack
2019-10-24T12:31:24.2100801495-001 sshd\[11245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6  user=root
2019-10-24T12:31:25.7876351495-001 sshd\[11245\]: Failed password for root from 122.4.241.6 port 16182 ssh2
2019-10-24T12:39:51.1003371495-001 sshd\[12006\]: Invalid user com from 122.4.241.6 port 65414
2019-10-24T12:39:51.1075231495-001 sshd\[12006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6
2019-10-24T12:39:53.2874301495-001 sshd\[12006\]: Failed password for invalid user com from 122.4.241.6 port 65414 ssh2
2019-10-24T12:43:39.7766221495-001 sshd\[12235\]: Invalid user 12 from 122.4.241.6 port 55828
2019-10-24T12:43:39.7853001495-001 sshd\[12235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6
...
2019-10-25 01:18:19
41.234.71.207 attackbotsspam
Invalid user admin from 41.234.71.207 port 54521
2019-10-25 00:49:37
198.50.197.216 attackbots
Invalid user oracle from 198.50.197.216 port 60906
2019-10-25 01:00:52
178.128.183.90 attack
Invalid user technicom from 178.128.183.90 port 55998
2019-10-25 01:06:04
94.177.213.167 attackbotsspam
Invalid user test7 from 94.177.213.167 port 55722
2019-10-25 00:38:10

Recently Reported IPs

85.221.87.51 122.239.109.131 46.206.23.188 215.83.120.226
152.125.245.79 45.36.119.157 230.109.120.95 66.25.173.60
117.123.181.36 109.2.171.167 196.23.168.140 61.28.231.50
197.141.9.167 97.160.52.60 38.115.240.38 62.154.99.216
252.141.3.240 132.178.230.226 5.57.11.129 180.126.48.162