Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Port de Sagunt

Region: Valencia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: Tecavicas S.L.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.166.148.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48527
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;192.166.148.13.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 22:57:05 CST 2019
;; MSG SIZE  rcvd: 118

Host info
13.148.166.192.in-addr.arpa domain name pointer 192.166.148.13.user.red.tecavicas.org.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
13.148.166.192.in-addr.arpa	name = 192.166.148.13.user.red.tecavicas.org.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.210 attack
Mar  9 06:48:51 plex sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210  user=root
Mar  9 06:48:53 plex sshd[7695]: Failed password for root from 218.92.0.210 port 19307 ssh2
2020-03-09 14:00:02
218.92.0.175 attackspam
Mar  9 06:43:36 server sshd[4004975]: Failed none for root from 218.92.0.175 port 39903 ssh2
Mar  9 06:43:38 server sshd[4004975]: Failed password for root from 218.92.0.175 port 39903 ssh2
Mar  9 06:43:41 server sshd[4004975]: Failed password for root from 218.92.0.175 port 39903 ssh2
2020-03-09 14:07:09
118.96.132.29 attackbots
firewall-block, port(s): 445/tcp
2020-03-09 14:14:51
118.144.11.128 attack
Mar  9 05:34:25 ns41 sshd[14910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.144.11.128
2020-03-09 13:59:32
142.93.209.221 attack
142.93.209.221 - - [09/Mar/2020:03:53:20 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.209.221 - - [09/Mar/2020:03:53:22 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-03-09 13:27:55
180.66.207.67 attackspam
$f2bV_matches
2020-03-09 13:44:55
73.167.84.250 attackspambots
2020-03-09T05:20:01.977264shield sshd\[2961\]: Invalid user ts from 73.167.84.250 port 59450
2020-03-09T05:20:01.981696shield sshd\[2961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-167-84-250.hsd1.ct.comcast.net
2020-03-09T05:20:04.565870shield sshd\[2961\]: Failed password for invalid user ts from 73.167.84.250 port 59450 ssh2
2020-03-09T05:22:18.609552shield sshd\[3393\]: Invalid user monitor from 73.167.84.250 port 39252
2020-03-09T05:22:18.616028shield sshd\[3393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-167-84-250.hsd1.ct.comcast.net
2020-03-09 14:19:07
176.98.42.15 attackspambots
SpamScore above: 10.0
2020-03-09 14:20:01
128.199.177.16 attack
Mar  9 01:09:57 NPSTNNYC01T sshd[8271]: Failed password for root from 128.199.177.16 port 47364 ssh2
Mar  9 01:13:08 NPSTNNYC01T sshd[8433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.16
Mar  9 01:13:10 NPSTNNYC01T sshd[8433]: Failed password for invalid user user0 from 128.199.177.16 port 38638 ssh2
...
2020-03-09 14:02:50
14.248.137.2 attack
20/3/8@23:52:39: FAIL: Alarm-Network address from=14.248.137.2
20/3/8@23:52:39: FAIL: Alarm-Network address from=14.248.137.2
...
2020-03-09 13:51:36
45.136.109.219 attackspam
SSH Scan
2020-03-09 14:17:49
223.26.28.68 attackspambots
Unauthorised access (Mar  9) SRC=223.26.28.68 LEN=52 TTL=117 ID=4869 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-09 13:57:11
222.186.15.91 attackbotsspam
Mar  8 19:21:57 hpm sshd\[3360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Mar  8 19:21:59 hpm sshd\[3360\]: Failed password for root from 222.186.15.91 port 40876 ssh2
Mar  8 19:28:10 hpm sshd\[3826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Mar  8 19:28:12 hpm sshd\[3826\]: Failed password for root from 222.186.15.91 port 39003 ssh2
Mar  8 19:28:14 hpm sshd\[3826\]: Failed password for root from 222.186.15.91 port 39003 ssh2
2020-03-09 13:30:10
91.126.206.180 attackspambots
Port Scan
2020-03-09 14:17:23
112.78.163.146 attackspambots
port
2020-03-09 13:58:24

Recently Reported IPs

63.2.75.163 176.207.160.119 147.211.126.151 99.151.96.68
170.239.43.67 12.83.26.23 80.110.100.112 35.100.30.45
187.218.57.29 211.202.14.221 13.86.177.151 195.135.194.134
195.235.239.252 86.150.165.9 149.130.146.52 221.134.71.13
108.80.226.144 39.104.53.205 3.8.113.28 245.236.37.141