Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tampere

Region: Pirkanmaa

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.148.114.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4410
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.148.114.166.		IN	A

;; AUTHORITY SECTION:
.			1968	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091300 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 13 20:28:29 CST 2019
;; MSG SIZE  rcvd: 119
Host info
166.114.148.195.in-addr.arpa domain name pointer ap114-166.tpu.fi.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
166.114.148.195.in-addr.arpa	name = ap114-166.tpu.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.212.194 attack
128.199.212.194 has been banned for [WebApp Attack]
...
2020-04-25 07:33:09
51.75.202.218 attackbotsspam
Invalid user io from 51.75.202.218 port 35460
2020-04-25 07:42:04
109.255.108.166 attack
Apr 25 01:10:27 vmd17057 sshd[31446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.255.108.166 
Apr 25 01:10:30 vmd17057 sshd[31446]: Failed password for invalid user ftptest from 109.255.108.166 port 42306 ssh2
...
2020-04-25 07:30:23
106.13.181.89 attackspam
SASL PLAIN auth failed: ruser=...
2020-04-25 07:16:42
106.12.5.190 attackspam
SASL PLAIN auth failed: ruser=...
2020-04-25 07:19:24
159.203.34.76 attack
*Port Scan* detected from 159.203.34.76 (CA/Canada/Ontario/Toronto (Old Toronto)/-). 4 hits in the last 255 seconds
2020-04-25 07:41:44
171.220.243.179 attack
Invalid user godreamz from 171.220.243.179 port 52368
2020-04-25 07:30:44
195.26.84.115 attack
Honeypot Spam Send
2020-04-25 07:41:20
2.181.177.95 attackspambots
Automatic report - Port Scan Attack
2020-04-25 07:44:38
103.40.22.89 attack
SSH bruteforce (Triggered fail2ban)
2020-04-25 07:40:35
222.186.173.226 attack
Apr 25 01:25:09 home sshd[20429]: Failed password for root from 222.186.173.226 port 37579 ssh2
Apr 25 01:25:23 home sshd[20429]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 37579 ssh2 [preauth]
Apr 25 01:25:29 home sshd[20478]: Failed password for root from 222.186.173.226 port 14816 ssh2
...
2020-04-25 07:34:19
49.234.196.215 attack
SSH Invalid Login
2020-04-25 07:56:22
187.191.0.39 attackspambots
Dovecot Invalid User Login Attempt.
2020-04-25 07:19:08
178.72.69.2 attackspam
1587760051 - 04/24/2020 22:27:31 Host: 178.72.69.2/178.72.69.2 Port: 445 TCP Blocked
2020-04-25 07:52:26
61.74.118.139 attack
Invalid user oi from 61.74.118.139 port 43628
2020-04-25 07:21:30

Recently Reported IPs

77.87.212.34 69.94.133.136 5.141.26.122 192.161.90.114
92.194.116.109 45.179.253.137 42.188.103.118 160.195.99.222
215.184.102.171 211.192.25.132 183.91.215.47 183.83.73.140
178.128.52.128 45.173.12.18 37.142.43.168 185.154.210.37
170.51.8.248 108.162.246.21 121.151.74.192 98.66.145.18