Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.166.50.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.166.50.142.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 11:59:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.50.166.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.50.166.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.150.97.201 attackspam
ENG,DEF GET /login.cgi?uri=
2020-05-01 04:32:08
2.36.136.146 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-05-01 03:59:14
117.247.226.29 attackspam
Invalid user user from 117.247.226.29 port 33688
2020-05-01 04:22:34
218.92.0.138 attackbots
2020-04-30T19:44:56.415358shield sshd\[1170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2020-04-30T19:44:57.791375shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2
2020-04-30T19:45:00.821858shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2
2020-04-30T19:45:03.589853shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2
2020-04-30T19:45:07.302002shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2
2020-05-01 03:56:05
222.186.175.212 attackspambots
Apr 30 21:54:31 PorscheCustomer sshd[27658]: Failed password for root from 222.186.175.212 port 15042 ssh2
Apr 30 21:54:45 PorscheCustomer sshd[27658]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 15042 ssh2 [preauth]
Apr 30 21:54:51 PorscheCustomer sshd[27666]: Failed password for root from 222.186.175.212 port 57078 ssh2
...
2020-05-01 04:21:24
111.93.71.219 attack
Triggered by Fail2Ban at Ares web server
2020-05-01 03:50:25
120.132.120.7 attackspambots
no
2020-05-01 04:15:00
79.212.155.196 attackspambots
Unauthorized connection attempt detected from IP address 79.212.155.196 to port 81
2020-05-01 04:15:27
112.85.42.185 attack
sshd jail - ssh hack attempt
2020-05-01 03:48:58
92.249.247.202 attackspam
Apr 30 18:31:41 XXX sshd[26577]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26576]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26574]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26575]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26582]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26583]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26578]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26584]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26581]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26579]: Did not receive identification string from 92.249.247.202
Apr 30 18:31:41 XXX sshd[26580]: Did not receive identification string fro........
-------------------------------
2020-05-01 04:14:45
2607:f298:5:100b::2ac:fa78 attackspam
staging/
4/30/2020 2:18:13 PM (5 minutes ago)  
IP: 2607:f298:5:100b::2ac:fa78
Human/Bot: Bot
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
2020-05-01 04:16:49
194.79.8.229 attackspambots
SSH Login Bruteforce
2020-05-01 03:48:41
124.232.133.205 attackspam
(sshd) Failed SSH login from 124.232.133.205 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 30 14:01:38 amsweb01 sshd[15762]: Invalid user tobias from 124.232.133.205 port 41804
Apr 30 14:01:39 amsweb01 sshd[15762]: Failed password for invalid user tobias from 124.232.133.205 port 41804 ssh2
Apr 30 14:10:48 amsweb01 sshd[16705]: Invalid user ftpuser from 124.232.133.205 port 23184
Apr 30 14:10:51 amsweb01 sshd[16705]: Failed password for invalid user ftpuser from 124.232.133.205 port 23184 ssh2
Apr 30 14:24:26 amsweb01 sshd[18333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.232.133.205  user=root
2020-05-01 04:09:39
192.241.133.33 attackspam
prod11
...
2020-05-01 04:06:10
200.105.158.42 attackbots
Honeypot attack, port: 445, PTR: static-200-105-158-42.acelerate.net.
2020-05-01 03:51:36

Recently Reported IPs

30.111.160.167 190.23.127.150 41.156.159.25 46.97.200.111
248.17.25.80 117.195.131.27 137.64.8.66 52.170.134.227
224.123.218.247 14.95.152.105 119.203.91.175 41.100.220.143
2.53.57.161 127.184.228.35 152.123.160.123 75.51.102.100
214.124.192.228 77.152.251.139 163.111.128.143 5.34.251.241