Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.149.34.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.149.34.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:12:39 CST 2025
;; MSG SIZE  rcvd: 105
Host info
166.34.149.3.in-addr.arpa domain name pointer ec2-3-149-34-166.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.34.149.3.in-addr.arpa	name = ec2-3-149-34-166.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.53.231.15 attackbots
Oct  1 15:50:00 mout sshd[467]: Invalid user train from 103.53.231.15 port 47817
2020-10-01 21:55:02
150.136.254.88 attack
(mod_security) mod_security (id:210492) triggered by 150.136.254.88 (US/United States/-): 5 in the last 3600 secs
2020-10-01 22:26:55
102.165.30.53 attackspambots
990/tcp 8159/tcp 2222/tcp...
[2020-08-10/09-30]63pkt,41pt.(tcp),5pt.(udp)
2020-10-01 22:21:02
157.245.124.160 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "oracle" at 2020-10-01T09:06:12Z
2020-10-01 22:03:41
150.136.31.34 attackbotsspam
Oct  1 09:47:10 django-0 sshd[2545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.31.34  user=root
Oct  1 09:47:11 django-0 sshd[2545]: Failed password for root from 150.136.31.34 port 33736 ssh2
...
2020-10-01 22:18:24
34.106.93.46 attackbots
(PERMBLOCK) 34.106.93.46 (US/United States/46.93.106.34.bc.googleusercontent.com) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-10-01 22:16:49
110.43.52.158 attack
Oct  1 10:25:46 localhost sshd[100720]: Invalid user test from 110.43.52.158 port 29792
Oct  1 10:25:46 localhost sshd[100720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.52.158
Oct  1 10:25:46 localhost sshd[100720]: Invalid user test from 110.43.52.158 port 29792
Oct  1 10:25:48 localhost sshd[100720]: Failed password for invalid user test from 110.43.52.158 port 29792 ssh2
Oct  1 10:30:54 localhost sshd[101159]: Invalid user vm from 110.43.52.158 port 22168
...
2020-10-01 22:05:27
118.25.109.237 attack
Oct  1 14:34:19 markkoudstaal sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.109.237
Oct  1 14:34:20 markkoudstaal sshd[2435]: Failed password for invalid user ana from 118.25.109.237 port 49506 ssh2
Oct  1 14:39:26 markkoudstaal sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.109.237
...
2020-10-01 22:00:56
182.148.13.246 attackspam
Invalid user linux1 from 182.148.13.246 port 39568
2020-10-01 22:10:16
27.207.8.34 attackspambots
Port Scan: TCP/23
2020-10-01 21:53:08
110.49.70.246 attack
Oct  2 00:04:44 localhost sshd[2319999]: Invalid user admin from 110.49.70.246 port 59672
...
2020-10-01 22:13:46
139.198.122.19 attackspam
Oct  1 15:50:21 Server sshd[1143795]: Invalid user hdfs from 139.198.122.19 port 49496
Oct  1 15:50:21 Server sshd[1143795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.19 
Oct  1 15:50:21 Server sshd[1143795]: Invalid user hdfs from 139.198.122.19 port 49496
Oct  1 15:50:23 Server sshd[1143795]: Failed password for invalid user hdfs from 139.198.122.19 port 49496 ssh2
Oct  1 15:52:36 Server sshd[1144752]: Invalid user gera from 139.198.122.19 port 48538
...
2020-10-01 22:04:57
168.63.72.135 attackbots
Brute forcing email accounts
2020-10-01 22:00:14
216.80.102.155 attack
DATE:2020-10-01 14:43:50, IP:216.80.102.155, PORT:ssh SSH brute force auth (docker-dc)
2020-10-01 22:05:52
81.68.100.138 attack
(sshd) Failed SSH login from 81.68.100.138 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 10:00:30 optimus sshd[22492]: Invalid user jack from 81.68.100.138
Oct  1 10:00:30 optimus sshd[22492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.100.138 
Oct  1 10:00:32 optimus sshd[22492]: Failed password for invalid user jack from 81.68.100.138 port 59402 ssh2
Oct  1 10:06:31 optimus sshd[24719]: Invalid user packer from 81.68.100.138
Oct  1 10:06:31 optimus sshd[24719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.100.138
2020-10-01 22:17:37

Recently Reported IPs

168.89.168.245 248.212.28.167 84.54.42.171 3.142.203.28
181.33.250.143 51.243.154.240 139.5.136.137 176.66.126.116
50.4.106.200 53.40.222.133 166.215.19.50 56.242.214.94
228.177.215.132 185.41.174.2 74.136.23.65 39.213.111.238
219.48.109.60 189.95.125.125 245.23.245.185 103.21.146.37