Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.166.187.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.166.187.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:28:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 98.187.166.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.187.166.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.162.163.168 attackspam
0,40-04/27 concatform PostRequest-Spammer scoring: Lusaka01
2019-07-12 18:14:41
141.98.9.2 attackspambots
Jul 12 11:15:37 mail postfix/smtpd\[2267\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 12 11:46:00 mail postfix/smtpd\[3341\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 12 11:47:32 mail postfix/smtpd\[3341\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 12 11:49:03 mail postfix/smtpd\[3996\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-12 18:19:38
103.228.1.170 attack
Autoban   103.228.1.170 AUTH/CONNECT
2019-07-12 18:59:45
36.110.28.94 attackbots
Jul 12 10:34:49 mail sshd\[29291\]: Invalid user testuser from 36.110.28.94 port 46939
Jul 12 10:34:49 mail sshd\[29291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.28.94
Jul 12 10:34:51 mail sshd\[29291\]: Failed password for invalid user testuser from 36.110.28.94 port 46939 ssh2
Jul 12 10:36:59 mail sshd\[29336\]: Invalid user ftb from 36.110.28.94 port 56873
Jul 12 10:36:59 mail sshd\[29336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.28.94
...
2019-07-12 18:49:49
212.83.129.50 attackbotsspam
*Port Scan* detected from 212.83.129.50 (FR/France/212-83-129-50.rev.poneytelecom.eu). 4 hits in the last 210 seconds
2019-07-12 19:00:48
159.89.111.136 attack
Jul 12 11:38:32 meumeu sshd[31744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136 
Jul 12 11:38:34 meumeu sshd[31744]: Failed password for invalid user tss3 from 159.89.111.136 port 44128 ssh2
Jul 12 11:45:52 meumeu sshd[537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136 
...
2019-07-12 18:56:01
1.179.188.205 attack
WordPress brute force
2019-07-12 18:36:39
113.107.244.124 attackbots
Jul 12 16:24:57 vibhu-HP-Z238-Microtower-Workstation sshd\[1727\]: Invalid user hh from 113.107.244.124
Jul 12 16:24:57 vibhu-HP-Z238-Microtower-Workstation sshd\[1727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.107.244.124
Jul 12 16:24:59 vibhu-HP-Z238-Microtower-Workstation sshd\[1727\]: Failed password for invalid user hh from 113.107.244.124 port 33070 ssh2
Jul 12 16:31:28 vibhu-HP-Z238-Microtower-Workstation sshd\[2686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.107.244.124  user=irc
Jul 12 16:31:31 vibhu-HP-Z238-Microtower-Workstation sshd\[2686\]: Failed password for irc from 113.107.244.124 port 33360 ssh2
...
2019-07-12 19:07:18
46.101.204.20 attack
Jul 12 12:10:27 mail sshd\[19843\]: Invalid user leonidas from 46.101.204.20 port 35148
Jul 12 12:10:27 mail sshd\[19843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Jul 12 12:10:29 mail sshd\[19843\]: Failed password for invalid user leonidas from 46.101.204.20 port 35148 ssh2
Jul 12 12:15:12 mail sshd\[20806\]: Invalid user play from 46.101.204.20 port 36112
Jul 12 12:15:12 mail sshd\[20806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
2019-07-12 18:28:05
49.207.5.158 attackspambots
Jul 12 12:23:58 tux-35-217 sshd\[2276\]: Invalid user pi from 49.207.5.158 port 38388
Jul 12 12:23:58 tux-35-217 sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.5.158
Jul 12 12:23:58 tux-35-217 sshd\[2278\]: Invalid user pi from 49.207.5.158 port 38394
Jul 12 12:23:59 tux-35-217 sshd\[2278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.5.158
...
2019-07-12 18:35:45
111.21.99.227 attack
Mar  8 07:06:54 vtv3 sshd\[31703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227  user=root
Mar  8 07:06:56 vtv3 sshd\[31703\]: Failed password for root from 111.21.99.227 port 60470 ssh2
Mar  8 07:14:16 vtv3 sshd\[2070\]: Invalid user gmodserver from 111.21.99.227 port 37938
Mar  8 07:14:16 vtv3 sshd\[2070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
Mar  8 07:14:18 vtv3 sshd\[2070\]: Failed password for invalid user gmodserver from 111.21.99.227 port 37938 ssh2
Mar 13 13:02:18 vtv3 sshd\[9583\]: Invalid user interview from 111.21.99.227 port 60466
Mar 13 13:02:18 vtv3 sshd\[9583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
Mar 13 13:02:20 vtv3 sshd\[9583\]: Failed password for invalid user interview from 111.21.99.227 port 60466 ssh2
Mar 13 13:09:49 vtv3 sshd\[12259\]: Invalid user omsagent from 111.21.99.227 port 39902
Mar
2019-07-12 19:05:42
112.166.68.193 attackbots
Jul 12 12:16:31 meumeu sshd[6935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193 
Jul 12 12:16:34 meumeu sshd[6935]: Failed password for invalid user teamspeak3 from 112.166.68.193 port 42940 ssh2
Jul 12 12:22:26 meumeu sshd[8093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193 
...
2019-07-12 18:33:16
80.82.65.74 attackspam
Fail2Ban Ban Triggered
2019-07-12 18:46:47
79.111.15.23 attack
Unauthorized connection attempt from IP address 79.111.15.23 on Port 445(SMB)
2019-07-12 19:00:24
180.92.235.126 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-12 18:17:07

Recently Reported IPs

123.131.76.113 114.195.107.48 243.13.253.167 163.98.123.227
9.232.214.105 65.76.171.228 154.59.139.45 72.232.216.137
29.200.155.253 203.205.253.172 193.253.57.76 72.224.255.11
176.69.239.145 12.254.42.234 53.204.172.197 15.94.167.54
95.67.106.166 146.42.149.48 143.34.118.100 70.61.94.76