Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.166.38.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.166.38.149.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 20 17:06:45 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 149.38.166.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.38.166.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.158.62.240 attack
SSH Invalid Login
2020-10-04 05:45:42
190.200.173.106 attackbots
Brute-force attempt banned
2020-10-04 05:30:47
196.52.43.85 attackbots
Found on   CINS badguys     / proto=6  .  srcport=64171  .  dstport=6379  .     (1939)
2020-10-04 05:47:39
5.166.56.250 attack
Oct  3 19:31:29 mout sshd[16794]: Invalid user stefan from 5.166.56.250 port 45332
2020-10-04 05:51:57
151.236.35.245 attack
Tried to connect to NAS
2020-10-04 05:29:06
178.148.186.248 attackspam
Brute forcing email accounts
2020-10-04 05:57:16
185.14.184.143 attack
SSH Invalid Login
2020-10-04 05:54:26
2.57.122.116 attackbots
Failed password for invalid user from 2.57.122.116 port 60090 ssh2
2020-10-04 05:53:10
71.6.231.80 attackspambots
 TCP (SYN) 71.6.231.80:57239 -> port 53, len 44
2020-10-04 05:41:46
188.131.140.32 attackspam
Automatic Fail2ban report - Trying login SSH
2020-10-04 05:28:24
183.224.38.56 attackspam
(sshd) Failed SSH login from 183.224.38.56 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 15:46:35 server sshd[25348]: Invalid user vsftpd from 183.224.38.56 port 51170
Oct  3 15:46:37 server sshd[25348]: Failed password for invalid user vsftpd from 183.224.38.56 port 51170 ssh2
Oct  3 15:56:46 server sshd[27728]: Invalid user brian from 183.224.38.56 port 44882
Oct  3 15:56:48 server sshd[27728]: Failed password for invalid user brian from 183.224.38.56 port 44882 ssh2
Oct  3 16:01:06 server sshd[28784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.224.38.56  user=root
2020-10-04 05:59:52
5.196.198.147 attack
Oct  3 22:15:25 con01 sshd[755758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147 
Oct  3 22:15:25 con01 sshd[755758]: Invalid user qcp from 5.196.198.147 port 55624
Oct  3 22:15:27 con01 sshd[755758]: Failed password for invalid user qcp from 5.196.198.147 port 55624 ssh2
Oct  3 22:18:44 con01 sshd[762381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147  user=root
Oct  3 22:18:46 con01 sshd[762381]: Failed password for root from 5.196.198.147 port 34274 ssh2
...
2020-10-04 05:46:44
74.120.14.33 attackspambots
Oct  3 23:37:01 baraca inetd[61588]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:02 baraca inetd[61589]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
Oct  3 23:37:04 baraca inetd[61590]: refused connection from scanner-06.ch1.censys-scanner.com, service sshd (tcp)
...
2020-10-04 05:33:54
167.172.156.227 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-04 05:52:26
138.99.204.224 attackbots
firewall-block, port(s): 23/tcp
2020-10-04 05:56:22

Recently Reported IPs

206.189.88.70 119.23.69.240 5.142.253.92 104.236.69.73
1.161.27.29 147.78.47.15 91.238.105.146 146.70.211.134
18.188.125.209 13.39.22.229 128.63.253.196 221.96.251.195
203.168.17.106 156.146.62.134 138.199.28.247 47.106.205.254
110.220.169.177 73.41.90.37 69.164.217.74 162.62.209.135