Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.66.19.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.66.19.109.			IN	A

;; AUTHORITY SECTION:
.			318	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022400 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 23:44:00 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 109.19.66.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.19.66.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.235.163 attackbotsspam
IP 192.241.235.163 attacked honeypot on port: 9200 at 10/1/2020 3:22:43 AM
2020-10-02 00:43:04
79.125.183.146 attackspambots
2020-10-01 17:29:37,978 fail2ban.actions: WARNING [wp-login] Ban 79.125.183.146
2020-10-02 01:07:40
209.250.1.182 attackbots
Oct  1 16:31:43 *** sshd[23387]: Invalid user randy from 209.250.1.182
2020-10-02 00:35:28
51.79.79.151 attackbotsspam
[2020-10-01 12:33:41] NOTICE[1182] chan_sip.c: Registration from '' failed for '51.79.79.151:56064' - Wrong password
[2020-10-01 12:33:41] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-01T12:33:41.586-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5347",SessionID="0x7f22f805e308",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.79.151/56064",Challenge="340cef4f",ReceivedChallenge="340cef4f",ReceivedHash="0fda78d0518aec17e2d82641d3865164"
[2020-10-01 12:33:53] NOTICE[1182] chan_sip.c: Registration from '' failed for '51.79.79.151:63169' - Wrong password
[2020-10-01 12:33:53] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-01T12:33:53.927-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5359",SessionID="0x7f22f801fc98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.79.151/631
...
2020-10-02 00:39:04
193.112.18.214 attack
$f2bV_matches
2020-10-02 00:52:47
124.160.96.249 attackspambots
Oct  1 18:31:10 OPSO sshd\[8140\]: Invalid user eric from 124.160.96.249 port 32203
Oct  1 18:31:10 OPSO sshd\[8140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
Oct  1 18:31:12 OPSO sshd\[8140\]: Failed password for invalid user eric from 124.160.96.249 port 32203 ssh2
Oct  1 18:36:03 OPSO sshd\[9011\]: Invalid user jboss from 124.160.96.249 port 19676
Oct  1 18:36:03 OPSO sshd\[9011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
2020-10-02 00:51:16
125.42.124.152 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-02 01:08:10
111.229.61.251 attackbots
Oct  1 16:26:51 mail sshd[16448]: Failed password for root from 111.229.61.251 port 60486 ssh2
Oct  1 16:34:40 mail sshd[16616]: Invalid user ab from 111.229.61.251 port 46468
...
2020-10-02 01:01:26
5.196.8.72 attack
Invalid user ranger from 5.196.8.72 port 58044
2020-10-02 00:46:32
142.4.22.236 attackspambots
142.4.22.236 - - [01/Oct/2020:17:36:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [01/Oct/2020:17:36:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [01/Oct/2020:17:36:43 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [01/Oct/2020:17:36:45 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [01/Oct/2020:17:36:46 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.22.236 - - [01/Oct/2020:17:36:47 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/6
...
2020-10-02 01:01:10
8.208.76.187 attack
SSH login attempts.
2020-10-02 00:41:19
139.199.5.50 attackspambots
Invalid user support3 from 139.199.5.50 port 54350
2020-10-02 00:37:47
119.29.173.247 attackbotsspam
$f2bV_matches
2020-10-02 00:47:41
51.158.111.168 attack
Invalid user terry from 51.158.111.168 port 34348
2020-10-02 00:44:20
61.177.172.13 attack
Oct  1 13:01:45 ny01 sshd[3154]: Failed password for root from 61.177.172.13 port 34563 ssh2
Oct  1 13:02:40 ny01 sshd[3271]: Failed password for root from 61.177.172.13 port 35326 ssh2
2020-10-02 01:08:41

Recently Reported IPs

146.185.222.23 113.252.123.205 28.93.140.249 37.57.91.83
18.94.176.183 65.247.129.243 95.123.9.143 243.64.211.105
14.171.133.49 183.148.85.113 47.12.4.8 105.231.230.82
121.157.108.67 70.244.224.102 222.14.123.38 231.32.229.112
78.42.232.41 37.90.95.110 86.223.45.90 160.205.77.34