Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.66.249.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.66.249.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:45:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 22.249.66.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.249.66.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.33.120.130 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:07:53,595 INFO [shellcode_manager] (41.33.120.130) no match, writing hexdump (62fac287814c195fd321eaba9c13180c :6283) - SMB (Unknown)
2019-08-09 09:56:19
118.243.117.67 attack
Invalid user praxis from 118.243.117.67 port 59792
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.243.117.67
Failed password for invalid user praxis from 118.243.117.67 port 59792 ssh2
Invalid user monitor from 118.243.117.67 port 60914
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.243.117.67
2019-08-09 09:26:44
1.2.143.212 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:49:23,250 INFO [shellcode_manager] (1.2.143.212) no match, writing hexdump (6fedc213f6fe6009abe68fd93a9b3572 :1851776) - MS17010 (EternalBlue)
2019-08-09 09:25:48
41.214.139.226 attack
Fail2Ban Ban Triggered
2019-08-09 10:01:55
222.97.57.225 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-09 09:33:07
89.248.162.168 attack
08/08/2019-20:42:21.294744 89.248.162.168 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-09 09:51:12
190.0.159.69 attack
Aug  9 02:23:06 ArkNodeAT sshd\[14211\]: Invalid user milena from 190.0.159.69
Aug  9 02:23:06 ArkNodeAT sshd\[14211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.69
Aug  9 02:23:08 ArkNodeAT sshd\[14211\]: Failed password for invalid user milena from 190.0.159.69 port 55391 ssh2
2019-08-09 09:49:58
181.226.36.66 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:30:48,775 INFO [amun_request_handler] PortScan Detected on Port: 445 (181.226.36.66)
2019-08-09 10:04:28
51.89.151.138 attack
Aug  9 03:38:27 SilenceServices sshd[19683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.151.138
Aug  9 03:38:29 SilenceServices sshd[19683]: Failed password for invalid user trash from 51.89.151.138 port 46024 ssh2
Aug  9 03:43:49 SilenceServices sshd[25892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.151.138
2019-08-09 09:55:14
129.204.67.235 attackbots
Aug  9 03:46:11 dedicated sshd[24820]: Invalid user prova from 129.204.67.235 port 40830
Aug  9 03:46:13 dedicated sshd[24820]: Failed password for invalid user prova from 129.204.67.235 port 40830 ssh2
Aug  9 03:46:11 dedicated sshd[24820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.67.235
Aug  9 03:46:11 dedicated sshd[24820]: Invalid user prova from 129.204.67.235 port 40830
Aug  9 03:46:13 dedicated sshd[24820]: Failed password for invalid user prova from 129.204.67.235 port 40830 ssh2
2019-08-09 10:08:43
114.99.131.101 attack
Aug  8 23:49:47 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:49:55 localhost postfix/smtpd\[32031\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:06 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:21 localhost postfix/smtpd\[32014\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 23:50:29 localhost postfix/smtpd\[32031\]: warning: unknown\[114.99.131.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-09 09:31:43
77.81.234.139 attackspam
Aug  9 04:17:19 server sshd\[11958\]: Invalid user baldwin from 77.81.234.139 port 56992
Aug  9 04:17:19 server sshd\[11958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.234.139
Aug  9 04:17:20 server sshd\[11958\]: Failed password for invalid user baldwin from 77.81.234.139 port 56992 ssh2
Aug  9 04:21:27 server sshd\[21526\]: Invalid user admin from 77.81.234.139 port 51828
Aug  9 04:21:27 server sshd\[21526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.234.139
2019-08-09 09:36:15
91.144.163.44 attackspambots
08.08.2019 23:50:25 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-08-09 09:39:06
177.73.193.216 attackbots
SASL Brute Force
2019-08-09 09:45:01
139.217.207.78 attackspam
Aug  9 07:01:12 vibhu-HP-Z238-Microtower-Workstation sshd\[28500\]: Invalid user vds from 139.217.207.78
Aug  9 07:01:12 vibhu-HP-Z238-Microtower-Workstation sshd\[28500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.207.78
Aug  9 07:01:14 vibhu-HP-Z238-Microtower-Workstation sshd\[28500\]: Failed password for invalid user vds from 139.217.207.78 port 58434 ssh2
Aug  9 07:08:10 vibhu-HP-Z238-Microtower-Workstation sshd\[28677\]: Invalid user f from 139.217.207.78
Aug  9 07:08:10 vibhu-HP-Z238-Microtower-Workstation sshd\[28677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.207.78
...
2019-08-09 09:42:54

Recently Reported IPs

195.255.34.91 194.122.208.202 31.168.67.92 32.138.241.209
6.3.92.122 136.121.211.188 143.78.117.112 101.210.16.115
231.188.85.8 140.51.7.231 31.54.224.131 250.158.212.227
174.107.86.51 50.39.211.202 160.58.72.110 9.2.84.201
3.171.162.24 133.62.100.222 29.169.47.233 241.52.106.102