Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tsuen Wan

Region: Tsuen Wan

Country: Hong Kong SAR China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.53.16.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.53.16.66.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030100 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 16:27:46 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 66.16.53.163.in-addr.arpa not found: 5(REFUSED)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.16.53.163.in-addr.arpa: REFUSED
Related IP info:
Related comments:
IP Type Details Datetime
191.53.199.224 attackspam
$f2bV_matches
2019-06-24 12:21:02
93.183.183.25 attackbotsspam
19/6/23@15:48:00: FAIL: IoT-Telnet address from=93.183.183.25
...
2019-06-24 12:01:46
159.65.139.162 attack
WordPress login Brute force / Web App Attack on client site.
2019-06-24 11:45:02
148.66.132.169 attack
148.66.132.169 - - [23/Jun/2019:21:50:03 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-06-24 11:30:00
60.250.81.38 attackspam
Jun 23 21:48:08 vayu sshd[806365]: Invalid user arturo from 60.250.81.38
Jun 23 21:48:08 vayu sshd[806365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-250-81-38.hinet-ip.hinet.net 
Jun 23 21:48:11 vayu sshd[806365]: Failed password for invalid user arturo from 60.250.81.38 port 45250 ssh2
Jun 23 21:48:11 vayu sshd[806365]: Received disconnect from 60.250.81.38: 11: Bye Bye [preauth]
Jun 24 01:03:17 vayu sshd[890569]: Invalid user test from 60.250.81.38
Jun 24 01:03:17 vayu sshd[890569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-250-81-38.hinet-ip.hinet.net 
Jun 24 01:03:20 vayu sshd[890569]: Failed password for invalid user test from 60.250.81.38 port 44022 ssh2
Jun 24 01:03:20 vayu sshd[890569]: Received disconnect from 60.250.81.38: 11: Bye Bye [preauth]
Jun 24 01:04:45 vayu sshd[891088]: Invalid user endeavour from 60.250.81.38
Jun 24 01:04:45 vayu sshd[891088]: pam_unix(........
-------------------------------
2019-06-24 11:50:52
197.50.199.23 attackspam
Unauthorised access (Jun 23) SRC=197.50.199.23 LEN=52 TTL=116 ID=29441 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-24 12:08:33
49.67.68.254 attackbotsspam
2019-06-23T22:02:41.045384 X postfix/smtpd[43529]: warning: unknown[49.67.68.254]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T22:51:18.365894 X postfix/smtpd[57678]: warning: unknown[49.67.68.254]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T23:10:56.126099 X postfix/smtpd[60969]: warning: unknown[49.67.68.254]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 12:24:47
172.58.21.56 attackspambots
coward website spammer manipulating images on site. This guys mama must have dropped him on his head when he was born...LOLOLOLO!
2019-06-24 11:54:56
104.248.179.98 attack
www.handydirektreparatur.de 104.248.179.98 \[24/Jun/2019:02:45:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5667 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.handydirektreparatur.de 104.248.179.98 \[24/Jun/2019:02:45:46 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4116 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-24 11:33:38
89.142.21.68 attackbots
C1,WP GET /lappan/wp-login.php
2019-06-24 12:03:39
122.58.175.31 attackbotsspam
Jun 20 21:35:28 reporting sshd[14083]: Invalid user openbravo from 122.58.175.31
Jun 20 21:35:28 reporting sshd[14083]: Failed password for invalid user openbravo from 122.58.175.31 port 37326 ssh2
Jun 20 21:44:16 reporting sshd[18364]: Invalid user che from 122.58.175.31
Jun 20 21:44:16 reporting sshd[18364]: Failed password for invalid user che from 122.58.175.31 port 55652 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.58.175.31
2019-06-24 12:02:35
166.62.103.30 attackspambots
166.62.103.30 - - [23/Jun/2019:21:48:10 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-06-24 11:59:02
159.65.239.54 attack
Automatic report - Web App Attack
2019-06-24 12:06:13
139.59.79.56 attackspambots
Jun 24 03:20:10 debian sshd\[826\]: Invalid user test from 139.59.79.56 port 39252
Jun 24 03:20:10 debian sshd\[826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.56
...
2019-06-24 11:36:30
199.249.230.116 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.116  user=root
Failed password for root from 199.249.230.116 port 7296 ssh2
Failed password for root from 199.249.230.116 port 7296 ssh2
Failed password for root from 199.249.230.116 port 7296 ssh2
Failed password for root from 199.249.230.116 port 7296 ssh2
2019-06-24 11:37:11

Recently Reported IPs

14.251.37.254 41.114.244.182 192.241.205.114 137.116.227.66
203.34.171.237 181.58.195.93 152.78.50.137 1.52.123.165
77.170.252.4 190.75.31.64 116.58.244.17 79.170.184.7
192.241.218.248 36.81.78.98 201.27.82.123 171.236.77.82
35.177.210.193 185.229.95.252 182.162.104.153 48.217.243.35