Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.14.188.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.14.188.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 18:00:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 20.188.14.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.188.14.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.240.220.15 attackbotsspam
Unauthorized connection attempt detected from IP address 223.240.220.15 to port 6656 [T]
2020-01-29 21:35:04
58.8.254.0 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2020-01-29 21:55:40
201.175.157.189 attackspambots
2019-07-07 18:41:15 1hkADy-0005Jv-V4 SMTP connection from \(\[201.175.158.250\]\) \[201.175.157.189\]:60680 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 18:41:31 1hkAEE-0005K2-In SMTP connection from \(\[201.175.158.250\]\) \[201.175.157.189\]:17300 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 18:41:41 1hkAEO-0005Kg-68 SMTP connection from \(\[201.175.158.250\]\) \[201.175.157.189\]:22117 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 22:14:50
201.189.75.164 attackspam
2019-07-06 06:06:45 1hjbyF-0003J1-9W SMTP connection from \(\[201.189.75.164\]\) \[201.189.75.164\]:20866 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 06:06:48 1hjbyJ-0003J6-Qh SMTP connection from \(\[201.189.75.164\]\) \[201.189.75.164\]:20895 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 06:06:52 1hjbyM-0003JF-Ty SMTP connection from \(\[201.189.75.164\]\) \[201.189.75.164\]:20916 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 21:49:42
121.165.73.6 attackbots
Unauthorized connection attempt detected from IP address 121.165.73.6 to port 2220 [J]
2020-01-29 22:01:57
201.196.88.5 attackbotsspam
2019-01-30 21:33:02 1gowXd-0004i0-V5 SMTP connection from \(\[201.196.88.5\]\) \[201.196.88.5\]:51909 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-30 21:33:13 1gowXp-0004iN-8z SMTP connection from \(\[201.196.88.5\]\) \[201.196.88.5\]:52045 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-30 21:33:19 1gowXu-0004iZ-VN SMTP connection from \(\[201.196.88.5\]\) \[201.196.88.5\]:52157 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 21:48:06
42.118.127.185 attackbotsspam
Unauthorized connection attempt detected from IP address 42.118.127.185 to port 23 [J]
2020-01-29 21:31:30
49.235.92.208 attackbotsspam
Jan 29 16:19:00 server sshd\[13925\]: Invalid user mihira from 49.235.92.208
Jan 29 16:19:00 server sshd\[13925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208 
Jan 29 16:19:02 server sshd\[13925\]: Failed password for invalid user mihira from 49.235.92.208 port 38720 ssh2
Jan 29 16:35:41 server sshd\[17167\]: Invalid user bahuvata from 49.235.92.208
Jan 29 16:35:41 server sshd\[17167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208 
...
2020-01-29 21:53:41
1.52.6.195 attack
Unauthorized connection attempt detected from IP address 1.52.6.195 to port 23 [J]
2020-01-29 21:34:47
122.51.178.89 attack
Unauthorized connection attempt detected from IP address 122.51.178.89 to port 2220 [J]
2020-01-29 22:16:56
192.253.224.194 attack
Unauthorized connection attempt detected from IP address 192.253.224.194 to port 445 [T]
2020-01-29 21:38:08
59.62.215.108 attackspambots
Unauthorized connection attempt detected from IP address 59.62.215.108 to port 6656 [T]
2020-01-29 21:29:31
13.233.20.192 attack
Server penetration trying other domain names than server publicly serves (ex https://localhost)
2020-01-29 21:56:39
182.108.168.149 attack
Unauthorized connection attempt detected from IP address 182.108.168.149 to port 6656 [T]
2020-01-29 21:38:55
201.185.11.197 attack
2019-07-07 23:14:36 1hkEUR-0002pT-E9 SMTP connection from \(adsl-201-185-11-197.une.net.co\) \[201.185.11.197\]:13659 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 23:15:34 1hkEVK-0002rh-Vo SMTP connection from \(adsl-201-185-11-197.une.net.co\) \[201.185.11.197\]:13835 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 23:16:15 1hkEW1-0002sH-5d SMTP connection from \(adsl-201-185-11-197.une.net.co\) \[201.185.11.197\]:13947 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 22:01:11

Recently Reported IPs

143.129.227.205 9.84.9.199 210.68.108.58 5.234.96.36
156.139.163.230 2.73.17.4 57.185.74.178 124.214.235.245
36.214.118.18 61.37.224.41 7.70.107.30 28.133.229.254
128.41.251.153 141.245.196.110 5.252.154.2 4.120.173.241
97.57.21.212 159.22.145.164 242.137.200.126 218.159.238.146