Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Colorado Springs

Region: Colorado

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.54.4.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.54.4.40.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020301 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:40:10 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 40.4.54.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 40.4.54.166.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.48.209.71 attackspam
Unauthorized connection attempt from IP address 157.48.209.71 on Port 445(SMB)
2020-08-21 01:21:39
129.28.187.169 attackbotsspam
SSH invalid-user multiple login try
2020-08-21 01:20:59
212.2.213.21 attackspam
Unauthorized connection attempt from IP address 212.2.213.21 on Port 445(SMB)
2020-08-21 01:54:39
88.232.169.35 attack
hacking attempt
2020-08-21 01:53:30
177.36.176.192 attackbotsspam
Unauthorized connection attempt from IP address 177.36.176.192 on Port 445(SMB)
2020-08-21 01:38:04
39.97.107.42 attackspam
Aug 20 06:02:21 Host-KLAX-C sshd[30842]: Invalid user newuser from 39.97.107.42 port 52692
...
2020-08-21 01:50:34
114.35.44.253 attack
Aug 20 16:22:58  sshd\[24868\]: Invalid user mila from 114.35.44.253Aug 20 16:23:00  sshd\[24868\]: Failed password for invalid user mila from 114.35.44.253 port 34122 ssh2
...
2020-08-21 01:42:49
117.69.154.43 attackbots
Aug 20 15:27:36 srv01 postfix/smtpd\[21140\]: warning: unknown\[117.69.154.43\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 15:27:48 srv01 postfix/smtpd\[21140\]: warning: unknown\[117.69.154.43\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 15:28:06 srv01 postfix/smtpd\[21140\]: warning: unknown\[117.69.154.43\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 15:28:26 srv01 postfix/smtpd\[21140\]: warning: unknown\[117.69.154.43\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 15:28:38 srv01 postfix/smtpd\[21140\]: warning: unknown\[117.69.154.43\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-21 01:56:02
103.40.199.74 attack
Unauthorized connection attempt from IP address 103.40.199.74 on Port 445(SMB)
2020-08-21 01:49:58
157.47.147.157 attackspambots
20/8/20@08:02:50: FAIL: Alarm-Network address from=157.47.147.157
20/8/20@08:02:50: FAIL: Alarm-Network address from=157.47.147.157
...
2020-08-21 01:20:27
60.230.131.39 attackbots
Automatic report - Port Scan Attack
2020-08-21 01:36:27
114.161.176.220 attackbots
Unauthorized connection attempt from IP address 114.161.176.220 on Port 445(SMB)
2020-08-21 01:26:13
115.159.198.41 attackbotsspam
2020-08-19 16:29:08 server sshd[21105]: Failed password for invalid user vl from 115.159.198.41 port 33854 ssh2
2020-08-21 01:26:48
110.49.40.5 attackbotsspam
Unauthorized connection attempt from IP address 110.49.40.5 on Port 445(SMB)
2020-08-21 01:34:31
79.143.42.255 attack
Unauthorized connection attempt from IP address 79.143.42.255 on Port 445(SMB)
2020-08-21 01:52:12

Recently Reported IPs

202.13.74.236 53.129.175.240 102.110.129.177 4.199.238.221
173.140.115.43 63.103.207.121 179.177.165.233 93.65.174.96
136.166.101.48 183.235.21.32 222.162.114.46 177.164.16.189
59.59.98.181 35.225.53.217 58.122.103.111 79.49.14.236
148.210.11.42 193.244.97.181 103.15.235.25 78.165.124.67