Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.59.4.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.59.4.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121302 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 12:46:54 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 252.4.59.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.59.4.252.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
42.115.233.172 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 07:27:15
200.160.71.28 attackbots
Honeypot attack, port: 81, PTR: 200-160-71-28.static-user.ajato.com.br.
2020-09-07 07:31:36
60.2.10.190 attackspambots
2020-09-07T01:33:20.737403snf-827550 sshd[15986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.2.10.190  user=root
2020-09-07T01:33:22.644199snf-827550 sshd[15986]: Failed password for root from 60.2.10.190 port 52350 ssh2
2020-09-07T01:36:21.672880snf-827550 sshd[15994]: Invalid user kawarada from 60.2.10.190 port 37352
...
2020-09-07 07:47:42
157.25.173.178 attackspambots
Unauthorized connection attempt from IP address 157.25.173.178 on port 587
2020-09-07 07:28:34
64.227.0.92 attackspam
Sep  7 01:02:55 pve1 sshd[11390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.0.92 
Sep  7 01:02:57 pve1 sshd[11390]: Failed password for invalid user admin from 64.227.0.92 port 37866 ssh2
...
2020-09-07 07:29:35
107.172.211.65 attackbotsspam
SPAM originator MAIL FROM=@copperstop.co
2020-09-07 08:01:16
177.124.195.141 attackspambots
2020-09-06T18:36:35.438576shield sshd\[11895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.195.141  user=root
2020-09-06T18:36:36.914719shield sshd\[11895\]: Failed password for root from 177.124.195.141 port 15041 ssh2
2020-09-06T18:38:21.107728shield sshd\[12041\]: Invalid user admin from 177.124.195.141 port 36001
2020-09-06T18:38:21.119887shield sshd\[12041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.195.141
2020-09-06T18:38:22.811862shield sshd\[12041\]: Failed password for invalid user admin from 177.124.195.141 port 36001 ssh2
2020-09-07 07:26:18
128.199.212.15 attack
Sep  3 09:25:17 ihweb003 sshd[31292]: Connection from 128.199.212.15 port 37106 on 139.59.173.177 port 22
Sep  3 09:25:17 ihweb003 sshd[31292]: Did not receive identification string from 128.199.212.15 port 37106
Sep  3 09:26:48 ihweb003 sshd[31391]: Connection from 128.199.212.15 port 50044 on 139.59.173.177 port 22
Sep  3 09:26:49 ihweb003 sshd[31391]: User r.r from 128.199.212.15 not allowed because none of user's groups are listed in AllowGroups
Sep  3 09:26:49 ihweb003 sshd[31391]: Received disconnect from 128.199.212.15 port 50044:11: Normal Shutdown, Thank you for playing [preauth]
Sep  3 09:26:49 ihweb003 sshd[31391]: Disconnected from 128.199.212.15 port 50044 [preauth]
Sep  3 09:27:44 ihweb003 sshd[31487]: Connection from 128.199.212.15 port 35944 on 139.59.173.177 port 22
Sep  3 09:27:45 ihweb003 sshd[31487]: User r.r from 128.199.212.15 not allowed because none of user's groups are listed in AllowGroups
Sep  3 09:27:45 ihweb003 sshd[31487]: Received disconne........
-------------------------------
2020-09-07 07:41:51
218.92.0.248 attackspam
Sep  6 23:28:57 rush sshd[31241]: Failed password for root from 218.92.0.248 port 8198 ssh2
Sep  6 23:29:07 rush sshd[31241]: Failed password for root from 218.92.0.248 port 8198 ssh2
Sep  6 23:29:10 rush sshd[31241]: Failed password for root from 218.92.0.248 port 8198 ssh2
Sep  6 23:29:10 rush sshd[31241]: error: maximum authentication attempts exceeded for root from 218.92.0.248 port 8198 ssh2 [preauth]
...
2020-09-07 07:37:23
81.68.118.120 attack
invalid user postgres from 81.68.118.120 port 58128 ssh2
2020-09-07 07:25:23
93.144.211.134 attackbotsspam
(Sep  6)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=51858 TCP DPT=8080 WINDOW=45433 SYN 
 (Sep  6)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=55039 TCP DPT=8080 WINDOW=62163 SYN 
 (Sep  6)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=25177 TCP DPT=8080 WINDOW=56618 SYN 
 (Sep  5)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=60434 TCP DPT=8080 WINDOW=61563 SYN 
 (Sep  5)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=38753 TCP DPT=8080 WINDOW=29865 SYN 
 (Sep  4)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=63001 TCP DPT=8080 WINDOW=52666 SYN 
 (Sep  2)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=59565 TCP DPT=23 WINDOW=2532 SYN 
 (Sep  2)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=9583 TCP DPT=8080 WINDOW=13441 SYN 
 (Sep  1)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=16597 TCP DPT=8080 WINDOW=64076 SYN 
 (Aug 31)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=50329 TCP DPT=8080 WINDOW=64488 SYN 
 (Aug 30)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=10768 TCP DPT=8080 WINDOW=12601 SYN 
 (Aug 30)  LEN=44 TTL=49 ID=7966 TCP DPT=8080 WINDOW=30199 SYN 
 (Aug 30)  LEN=4...
2020-09-07 07:54:26
93.107.187.162 attackspambots
SSH invalid-user multiple login attempts
2020-09-07 07:34:26
49.69.205.106 attackspambots
Aug 31 16:20:07 nxxxxxxx sshd[13756]: refused connect from 49.69.205.106 (49=
.69.205.106)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.69.205.106
2020-09-07 07:32:23
222.89.70.216 attackspam
 TCP (SYN) 222.89.70.216:62926 -> port 22, len 44
2020-09-07 07:47:08
207.46.13.56 attackbots
SQL Injection
2020-09-07 07:39:35

Recently Reported IPs

63.97.242.108 227.3.254.227 204.42.106.102 164.31.155.145
139.125.247.217 182.206.176.233 49.100.100.230 43.226.179.111
184.232.12.80 7.1.2.66 168.18.241.252 179.33.170.120
92.212.3.104 21.106.183.66 19.229.87.30 100.89.63.139
234.254.156.113 196.223.98.63 153.155.220.151 124.43.165.222