Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.65.52.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.65.52.122.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:40:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 122.52.65.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.65.52.122.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
195.24.207.199 attackspambots
Jan 15 05:30:54 ms-srv sshd[58887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.207.199
Jan 15 05:30:56 ms-srv sshd[58887]: Failed password for invalid user dc++ from 195.24.207.199 port 48640 ssh2
2020-02-02 23:48:27
203.177.33.146 attackbotsspam
DATE:2020-02-02 16:09:22, IP:203.177.33.146, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-03 00:02:35
59.156.5.6 attackbots
Feb  2 15:27:55 thevastnessof sshd[30589]: Failed password for invalid user dev from 59.156.5.6 port 43218 ssh2
...
2020-02-03 00:01:51
114.67.101.203 attackspambots
Unauthorized connection attempt detected from IP address 114.67.101.203 to port 2220 [J]
2020-02-03 00:15:20
195.201.147.158 attack
Dec 16 22:04:06 ms-srv sshd[20482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.201.147.158
Dec 16 22:04:07 ms-srv sshd[20482]: Failed password for invalid user gmodserver from 195.201.147.158 port 45296 ssh2
2020-02-03 00:33:18
195.22.239.226 attack
Apr 27 12:05:40 ms-srv sshd[56901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.22.239.226
Apr 27 12:05:41 ms-srv sshd[56901]: Failed password for invalid user demo from 195.22.239.226 port 33840 ssh2
2020-02-03 00:03:10
5.9.97.200 attack
20 attempts against mh-misbehave-ban on leaf
2020-02-03 00:02:07
138.68.82.194 attack
Feb  2 16:09:29 mout sshd[19314]: Invalid user uftp from 138.68.82.194 port 48092
2020-02-02 23:46:59
202.229.120.90 attackbotsspam
Unauthorized connection attempt detected from IP address 202.229.120.90 to port 2220 [J]
2020-02-02 23:58:22
124.207.50.178 attackbotsspam
Unauthorized connection attempt detected from IP address 124.207.50.178 to port 1433 [J]
2020-02-02 23:45:03
199.204.45.193 attackbots
Feb  1 14:16:33 ms-srv sshd[18692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.204.45.193
Feb  1 14:16:34 ms-srv sshd[18692]: Failed password for invalid user steven from 199.204.45.193 port 44542 ssh2
2020-02-03 00:11:53
94.66.153.0 attackbotsspam
Unauthorized connection attempt detected from IP address 94.66.153.0 to port 22 [J]
2020-02-02 23:52:01
195.209.125.58 attackspam
Mar  8 01:30:22 ms-srv sshd[13905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.209.125.58
Mar  8 01:30:24 ms-srv sshd[13905]: Failed password for invalid user admin from 195.209.125.58 port 35767 ssh2
2020-02-03 00:28:11
159.65.144.36 attackbots
2020-02-02T16:39:03.603500scmdmz1 sshd[23939]: Invalid user ftptest from 159.65.144.36 port 33438
2020-02-02T16:39:03.606382scmdmz1 sshd[23939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.36
2020-02-02T16:39:03.603500scmdmz1 sshd[23939]: Invalid user ftptest from 159.65.144.36 port 33438
2020-02-02T16:39:05.383828scmdmz1 sshd[23939]: Failed password for invalid user ftptest from 159.65.144.36 port 33438 ssh2
2020-02-02T16:42:41.914317scmdmz1 sshd[24240]: Invalid user mcserver from 159.65.144.36 port 60486
...
2020-02-02 23:53:44
195.222.163.54 attackbotsspam
Nov 28 15:04:03 ms-srv sshd[15130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.222.163.54
Nov 28 15:04:04 ms-srv sshd[15130]: Failed password for invalid user Taito from 195.222.163.54 port 35146 ssh2
2020-02-03 00:00:35

Recently Reported IPs

195.147.222.2 243.184.143.71 193.93.193.139 115.111.195.156
169.182.90.213 44.10.136.99 214.96.226.14 125.250.143.183
210.36.68.195 152.128.236.68 130.43.91.181 251.152.187.20
109.234.74.122 24.171.155.60 92.183.23.37 173.137.165.240
247.244.131.242 109.42.156.50 173.231.235.138 98.58.200.145