Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.68.3.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.68.3.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 15:28:18 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 54.3.68.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.68.3.54.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.51.100.43 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 12:28:17,653 INFO [amun_request_handler] PortScan Detected on Port: 445 (157.51.100.43)
2019-07-04 06:13:39
119.145.27.16 attackbotsspam
2019-07-02 22:16:59 server sshd[15999]: Failed password for invalid user nexus from 119.145.27.16 port 42091 ssh2
2019-07-04 06:24:12
194.150.15.70 attack
Jul  3 22:06:43 MK-Soft-VM4 sshd\[24698\]: Invalid user webmaster from 194.150.15.70 port 34700
Jul  3 22:06:43 MK-Soft-VM4 sshd\[24698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.150.15.70
Jul  3 22:06:46 MK-Soft-VM4 sshd\[24698\]: Failed password for invalid user webmaster from 194.150.15.70 port 34700 ssh2
...
2019-07-04 06:21:23
107.170.192.236 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-07-04 16:02:34
186.96.125.115 attackbots
proto=tcp  .  spt=58085  .  dpt=25  .     (listed on Blocklist de  Jul 03)     (430)
2019-07-04 15:59:25
58.250.86.44 attack
/var/log/messages:Jul  1 19:11:41 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562008301.818:71070): pid=13416 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=13417 suid=74 rport=54286 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=58.250.86.44 terminal=? res=success'
/var/log/messages:Jul  1 19:11:41 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562008301.822:71071): pid=13416 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=13417 suid=74 rport=54286 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=58.250.86.44 terminal=? res=success'
/var/log/messages:Jul  1 19:11:41 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns........
-------------------------------
2019-07-04 06:16:43
94.138.160.170 attackspambots
Jul  3 08:11:10 aat-srv002 sshd[9866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.160.170
Jul  3 08:11:12 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:15 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:17 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
Jul  3 08:11:19 aat-srv002 sshd[9866]: Failed password for invalid user admin from 94.138.160.170 port 33925 ssh2
...
2019-07-04 06:22:13
62.234.219.27 attackspam
Jul  4 10:02:36 server01 sshd\[20818\]: Invalid user chuo from 62.234.219.27
Jul  4 10:02:36 server01 sshd\[20818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.219.27
Jul  4 10:02:39 server01 sshd\[20818\]: Failed password for invalid user chuo from 62.234.219.27 port 37242 ssh2
...
2019-07-04 16:00:55
185.176.222.37 bots
185.176.222.37 - - [04/Jul/2019:15:24:56 +0800] "GET /check-ip/49.254.51.72 HTTP/1.1" 200 84506 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5"
185.176.222.37 - - [04/Jul/2019:15:25:10 +0800] "GET /check-ip/159.192.246.80 HTTP/1.1" 200 44613 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5"
185.176.222.37 - - [04/Jul/2019:15:25:23 +0800] "GET /check-ip/107.37.91.216 HTTP/1.1" 200 86743 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5"
185.176.222.37 - - [04/Jul/2019:15:25:30 +0800] "GET /check-ip/86.238.52.117 HTTP/1.1" 200 83785 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5"
185.176.222.37 - - [04/Jul/2019:15:25:37 +0800] "GET /check-ip/185.173.35.45 HTTP/1.1" 200 92596 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5"
2019-07-04 15:31:15
198.108.67.78 attackbots
8282/tcp 9101/tcp 8251/tcp...
[2019-05-02/07-03]112pkt,104pt.(tcp)
2019-07-04 06:15:41
175.107.192.153 attackbots
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 2 time(s)]
*(RWIN=1024)(07041030)
2019-07-04 15:41:46
185.95.85.226 attackspambots
TCP src-port=40884   dst-port=25    dnsbl-sorbs abuseat-org spamcop         (699)
2019-07-04 06:12:46
113.20.99.193 attackbots
445/tcp 445/tcp
[2019-06-21/07-04]2pkt
2019-07-04 15:47:43
157.55.39.122 attack
Automatic report - Web App Attack
2019-07-04 16:04:20
95.168.217.17 attack
proto=tcp  .  spt=55709  .  dpt=25  .     (listed on Blocklist de  Jul 03)     (439)
2019-07-04 15:35:40

Recently Reported IPs

57.123.88.235 36.234.218.15 35.233.83.194 216.248.150.16
178.42.145.68 218.10.203.103 10.91.112.214 192.245.25.104
10.91.54.214 41.156.225.176 165.245.207.166 207.55.215.247
223.9.225.130 200.123.51.153 143.224.173.182 230.228.20.206
212.42.184.6 245.61.202.233 242.215.144.88 125.172.76.180