Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.83.10.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.83.10.22.			IN	A

;; AUTHORITY SECTION:
.			490	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020063000 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 30 23:03:34 CST 2020
;; MSG SIZE  rcvd: 116
Host info
;; connection timed out; no servers could be reached
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 22.10.83.166.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
104.243.41.97 attackbots
Invalid user he from 104.243.41.97 port 59532
2019-08-20 10:49:06
131.255.82.83 attackbotsspam
[DoS Attack: SYN/ACK Scan] from source: 131.255.82.83
2019-08-20 10:50:03
160.179.235.184 attackspambots
Automatic report - Port Scan Attack
2019-08-20 10:22:32
167.71.107.201 attack
Invalid user gi from 167.71.107.201 port 43126
2019-08-20 11:06:22
144.208.127.246 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-08-20 10:48:33
142.93.180.161 attackbots
SSH Server BruteForce Attack
2019-08-20 10:19:08
206.189.65.11 attackspam
2019-08-20T03:05:40.975742abusebot-3.cloudsearch.cf sshd\[4642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.65.11  user=root
2019-08-20 11:07:44
181.231.57.198 attackspambots
vps1:sshd-InvalidUser
2019-08-20 11:08:28
110.46.206.71 attack
firewall-block, port(s): 23/tcp
2019-08-20 10:47:36
167.71.212.63 attackspambots
Aug 20 02:00:44 web8 sshd\[9775\]: Invalid user lex from 167.71.212.63
Aug 20 02:00:44 web8 sshd\[9775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.212.63
Aug 20 02:00:47 web8 sshd\[9775\]: Failed password for invalid user lex from 167.71.212.63 port 34872 ssh2
Aug 20 02:06:38 web8 sshd\[12795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.212.63  user=daemon
Aug 20 02:06:39 web8 sshd\[12795\]: Failed password for daemon from 167.71.212.63 port 46046 ssh2
2019-08-20 10:24:15
185.10.68.16 attackbots
firewall-block, port(s): 8545/tcp
2019-08-20 10:32:13
121.8.124.244 attackbots
Aug 20 04:04:06 ks10 sshd[4695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.124.244 
Aug 20 04:04:08 ks10 sshd[4695]: Failed password for invalid user zed from 121.8.124.244 port 59242 ssh2
...
2019-08-20 10:34:17
123.152.186.49 attackspambots
Telnet Server BruteForce Attack
2019-08-20 10:41:28
104.248.187.231 attackbots
Aug 19 16:50:34 friendsofhawaii sshd\[16110\]: Invalid user myftp from 104.248.187.231
Aug 19 16:50:34 friendsofhawaii sshd\[16110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.231
Aug 19 16:50:36 friendsofhawaii sshd\[16110\]: Failed password for invalid user myftp from 104.248.187.231 port 56964 ssh2
Aug 19 16:57:59 friendsofhawaii sshd\[16978\]: Invalid user admin from 104.248.187.231
Aug 19 16:57:59 friendsofhawaii sshd\[16978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.231
2019-08-20 10:58:51
140.207.51.190 attack
SSH invalid-user multiple login try
2019-08-20 10:58:22

Recently Reported IPs

185.250.210.63 191.239.255.6 93.148.172.67 134.122.84.97
186.159.145.85 66.23.193.221 103.54.27.58 5.25.3.111
128.199.182.19 1.54.208.229 187.37.25.36 63.82.54.252
223.149.203.80 171.245.223.117 187.84.182.30 178.220.174.147
62.231.68.224 201.184.100.114 179.180.120.54 117.254.153.244