Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.83.138.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.83.138.220.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023041102 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 12 06:11:40 CST 2023
;; MSG SIZE  rcvd: 107
Host info
b'Host 220.138.83.166.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 166.83.138.220.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.216.32.170 attackspambots
11/04/2019-11:22:11.415868 185.216.32.170 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 30
2019-11-04 18:22:25
14.166.86.185 attackbotsspam
Automatic report - Port Scan Attack
2019-11-04 18:36:47
106.75.7.70 attackbots
Nov  4 09:30:53 ns41 sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.70
2019-11-04 18:45:21
59.45.99.99 attack
$f2bV_matches
2019-11-04 18:45:58
218.26.172.61 attack
Connection by 218.26.172.61 on port: 2000 got caught by honeypot at 11/4/2019 5:26:44 AM
2019-11-04 18:11:33
142.93.57.62 attackbots
SSH invalid-user multiple login try
2019-11-04 18:19:11
91.121.172.194 attack
5x Failed Password
2019-11-04 18:13:01
104.211.90.120 attackbots
Automatic report - Banned IP Access
2019-11-04 18:24:03
201.32.178.190 attack
Nov  4 04:58:07 debian sshd\[17015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.32.178.190  user=root
Nov  4 04:58:10 debian sshd\[17015\]: Failed password for root from 201.32.178.190 port 59491 ssh2
Nov  4 05:07:20 debian sshd\[17051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.32.178.190  user=root
...
2019-11-04 18:19:48
184.82.193.253 attack
SMTP-sasl brute force
...
2019-11-04 18:15:33
207.199.202.164 attackspam
Nov  4 11:55:37 ncomp sshd[13262]: Invalid user pi from 207.199.202.164
Nov  4 11:55:37 ncomp sshd[13264]: Invalid user pi from 207.199.202.164
2019-11-04 18:40:30
46.105.227.206 attack
$f2bV_matches
2019-11-04 18:32:23
54.68.200.31 attackbotsspam
RDP Bruteforce
2019-11-04 18:10:56
119.29.199.150 attack
$f2bV_matches
2019-11-04 18:42:18
110.49.71.241 attack
2019-11-04T06:17:13.739270Z b80599992164 New connection: 110.49.71.241:58042 (172.17.0.3:2222) [session: b80599992164]
2019-11-04T06:25:37.799770Z 8f87b619bf32 New connection: 110.49.71.241:49724 (172.17.0.3:2222) [session: 8f87b619bf32]
2019-11-04 18:42:56

Recently Reported IPs

46.15.52.88 252.128.80.142 185.94.192.150 188.163.99.56
139.67.176.160 4.160.149.135 116.196.77.18 133.11.99.188
13.228.180.244 174.80.200.51 137.87.138.79 235.103.0.49
85.229.160.31 192.26.41.225 72.94.46.134 117.27.50.155
227.216.201.209 53.40.196.134 171.12.123.79 248.7.221.147