Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '185.66.200.193 - 185.66.200.193'

% Abuse contact for '185.66.200.193 - 185.66.200.193' is '185.66.200.193@abuse.skhosting.eu'

inetnum:        185.66.200.193 - 185.66.200.193
org:            ORG-SA2036-RIPE
netname:        SK-SKHOSTING
descr:          https://www.skhosting.eu
country:        SK
admin-c:        SKHO1-RIPE
tech-c:         SKHO1-RIPE
status:         ASSIGNED PA
mnt-by:         SKHOSTING-MNT
mnt-routes:     SKHOSTING-MNT
created:        2015-11-18T12:51:04Z
last-modified:  2015-11-18T16:28:44Z
source:         RIPE

organisation:   ORG-SA2036-RIPE
org-name:       skHosting.eu-185.66.200.193
abuse-c:        SA34067-RIPE
org-type:       OTHER
address:        Zavadska 10075/16A
address:        Bratislava
address:        83106
address:        Slovakia
mnt-by:         SKHOSTING-MNT
mnt-ref:        SKHOSTING-MNT
created:        2015-11-18T16:23:00Z
last-modified:  2019-09-07T22:33:18Z
source:         RIPE # Filtered

role:           skHosting.eu s.r.o.
remarks:        www.skhosting.eu - server provider
address:        Zavadska 10075/16A
address:        83106
address:        Bratislava
address:        Slovakia
abuse-mailbox:  abuse@skhosting.eu
admin-c:        LJ2008-RIPE
tech-c:         LJ2008-RIPE
nic-hdl:        SKHO1-RIPE
mnt-by:         SKHOSTING-MNT
created:        2015-06-08T03:32:03Z
last-modified:  2020-07-03T22:26:50Z
source:         RIPE # Filtered

% Information related to '185.66.200.0/23AS201702'

route:          185.66.200.0/23
origin:         AS201702
mnt-by:         SKHOSTING-MNT
created:        2020-06-01T03:40:20Z
last-modified:  2020-06-01T03:40:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.66.200.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.66.200.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 00:12:12 CST 2026
;; MSG SIZE  rcvd: 107
Host info
193.200.66.185.in-addr.arpa domain name pointer 185.66.200.193.skhosting.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.200.66.185.in-addr.arpa	name = 185.66.200.193.skhosting.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.238.151 attackspam
Jan 19 10:26:05 work-partkepr sshd\[30047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.151  user=root
Jan 19 10:26:07 work-partkepr sshd\[30047\]: Failed password for root from 68.183.238.151 port 55180 ssh2
...
2020-01-19 20:36:29
189.242.14.120 attackbotsspam
Unauthorized connection attempt detected from IP address 189.242.14.120 to port 23 [J]
2020-01-19 20:46:03
218.92.0.201 attackspambots
Jan 19 14:03:25 silence02 sshd[27232]: Failed password for root from 218.92.0.201 port 17485 ssh2
Jan 19 14:04:52 silence02 sshd[27272]: Failed password for root from 218.92.0.201 port 64176 ssh2
2020-01-19 21:06:46
94.65.173.70 attack
Unauthorized connection attempt detected from IP address 94.65.173.70 to port 4567 [J]
2020-01-19 20:58:36
209.141.46.240 attack
Jan 19 13:56:54 localhost sshd\[4044\]: Invalid user sarah from 209.141.46.240
Jan 19 13:56:54 localhost sshd\[4044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240
Jan 19 13:56:56 localhost sshd\[4044\]: Failed password for invalid user sarah from 209.141.46.240 port 33824 ssh2
Jan 19 13:59:05 localhost sshd\[4091\]: Invalid user ta from 209.141.46.240
Jan 19 13:59:05 localhost sshd\[4091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.46.240
...
2020-01-19 21:09:06
185.197.35.201 attackspam
Honeypot attack, port: 81, PTR: pptp-201-35-197-185.lk-t.ru.
2020-01-19 20:48:24
170.253.45.203 attackbotsspam
Unauthorized connection attempt detected from IP address 170.253.45.203 to port 81 [J]
2020-01-19 20:50:51
1.52.201.111 attackspam
1579438750 - 01/19/2020 13:59:10 Host: 1.52.201.111/1.52.201.111 Port: 445 TCP Blocked
2020-01-19 21:06:28
159.203.201.165 attackbots
01/19/2020-11:37:46.414075 159.203.201.165 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-19 20:52:11
109.87.47.97 attackspambots
Unauthorized connection attempt detected from IP address 109.87.47.97 to port 8080 [J]
2020-01-19 20:26:57
89.201.83.3 attack
Unauthorized connection attempt detected from IP address 89.201.83.3 to port 5555 [J]
2020-01-19 20:31:01
94.187.238.5 attackbotsspam
Unauthorized connection attempt detected from IP address 94.187.238.5 to port 81 [J]
2020-01-19 20:29:11
159.89.168.88 attackbots
Automatic report - XMLRPC Attack
2020-01-19 21:06:04
162.62.26.113 attackbots
Unauthorized connection attempt detected from IP address 162.62.26.113 to port 6443 [J]
2020-01-19 20:51:48
86.91.187.144 attack
Unauthorized connection attempt detected from IP address 86.91.187.144 to port 2222 [J]
2020-01-19 20:32:49

Recently Reported IPs

121.134.176.114 2606:4700:10::6814:6629 2606:4700:10::6816:1515 2606:4700:10::6814:9552
2606:4700:10::6814:9563 2606:4700:10::6814:9561 2606:4700:10::6814:5103 104.244.72.233
113.215.188.195 10.106.73.202 2606:4700:10::6816:1848 2606:4700:10::6816:781
110.78.150.168 110.77.248.13 2606:4700:10::ac43:2349 2606:4700:10::6816:2352
2606:4700:10::6814:7417 203.174.83.90 98.98.91.161 110.78.138.212