Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Vivo

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.203.54.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.203.54.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 13:24:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
66.54.203.191.in-addr.arpa domain name pointer 191-203-54-66.user.vivozap.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.54.203.191.in-addr.arpa	name = 191-203-54-66.user.vivozap.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.72.168.205 attackspam
*Port Scan* detected from 37.72.168.205 (NL/Netherlands/205.168.72.37.static.swiftway.net). 4 hits in the last 281 seconds
2020-01-15 14:03:09
14.171.127.164 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-15 13:42:00
110.137.45.246 attackspam
Honeypot attack, port: 445, PTR: 246.subnet110-137-45.speedy.telkom.net.id.
2020-01-15 13:42:52
85.98.92.73 attack
Honeypot attack, port: 81, PTR: 85.98.92.73.static.ttnet.com.tr.
2020-01-15 14:24:12
188.75.223.43 attack
Unauthorized connection attempt detected from IP address 188.75.223.43 to port 80 [J]
2020-01-15 14:06:27
1.32.46.79 attack
Unauthorized connection attempt detected from IP address 1.32.46.79 to port 88 [J]
2020-01-15 14:21:32
106.12.171.17 attack
Unauthorized connection attempt detected from IP address 106.12.171.17 to port 2220 [J]
2020-01-15 14:16:09
182.53.201.173 attackbots
Honeypot attack, port: 445, PTR: node-13u5.pool-182-53.dynamic.totinternet.net.
2020-01-15 13:44:56
117.6.235.67 attack
Jan 15 05:55:02 debian-2gb-nbg1-2 kernel: \[1323401.170970\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=117.6.235.67 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=5795 DF PROTO=TCP SPT=64111 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0
2020-01-15 14:08:13
180.191.20.28 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 14:05:47
180.249.55.2 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 14:21:58
62.149.118.29 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:57:08
202.181.226.226 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:43:36
181.175.154.11 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-15 14:12:00
211.228.119.131 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-15 14:02:08

Recently Reported IPs

240.253.54.251 42.222.184.10 131.70.146.79 200.126.34.8
181.230.222.132 76.85.79.210 122.239.55.216 180.188.16.74
64.89.64.98 69.170.251.3 33.7.214.212 108.218.88.174
164.105.213.223 50.77.106.130 192.196.8.151 174.53.105.19
173.39.183.133 178.146.143.70 169.185.252.60 128.179.162.61