Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amarante

Region: Porto

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.136.157.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.136.157.66.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 18:02:02 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 66.157.136.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.157.136.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.77.200.5 attack
Attempted connection to port 445.
2020-08-12 19:59:04
66.150.214.9 attack
Attempted connection to port 4508.
2020-08-12 20:26:59
185.50.25.52 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-12 20:11:59
118.69.246.137 attack
Unauthorized connection attempt from IP address 118.69.246.137 on Port 445(SMB)
2020-08-12 20:13:09
192.72.24.134 attackspambots
Attempted connection to port 445.
2020-08-12 20:00:07
13.228.168.4 attack
ICMP MH Probe, Scan /Distributed -
2020-08-12 19:50:01
106.54.17.235 attack
Aug 12 05:59:35 OPSO sshd\[11868\]: Invalid user cinternet from 106.54.17.235 port 32982
Aug 12 05:59:35 OPSO sshd\[11868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.17.235
Aug 12 05:59:37 OPSO sshd\[11868\]: Failed password for invalid user cinternet from 106.54.17.235 port 32982 ssh2
Aug 12 06:06:17 OPSO sshd\[13247\]: Invalid user 123shabiya\* from 106.54.17.235 port 53576
Aug 12 06:06:17 OPSO sshd\[13247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.17.235
2020-08-12 19:45:18
152.136.50.26 attackspambots
Aug 12 08:57:46 piServer sshd[12889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.50.26 
Aug 12 08:57:48 piServer sshd[12889]: Failed password for invalid user xdsoft from 152.136.50.26 port 57336 ssh2
Aug 12 09:03:45 piServer sshd[13353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.50.26 
...
2020-08-12 19:48:23
171.248.105.177 attackbots
Attempted connection to port 445.
2020-08-12 20:05:20
218.29.54.88 attackbotsspam
fail2ban
2020-08-12 19:57:16
81.24.114.166 attackspambots
Unauthorized connection attempt from IP address 81.24.114.166 on Port 445(SMB)
2020-08-12 20:07:11
111.229.157.211 attackbots
2020-08-12 05:45:44,398 fail2ban.actions: WARNING [ssh] Ban 111.229.157.211
2020-08-12 20:11:08
119.46.13.202 attackspambots
Unauthorized connection attempt from IP address 119.46.13.202 on Port 445(SMB)
2020-08-12 19:58:01
14.228.33.42 attack
Unauthorized connection attempt from IP address 14.228.33.42 on Port 445(SMB)
2020-08-12 20:13:54
201.97.114.101 attackbotsspam
Attempted connection to port 23.
2020-08-12 20:31:25

Recently Reported IPs

143.248.94.90 140.116.237.152 128.195.99.230 140.120.187.134
140.116.8.127 140.116.203.50 128.95.120.1 65.210.113.49
140.116.85.196 137.189.207.17 140.116.126.83 10.6.182.48
140.116.219.70 120.77.173.246 159.226.128.1 125.69.67.202
115.178.236.190 120.109.62.10 207.241.225.88 169.55.107.8