Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Morocco

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.120.0.0 - 196.127.255.255'

% No abuse contact registered for 196.120.0.0 - 196.127.255.255

inetnum:        196.120.0.0 - 196.127.255.255
netname:        Mobile_Costumer
descr:          2G/3G/4G Mobile Costumers
country:        MA
admin-c:        IOM1-AFRINIC
tech-c:         IOM1-AFRINIC
status:         ASSIGNED PA
remarks:        for abuse isp_oma@orange.ma
mnt-by:         meditel-MNT
source:         AFRINIC # Filtered
parent:         196.112.0.0 - 196.127.255.255

person:         ISP Orange Morocco
address:        Immeuble MEDITEL (ex SICOTEL)
address:        La Colline 2 2eme Etage Sidi Maarouf 20190
address:        Casablanca Maroc
address:        Casablanca 20190
address:        Morocco
phone:          tel:+212-665-551000
nic-hdl:        IOM1-AFRINIC
mnt-by:         GENERATED-VXZY0HV7NWBOSKR6P2YB8IQMHRJWYSQJ-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.125.160.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.125.160.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 00:10:40 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 66.160.125.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.160.125.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.76.195.165 attackspam
SQL injection:/index.php?menu_selected=144'&sub_menu_selected=1023'&language=FR'&ID_PRJ=52795'"
2019-07-30 17:29:48
185.94.192.230 attackbots
30.07.2019 03:04:15 Connection to port 1900 blocked by firewall
2019-07-30 17:05:14
45.114.118.136 attackbots
Jul 30 10:27:27 s64-1 sshd[19439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.118.136
Jul 30 10:27:29 s64-1 sshd[19439]: Failed password for invalid user delta from 45.114.118.136 port 34102 ssh2
Jul 30 10:36:00 s64-1 sshd[19605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.118.136
...
2019-07-30 17:04:00
144.121.28.206 attack
Jul 30 08:22:49 amit sshd\[21077\]: Invalid user user from 144.121.28.206
Jul 30 08:22:49 amit sshd\[21077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.121.28.206
Jul 30 08:22:51 amit sshd\[21077\]: Failed password for invalid user user from 144.121.28.206 port 60496 ssh2
...
2019-07-30 17:12:13
120.197.64.81 attackspam
Automatic report - Port Scan Attack
2019-07-30 17:39:51
142.93.90.202 attackspambots
Invalid user rabbitmq from 142.93.90.202 port 61660
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.90.202
Failed password for invalid user rabbitmq from 142.93.90.202 port 61660 ssh2
Invalid user zclftp from 142.93.90.202 port 19251
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.90.202
2019-07-30 16:54:18
195.29.92.22 attackbotsspam
email spam
2019-07-30 17:41:15
128.199.82.144 attackbotsspam
2019-07-30T02:19:53.936417abusebot-4.cloudsearch.cf sshd\[23674\]: Invalid user test from 128.199.82.144 port 58100
2019-07-30 17:28:55
139.199.35.66 attack
Jul 30 08:35:19 mail sshd\[23114\]: Invalid user mpws from 139.199.35.66 port 57922
Jul 30 08:35:19 mail sshd\[23114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.35.66
...
2019-07-30 16:54:49
157.55.39.199 attackspambots
Web App Attack
2019-07-30 17:44:15
218.55.180.250 attackbotsspam
23/tcp 81/tcp
[2019-06-16/07-29]2pkt
2019-07-30 17:24:50
189.89.157.206 attack
Jul 30 11:55:22 srv-4 sshd\[23055\]: Invalid user info2 from 189.89.157.206
Jul 30 11:55:22 srv-4 sshd\[23055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.157.206
Jul 30 11:55:24 srv-4 sshd\[23055\]: Failed password for invalid user info2 from 189.89.157.206 port 37640 ssh2
...
2019-07-30 17:10:59
217.27.122.58 attackbots
23/tcp 37215/tcp
[2019-07-13/29]2pkt
2019-07-30 17:25:55
70.112.168.4 attackbotsspam
[Tue Jul 30 03:19:34.831233 2019] [access_compat:error] [pid 31572] [client 70.112.168.4:52484] AH01797: client denied by server configuration: /var/www/html/luke/admin
...
2019-07-30 17:40:34
185.137.111.5 attackspambots
Jul 30 11:06:32 mail postfix/smtpd\[9193\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 11:07:24 mail postfix/smtpd\[9193\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 11:08:16 mail postfix/smtpd\[9384\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 30 11:38:39 mail postfix/smtpd\[9378\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-30 17:52:04

Recently Reported IPs

172.19.8.98 2606:4700:10::6816:3305 121.234.219.107 2606:4700:10::6816:1183
2606:4700:10::6816:298 121.234.219.198 14.31.66.106 14.31.66.184
14.31.66.203 105.188.12.220 10.1.16.250 66.132.186.167
47.92.247.155 164.92.70.40 39.98.41.111 2606:4700:10::6814:5491
2606:4700:10::6814:6512 2606:4700:10::6816:4271 2606:4700:10::6814:8771 2606:4700:10::ac43:1596