Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       216.166.0.0 - 216.166.127.255
CIDR:           216.166.0.0/17
NetName:        YHC-4
NetHandle:      NET-216-166-0-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   SWITCH, LTD (SWITC-2)
RegDate:        2000-08-23
Updated:        2021-11-18
Ref:            https://rdap.arin.net/registry/ip/216.166.0.0


OrgName:        SWITCH, LTD
OrgId:          SWITC-2
Address:        7135 South Decatur Blvd
City:           Las Vegas
StateProv:      NV
PostalCode:     89118
Country:        US
RegDate:        2005-02-24
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/SWITC-2


OrgNOCHandle: ASNOC4-ARIN
OrgNOCName:   AS23005 NOC
OrgNOCPhone:  +1-866-229-5151 
OrgNOCEmail:  noc@switch.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ASNOC4-ARIN

OrgAbuseHandle: ASABU2-ARIN
OrgAbuseName:   AS23005 Abuse
OrgAbusePhone:  +1-702-267-6602 
OrgAbuseEmail:  abuse@switch.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ASABU2-ARIN

OrgTechHandle: ASNET3-ARIN
OrgTechName:   AS23005 Netops
OrgTechPhone:  +1-866-229-5151 
OrgTechEmail:  netops@switch.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ASNET3-ARIN

# end


# start

NetRange:       216.166.82.0 - 216.166.82.255
CIDR:           216.166.82.0/24
NetName:        WEBXESS
NetHandle:      NET-216-166-82-0-1
Parent:         YHC-4 (NET-216-166-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       WebXess, Inc. (C01238471)
RegDate:        2005-12-07
Updated:        2005-12-07
Ref:            https://rdap.arin.net/registry/ip/216.166.82.0


CustName:       WebXess, Inc.
Address:        8860 Business Park Dr.
Address:        Suite 300
City:           Austin
StateProv:      TX
PostalCode:     78759
Country:        US
RegDate:        2005-12-07
Updated:        2011-03-19
Ref:            https://rdap.arin.net/registry/entity/C01238471

OrgNOCHandle: ASNOC4-ARIN
OrgNOCName:   AS23005 NOC
OrgNOCPhone:  +1-866-229-5151 
OrgNOCEmail:  noc@switch.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ASNOC4-ARIN

OrgAbuseHandle: ASABU2-ARIN
OrgAbuseName:   AS23005 Abuse
OrgAbusePhone:  +1-702-267-6602 
OrgAbuseEmail:  abuse@switch.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ASABU2-ARIN

OrgTechHandle: ASNET3-ARIN
OrgTechName:   AS23005 Netops
OrgTechPhone:  +1-866-229-5151 
OrgTechEmail:  netops@switch.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ASNET3-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.166.82.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.166.82.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 22:47:07 CST 2026
;; MSG SIZE  rcvd: 106
Host info
18.82.166.216.in-addr.arpa domain name pointer 216-166-82-18.fwd.datafoundry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.82.166.216.in-addr.arpa	name = 216-166-82-18.fwd.datafoundry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
105.104.63.184 attackspambots
Wordpress attack
2020-09-13 05:23:36
222.186.173.183 attackbotsspam
Sep 12 23:09:24 marvibiene sshd[10299]: Failed password for root from 222.186.173.183 port 40986 ssh2
Sep 12 23:09:27 marvibiene sshd[10299]: Failed password for root from 222.186.173.183 port 40986 ssh2
2020-09-13 05:16:01
217.25.198.133 attackbotsspam
Unauthorized IMAP connection attempt
2020-09-13 05:26:19
209.45.40.93 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-13 05:13:31
181.191.241.6 attackbots
Sep 12 21:53:35 l02a sshd[21913]: Invalid user admin from 181.191.241.6
Sep 12 21:53:35 l02a sshd[21913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.241.6 
Sep 12 21:53:35 l02a sshd[21913]: Invalid user admin from 181.191.241.6
Sep 12 21:53:37 l02a sshd[21913]: Failed password for invalid user admin from 181.191.241.6 port 53390 ssh2
2020-09-13 04:56:20
185.247.224.65 attackspam
Sep 12 19:07:53 vlre-nyc-1 sshd\[15246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.247.224.65  user=root
Sep 12 19:07:55 vlre-nyc-1 sshd\[15246\]: Failed password for root from 185.247.224.65 port 60650 ssh2
Sep 12 19:07:58 vlre-nyc-1 sshd\[15246\]: Failed password for root from 185.247.224.65 port 60650 ssh2
Sep 12 19:08:00 vlre-nyc-1 sshd\[15246\]: Failed password for root from 185.247.224.65 port 60650 ssh2
Sep 12 19:08:02 vlre-nyc-1 sshd\[15246\]: Failed password for root from 185.247.224.65 port 60650 ssh2
...
2020-09-13 04:57:31
222.186.175.151 attackspambots
Failed password for invalid user from 222.186.175.151 port 12764 ssh2
2020-09-13 05:07:37
161.35.69.251 attackspam
Automatic Fail2ban report - Trying login SSH
2020-09-13 04:54:55
91.121.65.15 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-12T20:29:13Z and 2020-09-12T20:36:21Z
2020-09-13 05:09:09
185.220.102.7 attackbots
Automatic report - Banned IP Access
2020-09-13 04:54:29
176.31.128.45 attack
Sep 12 20:01:23 vpn01 sshd[21648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.128.45
Sep 12 20:01:24 vpn01 sshd[21648]: Failed password for invalid user passwd from 176.31.128.45 port 52598 ssh2
...
2020-09-13 05:16:22
79.188.68.89 attackbotsspam
fail2ban
2020-09-13 05:25:22
222.186.169.194 attackspam
Failed password for invalid user from 222.186.169.194 port 49702 ssh2
2020-09-13 05:12:28
189.162.248.235 attackspam
trying to access non-authorized port
2020-09-13 05:12:12
36.82.133.6 attackspambots
Attempt to login to the wordpress admin panel
2020-09-13 05:20:56

Recently Reported IPs

35.205.166.64 206.183.108.42 202.12.79.137 8.213.128.92
2606:4700:10::6814:7481 2606:4700:10::6814:9743 2606:4700:10::6814:9843 2606:4700:10::6814:7350
2606:4700:10::6814:8238 2606:4700:10::ac43:1112 2606:4700:10::6816:956 2606:4700:10::6814:7155
2606:4700:10::6814:4796 164.155.74.138 2606:4700:10::6814:5517 2606:4700:10::6816:3165
175.119.202.28 108.165.147.240 167.172.184.251 159.223.45.109