Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nürnberg

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a03:4000:66:5a8:d86b:25ff:feca:1b47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 8087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a03:4000:66:5a8:d86b:25ff:feca:1b47. IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Apr 03 14:41:25 CST 2025
;; MSG SIZE  rcvd: 65

'
Host info
b'Host 7.4.b.1.a.c.e.f.f.f.5.2.b.6.8.d.8.a.5.0.6.6.0.0.0.0.0.4.3.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 2a03:4000:66:5a8:d86b:25ff:feca:1b47.in-addr.arpa: SERVFAIL
Related comments:
IP Type Details Datetime
192.162.68.244 attack
fail2ban honeypot
2019-11-08 19:07:40
178.213.203.167 attackbots
Chat Spam
2019-11-08 19:19:35
165.22.246.219 attack
xmlrpc attack
2019-11-08 19:24:35
222.186.173.238 attack
Nov  8 12:06:41 tuxlinux sshd[18953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
...
2019-11-08 19:11:34
195.3.146.88 attackspam
195.3.146.88 was recorded 7 times by 7 hosts attempting to connect to the following ports: 33899,33890. Incident counter (4h, 24h, all-time): 7, 48, 177
2019-11-08 19:33:39
82.81.65.116 attackbots
Automatic report - Banned IP Access
2019-11-08 19:42:19
132.247.172.26 attackspam
Nov  8 10:39:26 lnxweb62 sshd[11545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.172.26
Nov  8 10:39:26 lnxweb62 sshd[11545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.172.26
2019-11-08 19:10:53
213.230.114.60 attackspam
Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: CONNECT from [213.230.114.60]:12491 to [176.31.12.44]:25
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2835]: addr 213.230.114.60 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2831]: addr 213.230.114.60 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2831]: addr 213.230.114.60 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  8 07:08:39 mxgate1 postfix/dnsblog[2832]: addr 213.230.114.60 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: PREGREET 23 after 0.16 from [213.230.114.60]:12491: EHLO [213.230.114.60]

Nov  8 07:08:39 mxgate1 postfix/postscreen[2829]: DNSBL rank 4 for [213.230.114.60]:12491
Nov x@x
Nov  8 07:08:40 mxgate1 postfix/postscreen[2829]: HANGUP after 0.59 from [213.230.114.60]:12491 in tests after SMTP handshake
Nov  8 07:08:40 mxgate1 postfix/postscreen[2829]: DISCONNECT [213.........
-------------------------------
2019-11-08 19:36:01
45.93.247.24 attackspam
Nov  8 16:14:38 our-server-hostname postfix/smtpd[17424]: connect from unknown[45.93.247.24]
Nov x@x
Nov  8 16:14:41 our-server-hostname postfix/smtpd[17424]: 2E37EA40086: client=unknown[45.93.247.24]
Nov  8 16:14:42 our-server-hostname postfix/smtpd[18514]: 0A28AA4008E: client=unknown[127.0.0.1], orig_client=unknown[45.93.247.24]
Nov  8 16:14:42 our-server-hostname amavis[20063]: (20063-10) Passed CLEAN, [45.93.247.24] [45.93.247.24] , mail_id: fyS3H198N3+T, Hhostnames: -, size: 17706, queued_as: 0A28AA4008E, 147 ms
Nov x@x
Nov  8 16:14:42 our-server-hostname postfix/smtpd[17424]: 71ED2A40086: client=unknown[45.93.247.24]
Nov  8 16:14:43 our-server-hostname postfix/smtpd[18423]: 4B38AA4009E: client=unknown[127.0.0.1], orig_client=unknown[45.93.247.24]
Nov  8 16:14:43 our-server-hostname amavis[18818]: (18818-13) Passed CLEAN, [45.93.247.24] [45.93.247.24] , mail_id: 4LD5yrbApUvp, Hhostnames: -, size: 17548, queued_as: 4B38AA4009E, 135 ms
Nov x@x
Nov  8 16:14:........
-------------------------------
2019-11-08 19:44:53
109.211.146.146 attackbotsspam
Automatic report - Port Scan Attack
2019-11-08 19:43:54
180.76.52.197 attackspambots
Nov  8 07:24:37 host sshd[3162]: Invalid user augusto from 180.76.52.197 port 1034
...
2019-11-08 19:22:08
46.38.144.57 attack
Nov  8 12:29:12 vmanager6029 postfix/smtpd\[10753\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 12:29:49 vmanager6029 postfix/smtpd\[10753\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 19:39:51
217.146.30.27 attack
Nov  8 05:40:30 firewall sshd[14733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.146.30.27
Nov  8 05:40:30 firewall sshd[14733]: Invalid user post from 217.146.30.27
Nov  8 05:40:32 firewall sshd[14733]: Failed password for invalid user post from 217.146.30.27 port 48292 ssh2
...
2019-11-08 19:34:39
104.236.22.133 attack
Nov  8 11:37:29 h2177944 sshd\[23248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133  user=root
Nov  8 11:37:31 h2177944 sshd\[23248\]: Failed password for root from 104.236.22.133 port 53266 ssh2
Nov  8 11:50:20 h2177944 sshd\[23700\]: Invalid user joyle from 104.236.22.133 port 35592
Nov  8 11:50:20 h2177944 sshd\[23700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133
...
2019-11-08 19:21:48
154.223.188.166 attackspam
Another so-called "Hong Kong" (PRC really) attack /include/calendar/calendar-cn.js
2019-11-08 19:40:38

Recently Reported IPs

89.58.18.169 2a03:4000:3b:133:18b4:26ff:fe81:c222 2a03:4000:53:cb0:642b:2eff:fe41:ed09 2a03:4000:5:ca7:e4e3:96ff:fe30:8d25
148.241.237.103 2a03:4000:33:a6d:24ba:e0ff:fee8:ae8e 59.82.21.66 35.195.72.149
113.215.189.89 176.65.138.95 243.101.180.71 14.155.91.43
14.155.91.187 14.155.91.27 130.74.88.152 240.49.61.184
90.53.80.23 119.74.204.178 123.146.131.100 173.82.195.144