Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.159.107.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.159.107.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:25:21 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.107.159.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.107.159.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.212.192.220 attackspam
FTP/21 MH Probe, BF, Hack -
2019-07-23 21:57:16
208.81.163.110 attackspambots
Jul 23 14:31:10 SilenceServices sshd[24402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.81.163.110
Jul 23 14:31:12 SilenceServices sshd[24402]: Failed password for invalid user silas from 208.81.163.110 port 60406 ssh2
Jul 23 14:36:08 SilenceServices sshd[28139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.81.163.110
2019-07-23 21:00:23
78.157.60.27 attackspambots
SMB Server BruteForce Attack
2019-07-23 21:20:58
179.177.122.229 attackspam
Jul 23 12:58:05 netserv300 sshd[20100]: Connection from 179.177.122.229 port 60416 on 178.63.236.19 port 22
Jul 23 12:58:07 netserv300 sshd[20101]: Connection from 179.177.122.229 port 33476 on 178.63.236.19 port 22
Jul 23 12:58:13 netserv300 sshd[20101]: Invalid user osbash from 179.177.122.229 port 33476
Jul 23 12:58:15 netserv300 sshd[20103]: Connection from 179.177.122.229 port 39552 on 178.63.236.19 port 22
Jul 23 12:58:17 netserv300 sshd[20103]: Invalid user plexuser from 179.177.122.229 port 39552
Jul 23 12:58:19 netserv300 sshd[20108]: Connection from 179.177.122.229 port 43822 on 178.63.236.19 port 22
Jul 23 12:58:54 netserv300 sshd[20114]: Connection from 179.177.122.229 port 45886 on 178.63.236.19 port 22
Jul 23 12:59:01 netserv300 sshd[20116]: Connection from 179.177.122.229 port 51424 on 178.63.236.19 port 22
Jul 23 12:59:20 netserv300 sshd[20119]: Connection from 179.177.122.229 port 40880 on 178.63.236.19 port 22
Jul 23 12:59:50 netserv300 sshd[20125]: Con........
------------------------------
2019-07-23 21:38:23
70.36.102.87 attackbotsspam
Jul 23 11:17:06 nginx sshd[58938]: error: PAM: authentication error for root from 70.36.102.87
Jul 23 11:17:06 nginx sshd[58938]: Failed keyboard-interactive/pam for root from 70.36.102.87 port 50720 ssh2
2019-07-23 21:21:51
27.254.137.144 attackspam
Jul 23 07:48:33 vps200512 sshd\[29458\]: Invalid user me from 27.254.137.144
Jul 23 07:48:33 vps200512 sshd\[29458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144
Jul 23 07:48:35 vps200512 sshd\[29458\]: Failed password for invalid user me from 27.254.137.144 port 55866 ssh2
Jul 23 07:54:28 vps200512 sshd\[29588\]: Invalid user a from 27.254.137.144
Jul 23 07:54:28 vps200512 sshd\[29588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144
2019-07-23 20:48:43
149.202.214.11 attackspambots
Jul 23 09:32:36 vps200512 sshd\[32587\]: Invalid user signature from 149.202.214.11
Jul 23 09:32:36 vps200512 sshd\[32587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.214.11
Jul 23 09:32:38 vps200512 sshd\[32587\]: Failed password for invalid user signature from 149.202.214.11 port 35804 ssh2
Jul 23 09:37:01 vps200512 sshd\[32678\]: Invalid user demo from 149.202.214.11
Jul 23 09:37:01 vps200512 sshd\[32678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.214.11
2019-07-23 21:43:17
112.164.48.84 attackspambots
Automatic report - Banned IP Access
2019-07-23 21:24:10
193.29.13.20 attack
firewall-block, port(s): 3866/tcp
2019-07-23 21:13:35
191.53.199.230 attackspambots
failed_logins
2019-07-23 20:47:03
111.231.132.188 attackbots
Jul 23 15:25:32 dev0-dcde-rnet sshd[7187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.132.188
Jul 23 15:25:34 dev0-dcde-rnet sshd[7187]: Failed password for invalid user qt from 111.231.132.188 port 49718 ssh2
Jul 23 15:29:48 dev0-dcde-rnet sshd[7199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.132.188
2019-07-23 21:46:54
51.68.141.62 attack
Jul 23 15:18:00 SilenceServices sshd[25927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.141.62
Jul 23 15:18:03 SilenceServices sshd[25927]: Failed password for invalid user evan from 51.68.141.62 port 50372 ssh2
Jul 23 15:23:26 SilenceServices sshd[29936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.141.62
2019-07-23 21:40:20
49.207.33.2 attack
Jul 22 18:26:37 majoron sshd[3874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2  user=r.r
Jul 22 18:26:39 majoron sshd[3874]: Failed password for r.r from 49.207.33.2 port 34822 ssh2
Jul 22 18:26:39 majoron sshd[3874]: Received disconnect from 49.207.33.2 port 34822:11: Bye Bye [preauth]
Jul 22 18:26:39 majoron sshd[3874]: Disconnected from 49.207.33.2 port 34822 [preauth]
Jul 22 18:58:24 majoron sshd[5465]: Invalid user stefan from 49.207.33.2 port 58918
Jul 22 18:58:24 majoron sshd[5465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
Jul 22 18:58:26 majoron sshd[5465]: Failed password for invalid user stefan from 49.207.33.2 port 58918 ssh2
Jul 22 18:58:26 majoron sshd[5465]: Received disconnect from 49.207.33.2 port 58918:11: Bye Bye [preauth]
Jul 22 18:58:26 majoron sshd[5465]: Disconnected from 49.207.33.2 port 58918 [preauth]


........
-----------------------------------------------
https://www
2019-07-23 21:44:36
86.98.5.128 attackbots
Splunk® : port scan detected:
Jul 23 05:17:48 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=86.98.5.128 DST=104.248.11.191 LEN=44 TOS=0x00 PREC=0x00 TTL=56 ID=48810 PROTO=TCP SPT=35757 DPT=34567 WINDOW=46229 RES=0x00 SYN URGP=0
2019-07-23 20:55:34
162.144.84.235 attackbotsspam
C1,WP GET /digitale-produkte/wp-login.php
2019-07-23 21:56:00

Recently Reported IPs

193.111.116.163 180.184.196.138 184.210.95.224 28.68.225.78
168.168.89.106 255.160.240.156 47.255.16.159 9.67.36.155
66.204.21.241 26.254.215.228 236.23.209.163 233.27.113.89
40.174.230.229 36.157.70.212 161.93.65.21 126.115.230.26
136.227.23.3 154.46.205.235 249.41.148.240 145.59.23.143