Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.163.191.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.163.191.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 20:02:47 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.191.163.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.191.163.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.195.157.107 attackbots
879. On Jun 15 2020 experienced a Brute Force SSH login attempt -> 49 unique times by 51.195.157.107.
2020-06-16 07:07:07
37.193.61.38 attackbots
Jun 15 19:31:41 ws12vmsma01 sshd[33116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-193-61-38.novotelecom.ru 
Jun 15 19:31:41 ws12vmsma01 sshd[33116]: Invalid user pramod from 37.193.61.38
Jun 15 19:31:43 ws12vmsma01 sshd[33116]: Failed password for invalid user pramod from 37.193.61.38 port 51704 ssh2
...
2020-06-16 06:47:04
106.52.248.175 attackspam
DATE:2020-06-16 00:28:26, IP:106.52.248.175, PORT:ssh SSH brute force auth (docker-dc)
2020-06-16 07:13:25
197.62.204.3 attackbots
Jun 16 03:33:43 itv-usvr-01 sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.204.3  user=root
Jun 16 03:33:45 itv-usvr-01 sshd[13586]: Failed password for root from 197.62.204.3 port 44339 ssh2
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: Invalid user dio from 197.62.204.3
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.204.3
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: Invalid user dio from 197.62.204.3
Jun 16 03:42:09 itv-usvr-01 sshd[14032]: Failed password for invalid user dio from 197.62.204.3 port 28097 ssh2
2020-06-16 07:23:47
163.172.145.149 attackspam
Jun 15 22:14:50 pbkit sshd[4178301]: Invalid user it from 163.172.145.149 port 60898
Jun 15 22:14:52 pbkit sshd[4178301]: Failed password for invalid user it from 163.172.145.149 port 60898 ssh2
Jun 15 22:22:30 pbkit sshd[4178570]: Invalid user hl from 163.172.145.149 port 50678
...
2020-06-16 07:17:40
203.130.242.68 attackbotsspam
Invalid user demo from 203.130.242.68 port 54088
2020-06-16 07:18:54
198.71.61.38 attackspambots
Brute-force attempt banned
2020-06-16 07:01:58
114.67.64.210 attackbots
2020-06-16T00:16:23.728241vps773228.ovh.net sshd[23487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.64.210  user=root
2020-06-16T00:16:25.158107vps773228.ovh.net sshd[23487]: Failed password for root from 114.67.64.210 port 36238 ssh2
2020-06-16T00:17:59.452920vps773228.ovh.net sshd[23495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.64.210  user=root
2020-06-16T00:18:01.394866vps773228.ovh.net sshd[23495]: Failed password for root from 114.67.64.210 port 53976 ssh2
2020-06-16T00:19:28.150683vps773228.ovh.net sshd[23499]: Invalid user student5 from 114.67.64.210 port 43634
...
2020-06-16 07:00:58
218.92.0.168 attackspam
Jun 16 00:48:19 vmi345603 sshd[17498]: Failed password for root from 218.92.0.168 port 11777 ssh2
Jun 16 00:48:22 vmi345603 sshd[17498]: Failed password for root from 218.92.0.168 port 11777 ssh2
...
2020-06-16 06:51:34
134.209.101.140 attackspambots
2020-06-15T18:18:24.2443791495-001 sshd[22107]: Invalid user wj from 134.209.101.140 port 56463
2020-06-15T18:18:25.9535071495-001 sshd[22107]: Failed password for invalid user wj from 134.209.101.140 port 56463 ssh2
2020-06-15T18:22:26.6417441495-001 sshd[22369]: Invalid user lux from 134.209.101.140 port 50174
2020-06-15T18:22:26.6464981495-001 sshd[22369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.101.140
2020-06-15T18:22:26.6417441495-001 sshd[22369]: Invalid user lux from 134.209.101.140 port 50174
2020-06-15T18:22:28.2417411495-001 sshd[22369]: Failed password for invalid user lux from 134.209.101.140 port 50174 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.209.101.140
2020-06-16 07:18:14
45.148.10.217 attackspam
2020-06-15 22:32:30 auth_plain authenticator failed for (User) [45.148.10.217]: 535 Incorrect authentication data (set_id=louis@csmailer.org,)
2020-06-15 22:32:30 auth_plain authenticator failed for (User) [45.148.10.217]: 535 Incorrect authentication data (set_id=louis@csmailer.org,)
2020-06-15 22:32:30 auth_plain authenticator failed for (User) [45.148.10.217]: 535 Incorrect authentication data (set_id=louis@csmailer.org,)
2020-06-15 22:32:30 auth_plain authenticator failed for (User) [45.148.10.217]: 535 Incorrect authentication data (set_id=louis@csmailer.org,)
2020-06-15 22:32:30 auth_plain authenticator failed for (User) [45.148.10.217]: 535 Incorrect authentication data (set_id=louis@csmailer.org,)
...
2020-06-16 06:46:52
45.143.223.14 attackbots
SMTP relay access denied
2020-06-16 06:56:32
139.59.249.255 attackbots
228. On Jun 15 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 139.59.249.255.
2020-06-16 06:57:54
192.144.232.49 attackspambots
Jun 16 00:05:13 nbi10206 sshd[7247]: Invalid user ahg from 192.144.232.49 port 37692
Jun 16 00:05:15 nbi10206 sshd[7247]: Failed password for invalid user ahg from 192.144.232.49 port 37692 ssh2
Jun 16 00:05:15 nbi10206 sshd[7247]: Received disconnect from 192.144.232.49 port 37692:11: Bye Bye [preauth]
Jun 16 00:05:15 nbi10206 sshd[7247]: Disconnected from 192.144.232.49 port 37692 [preauth]
Jun 16 00:18:51 nbi10206 sshd[20310]: User r.r from 192.144.232.49 not allowed because not listed in AllowUsers
Jun 16 00:18:51 nbi10206 sshd[20310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.232.49  user=r.r
Jun 16 00:18:53 nbi10206 sshd[20310]: Failed password for invalid user r.r from 192.144.232.49 port 48310 ssh2
Jun 16 00:18:53 nbi10206 sshd[20310]: Received disconnect from 192.144.232.49 port 48310:11: Bye Bye [preauth]
Jun 16 00:18:53 nbi10206 sshd[20310]: Disconnected from 192.144.232.49 port 48310 [preauth]
Jun 16 00:2........
-------------------------------
2020-06-16 06:48:20
124.156.218.80 attackbots
Jun 15 22:27:52 scw-6657dc sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.218.80
Jun 15 22:27:52 scw-6657dc sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.218.80
Jun 15 22:27:54 scw-6657dc sshd[15648]: Failed password for invalid user ubuntu from 124.156.218.80 port 55790 ssh2
...
2020-06-16 06:53:12

Recently Reported IPs

6.109.26.117 142.246.113.66 103.145.0.225 213.103.61.84
148.244.190.103 161.142.234.147 78.1.33.13 96.172.104.101
210.17.30.153 96.163.251.73 181.205.118.168 47.42.239.146
160.86.186.249 182.154.171.233 237.110.162.110 204.114.210.106
15.168.194.238 141.27.81.250 239.227.36.206 147.162.111.97