Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Eolo S.p.A.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2020-05-27 03:09:00
attackspambots
Dovecot Invalid User Login Attempt.
2020-05-24 14:35:57
attackbotsspam
*Port Scan* detected from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it). 4 hits in the last 270 seconds
2020-03-05 05:04:40
attackbotsspam
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2020-02-29 03:38:45
attackbots
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2020-02-24 00:34:16
attackspam
$f2bV_matches
2020-01-25 03:01:12
attackspam
Nov  2 12:51:10 xeon cyrus/imap[50713]: badlogin: 5-157-96-66.v4.ngi.it [5.157.96.66] plain [SASL(-13): authentication failure: Password verification failed]
2019-11-03 01:37:00
attackspambots
(imapd) Failed IMAP login from 5.157.96.66 (IT/Italy/5-157-96-66.v4.ngi.it): 1 in the last 3600 secs
2019-10-06 23:55:24
attackspambots
2019/08/15 09:20:12 \[error\] 3563\#0: \*29829 An error occurred in mail zmauth: user not found:barszcz37@*fathog.com while SSL handshaking to lookup handler, client: 5.157.96.66:60254, server: 45.79.145.195:993, login: "barszcz37@*fathog.com"
2019-08-16 02:49:06
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.157.96.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13084
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.157.96.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 02 12:03:22 +08 2019
;; MSG SIZE  rcvd: 115

Host info
66.96.157.5.in-addr.arpa domain name pointer 5-157-96-66.v4.ngi.it.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
66.96.157.5.in-addr.arpa	name = 5-157-96-66.v4.ngi.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
176.48.150.14 attackspambots
Automatic report - Port Scan Attack
2019-10-16 12:10:13
213.79.91.100 attackspambots
Unauthorized connection attempt from IP address 213.79.91.100 on Port 445(SMB)
2019-10-16 12:28:18
206.189.81.101 attack
Oct 14 08:43:29 finn sshd[28155]: Invalid user dpisklo from 206.189.81.101 port 58464
Oct 14 08:43:29 finn sshd[28155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.81.101
Oct 14 08:43:32 finn sshd[28155]: Failed password for invalid user dpisklo from 206.189.81.101 port 58464 ssh2
Oct 14 08:43:32 finn sshd[28155]: Received disconnect from 206.189.81.101 port 58464:11: Bye Bye [preauth]
Oct 14 08:43:32 finn sshd[28155]: Disconnected from 206.189.81.101 port 58464 [preauth]
Oct 14 08:58:05 finn sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.81.101  user=r.r
Oct 14 08:58:08 finn sshd[31088]: Failed password for r.r from 206.189.81.101 port 37580 ssh2
Oct 14 08:58:08 finn sshd[31088]: Received disconnect from 206.189.81.101 port 37580:11: Bye Bye [preauth]
Oct 14 08:58:08 finn sshd[31088]: Disconnected from 206.189.81.101 port 37580 [preauth]
Oct 14 09:02:28 fin........
-------------------------------
2019-10-16 12:04:59
1.203.115.64 attack
Oct 16 05:26:18 v22019058497090703 sshd[7421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.64
Oct 16 05:26:20 v22019058497090703 sshd[7421]: Failed password for invalid user marilena from 1.203.115.64 port 44190 ssh2
Oct 16 05:31:30 v22019058497090703 sshd[7766]: Failed password for root from 1.203.115.64 port 33634 ssh2
...
2019-10-16 12:20:51
51.68.82.218 attackspam
Oct 16 05:59:50 OPSO sshd\[25087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218  user=root
Oct 16 05:59:51 OPSO sshd\[25087\]: Failed password for root from 51.68.82.218 port 38572 ssh2
Oct 16 06:03:56 OPSO sshd\[25919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218  user=root
Oct 16 06:03:58 OPSO sshd\[25919\]: Failed password for root from 51.68.82.218 port 49652 ssh2
Oct 16 06:08:08 OPSO sshd\[26663\]: Invalid user fg from 51.68.82.218 port 60728
Oct 16 06:08:08 OPSO sshd\[26663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218
2019-10-16 12:11:57
125.209.67.52 attackspambots
Unauthorized connection attempt from IP address 125.209.67.52 on Port 445(SMB)
2019-10-16 12:07:46
117.7.238.84 attackspambots
Unauthorized connection attempt from IP address 117.7.238.84 on Port 445(SMB)
2019-10-16 12:25:26
118.70.129.18 attack
Unauthorized connection attempt from IP address 118.70.129.18 on Port 445(SMB)
2019-10-16 11:49:20
173.54.164.60 attackbots
Unauthorized connection attempt from IP address 173.54.164.60 on Port 445(SMB)
2019-10-16 12:17:25
119.247.102.187 attackbots
Port scan on 1 port(s): 5555
2019-10-16 12:13:12
200.201.217.104 attack
$f2bV_matches
2019-10-16 12:18:45
196.29.33.74 attackbotsspam
Unauthorized connection attempt from IP address 196.29.33.74 on Port 445(SMB)
2019-10-16 12:19:18
171.240.243.35 attack
Unauthorized connection attempt from IP address 171.240.243.35 on Port 445(SMB)
2019-10-16 12:20:28
199.115.128.241 attackbots
Oct 15 17:41:51 hanapaa sshd\[4385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.128.241  user=root
Oct 15 17:41:54 hanapaa sshd\[4385\]: Failed password for root from 199.115.128.241 port 32899 ssh2
Oct 15 17:45:18 hanapaa sshd\[4663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.128.241  user=root
Oct 15 17:45:20 hanapaa sshd\[4663\]: Failed password for root from 199.115.128.241 port 52332 ssh2
Oct 15 17:48:54 hanapaa sshd\[4950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.128.241  user=root
2019-10-16 12:02:30
185.175.93.14 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 2623 proto: TCP cat: Misc Attack
2019-10-16 11:57:11

Recently Reported IPs

122.165.202.243 103.111.56.168 128.199.59.39 223.205.246.159
136.233.36.124 41.215.4.178 183.91.4.134 202.141.243.202
36.67.24.109 125.209.85.2 187.237.125.104 139.199.16.145
87.120.179.74 188.169.108.206 119.110.198.116 203.201.63.34
178.128.125.61 182.76.220.54 58.187.12.239 104.236.102.16