Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.6.66.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.6.66.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 19:37:12 CST 2025
;; MSG SIZE  rcvd: 103
Host info
143.66.6.5.in-addr.arpa domain name pointer dynamic-005-006-066-143.5.6.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.66.6.5.in-addr.arpa	name = dynamic-005-006-066-143.5.6.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.129.22.130 attackbotsspam
19.05.2020 15:52:56 SSH access blocked by firewall
2020-05-20 00:26:25
186.122.149.144 attack
"Unauthorized connection attempt on SSHD detected"
2020-05-20 00:53:57
163.44.150.247 attack
May 19 18:29:39 OPSO sshd\[21125\]: Invalid user qwi from 163.44.150.247 port 33726
May 19 18:29:39 OPSO sshd\[21125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
May 19 18:29:41 OPSO sshd\[21125\]: Failed password for invalid user qwi from 163.44.150.247 port 33726 ssh2
May 19 18:31:14 OPSO sshd\[21765\]: Invalid user maj from 163.44.150.247 port 45253
May 19 18:31:14 OPSO sshd\[21765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
2020-05-20 00:51:51
111.207.63.214 attackbots
Invalid user ctb from 111.207.63.214 port 16350
2020-05-20 00:52:27
46.105.124.55 attackbots
IP logged in to several online accounts and had access to my email which it was using to rest passwords etc.
2020-05-20 00:13:22
106.13.112.221 attackbots
May 19 11:52:46 cp sshd[28349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.112.221
May 19 11:52:46 cp sshd[28349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.112.221
2020-05-20 00:40:44
159.89.121.79 attackbots
19.05.2020 11:53:50 - Wordpress fail 
Detected by ELinOX-ALM
2020-05-20 00:22:24
52.191.14.95 attackbotsspam
May 18 15:19:44 master sshd[28057]: Failed password for invalid user qxl from 52.191.14.95 port 44400 ssh2
May 18 15:29:02 master sshd[28098]: Failed password for invalid user fty from 52.191.14.95 port 33634 ssh2
May 18 15:32:38 master sshd[28512]: Failed password for invalid user tzu from 52.191.14.95 port 42014 ssh2
May 18 15:36:38 master sshd[28514]: Failed password for invalid user fbi from 52.191.14.95 port 50486 ssh2
May 18 15:40:50 master sshd[28592]: Failed password for invalid user xpj from 52.191.14.95 port 59002 ssh2
May 18 15:44:50 master sshd[28594]: Failed password for invalid user sja from 52.191.14.95 port 39244 ssh2
May 18 15:48:41 master sshd[28636]: Failed password for invalid user uue from 52.191.14.95 port 47678 ssh2
May 18 15:52:48 master sshd[28673]: Failed password for invalid user ps from 52.191.14.95 port 56174 ssh2
May 18 15:56:56 master sshd[28677]: Failed password for invalid user dzr from 52.191.14.95 port 36450 ssh2
2020-05-20 00:54:16
106.13.19.137 attack
May 19 18:44:24 meumeu sshd[182658]: Invalid user sjr from 106.13.19.137 port 35876
May 19 18:44:24 meumeu sshd[182658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.137 
May 19 18:44:24 meumeu sshd[182658]: Invalid user sjr from 106.13.19.137 port 35876
May 19 18:44:26 meumeu sshd[182658]: Failed password for invalid user sjr from 106.13.19.137 port 35876 ssh2
May 19 18:47:29 meumeu sshd[183155]: Invalid user nwo from 106.13.19.137 port 42784
May 19 18:47:29 meumeu sshd[183155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.137 
May 19 18:47:29 meumeu sshd[183155]: Invalid user nwo from 106.13.19.137 port 42784
May 19 18:47:31 meumeu sshd[183155]: Failed password for invalid user nwo from 106.13.19.137 port 42784 ssh2
May 19 18:50:46 meumeu sshd[183592]: Invalid user xzr from 106.13.19.137 port 49692
...
2020-05-20 01:00:18
159.65.41.159 attack
2020-05-19T11:45:32.799274scmdmz1 sshd[18643]: Invalid user vgt from 159.65.41.159 port 58442
2020-05-19T11:45:34.369720scmdmz1 sshd[18643]: Failed password for invalid user vgt from 159.65.41.159 port 58442 ssh2
2020-05-19T11:53:39.875348scmdmz1 sshd[19666]: Invalid user qlh from 159.65.41.159 port 60998
...
2020-05-20 00:24:48
222.186.173.154 attackbotsspam
2020-05-19T18:51:59.291054sd-86998 sshd[33752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-05-19T18:52:01.174804sd-86998 sshd[33752]: Failed password for root from 222.186.173.154 port 55724 ssh2
2020-05-19T18:52:04.782816sd-86998 sshd[33752]: Failed password for root from 222.186.173.154 port 55724 ssh2
2020-05-19T18:51:59.291054sd-86998 sshd[33752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-05-19T18:52:01.174804sd-86998 sshd[33752]: Failed password for root from 222.186.173.154 port 55724 ssh2
2020-05-19T18:52:04.782816sd-86998 sshd[33752]: Failed password for root from 222.186.173.154 port 55724 ssh2
2020-05-19T18:51:59.291054sd-86998 sshd[33752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-05-19T18:52:01.174804sd-86998 sshd[33752]: Failed password for roo
...
2020-05-20 00:57:34
209.97.171.56 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-05-20 00:21:35
83.102.58.122 attackbotsspam
$f2bV_matches
2020-05-20 00:53:01
106.12.119.218 attackspambots
Invalid user lkw from 106.12.119.218 port 48412
2020-05-20 01:02:17
49.233.177.99 attack
May 19 18:09:14 vps647732 sshd[21468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.177.99
May 19 18:09:16 vps647732 sshd[21468]: Failed password for invalid user kbk from 49.233.177.99 port 49952 ssh2
...
2020-05-20 00:17:23

Recently Reported IPs

54.32.72.26 94.105.178.190 30.132.249.246 28.197.112.145
29.239.104.21 174.250.182.159 164.200.132.22 126.21.197.80
71.233.233.139 123.84.29.195 122.190.228.173 133.188.83.154
2806:102e:d:7111:65da:698e:5c54:54dd 38.199.126.227 182.225.233.189 115.59.98.15
115.63.35.162 135.193.240.209 116.223.207.142 97.113.94.2