Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.145.55.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.145.55.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 21:37:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
166.55.145.68.in-addr.arpa domain name pointer S010600241dd6a1ce.cg.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.55.145.68.in-addr.arpa	name = S010600241dd6a1ce.cg.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.77.154.53 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:30:24,082 INFO [amun_request_handler] PortScan Detected on Port: 139 (45.77.154.53)
2019-08-09 10:13:24
118.25.40.74 attackbotsspam
Aug  9 01:04:43 OPSO sshd\[18940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.40.74  user=root
Aug  9 01:04:44 OPSO sshd\[18940\]: Failed password for root from 118.25.40.74 port 60046 ssh2
Aug  9 01:10:10 OPSO sshd\[19729\]: Invalid user dy from 118.25.40.74 port 35540
Aug  9 01:10:10 OPSO sshd\[19729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.40.74
Aug  9 01:10:13 OPSO sshd\[19729\]: Failed password for invalid user dy from 118.25.40.74 port 35540 ssh2
2019-08-09 10:19:37
67.205.138.125 attack
Aug  9 04:06:27 ubuntu-2gb-nbg1-dc3-1 sshd[17247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.125
Aug  9 04:06:29 ubuntu-2gb-nbg1-dc3-1 sshd[17247]: Failed password for invalid user database from 67.205.138.125 port 36526 ssh2
...
2019-08-09 10:31:14
80.211.51.116 attack
Aug  8 21:40:32 TORMINT sshd\[21129\]: Invalid user adsl from 80.211.51.116
Aug  8 21:40:32 TORMINT sshd\[21129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.51.116
Aug  8 21:40:35 TORMINT sshd\[21129\]: Failed password for invalid user adsl from 80.211.51.116 port 44892 ssh2
...
2019-08-09 10:04:57
49.231.222.1 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:35:55,699 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.1)
2019-08-09 09:51:41
91.134.141.89 attack
Fail2Ban Ban Triggered
2019-08-09 09:45:34
103.51.153.235 attack
Aug  9 02:09:51 MK-Soft-VM6 sshd\[29659\]: Invalid user juan from 103.51.153.235 port 54690
Aug  9 02:09:51 MK-Soft-VM6 sshd\[29659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.51.153.235
Aug  9 02:09:52 MK-Soft-VM6 sshd\[29659\]: Failed password for invalid user juan from 103.51.153.235 port 54690 ssh2
...
2019-08-09 10:24:22
177.73.193.216 attackbots
SASL Brute Force
2019-08-09 09:45:01
103.114.107.209 attack
Aug  9 08:59:53 webhost01 sshd[602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.107.209
Aug  9 08:59:55 webhost01 sshd[602]: Failed password for invalid user support from 103.114.107.209 port 63599 ssh2
Aug  9 08:59:55 webhost01 sshd[602]: error: Received disconnect from 103.114.107.209 port 63599:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-08-09 10:25:36
109.163.193.66 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:31:22,695 INFO [amun_request_handler] PortScan Detected on Port: 445 (109.163.193.66)
2019-08-09 10:03:08
211.253.10.96 attack
Aug  9 03:57:44 icinga sshd[24704]: Failed password for root from 211.253.10.96 port 47492 ssh2
...
2019-08-09 10:28:01
119.9.77.176 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:49:58,314 INFO [shellcode_manager] (119.9.77.176) no match, writing hexdump (35704429de1a799830ba341ec6e055d0 :132) - SMB (Unknown) Vulnerability
2019-08-09 10:18:44
103.55.91.51 attackbots
Fail2Ban Ban Triggered
2019-08-09 09:53:21
183.82.120.134 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:30:36,112 INFO [amun_request_handler] PortScan Detected on Port: 445 (183.82.120.134)
2019-08-09 10:09:11
141.98.81.37 attackspambots
Aug  8 22:00:50 frobozz sshd\[774\]: Invalid user admin from 141.98.81.37 port 2176
Aug  8 22:00:51 frobozz sshd\[777\]: Invalid user ubnt from 141.98.81.37 port 41341
Aug  8 22:00:52 frobozz sshd\[782\]: Invalid user admin from 141.98.81.37 port 38110
...
2019-08-09 10:28:18

Recently Reported IPs

156.230.81.99 254.242.9.162 204.6.194.72 161.30.142.163
213.157.49.19 123.197.53.39 20.94.188.6 29.157.85.251
164.27.45.190 157.3.2.151 7.19.150.210 192.249.98.137
186.199.131.159 84.17.109.29 48.137.46.67 239.112.133.126
30.105.244.3 190.207.117.220 88.163.253.137 195.247.122.204