Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Køge

Region: Zealand

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: Tele Danmark

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.163.22.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9272
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.163.22.166.			IN	A

;; AUTHORITY SECTION:
.			72	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070901 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 10 03:18:19 CST 2019
;; MSG SIZE  rcvd: 117
Host info
166.22.163.80.in-addr.arpa domain name pointer 80-163-22-166-cable.dk.customer.tdc.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
166.22.163.80.in-addr.arpa	name = 80-163-22-166-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
67.205.138.125 attackspambots
Invalid user jira from 67.205.138.125 port 46606
2019-06-26 18:14:56
167.114.97.209 attackspam
Attempted SSH login
2019-06-26 17:39:00
115.238.188.210 attackbotsspam
Jun 26 08:31:51 nginx sshd[7207]: error: maximum authentication attempts exceeded for root from 115.238.188.210 port 34587 ssh2 [preauth]
Jun 26 08:31:51 nginx sshd[7207]: Disconnecting: Too many authentication failures [preauth]
2019-06-26 18:13:21
140.255.217.12 attackspambots
Scanning and Vuln Attempts
2019-06-26 18:07:18
113.121.242.242 attackbots
$f2bV_matches
2019-06-26 18:25:45
198.46.140.106 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-26 18:27:23
41.141.250.244 attackbots
Jun 26 09:17:36 Proxmox sshd\[7211\]: Invalid user smbuser from 41.141.250.244 port 51938
Jun 26 09:17:36 Proxmox sshd\[7211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.141.250.244
Jun 26 09:17:38 Proxmox sshd\[7211\]: Failed password for invalid user smbuser from 41.141.250.244 port 51938 ssh2
2019-06-26 18:05:11
198.245.50.81 attackbots
Jun 25 23:05:03 cac1d2 sshd\[20728\]: Invalid user bie from 198.245.50.81 port 48152
Jun 25 23:05:03 cac1d2 sshd\[20728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Jun 25 23:05:05 cac1d2 sshd\[20728\]: Failed password for invalid user bie from 198.245.50.81 port 48152 ssh2
...
2019-06-26 18:31:08
124.156.210.20 attack
8554/tcp 1025/tcp
[2019-06-23/26]2pkt
2019-06-26 17:53:47
185.137.111.22 attackspambots
Jun 26 11:25:12 mail postfix/smtpd\[7533\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 11:55:46 mail postfix/smtpd\[8235\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 11:56:23 mail postfix/smtpd\[8235\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 11:56:59 mail postfix/smtpd\[8235\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-06-26 18:01:32
35.232.110.83 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2019-06-26 18:26:14
191.53.197.162 attackbots
failed_logins
2019-06-26 17:38:39
139.59.7.171 attack
Scanning and Vuln Attempts
2019-06-26 18:25:04
185.58.205.10 attack
Jun 26 08:58:25 s64-1 sshd[23644]: Failed password for sshd from 185.58.205.10 port 59158 ssh2
Jun 26 08:58:26 s64-1 sshd[23647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.58.205.10
Jun 26 08:58:28 s64-1 sshd[23647]: Failed password for invalid user steve from 185.58.205.10 port 59630 ssh2
...
2019-06-26 17:42:13
36.77.214.88 attackbotsspam
Unauthorized connection attempt from IP address 36.77.214.88 on Port 445(SMB)
2019-06-26 17:54:20

Recently Reported IPs

160.148.54.60 161.50.154.16 121.149.102.39 5.207.210.4
94.75.17.6 151.250.116.23 90.190.97.40 63.206.254.207
126.241.215.241 114.94.126.135 108.242.235.7 118.143.240.25
77.222.117.145 210.18.238.30 115.82.139.158 81.163.151.4
46.199.212.206 14.233.128.108 213.3.177.154 89.33.90.35