Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.66.6.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;91.66.6.116.			IN	A

;; AUTHORITY SECTION:
.			185	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 12:51:19 CST 2019
;; MSG SIZE  rcvd: 115
Host info
116.6.66.91.in-addr.arpa domain name pointer ip5b420674.dynamic.kabel-deutschland.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.6.66.91.in-addr.arpa	name = ip5b420674.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.62.108.111 attack
Aug 12 15:22:20 plusreed sshd[29184]: Invalid user nice from 178.62.108.111
Aug 12 15:22:20 plusreed sshd[29184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.108.111
Aug 12 15:22:20 plusreed sshd[29184]: Invalid user nice from 178.62.108.111
Aug 12 15:22:22 plusreed sshd[29184]: Failed password for invalid user nice from 178.62.108.111 port 49794 ssh2
...
2019-08-13 03:35:39
95.111.74.98 attackbotsspam
Unauthorized SSH login attempts
2019-08-13 03:23:08
5.196.27.26 attack
Aug 12 20:56:54 v22019058497090703 sshd[442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.27.26
Aug 12 20:56:56 v22019058497090703 sshd[442]: Failed password for invalid user ubuntu from 5.196.27.26 port 50164 ssh2
Aug 12 21:01:10 v22019058497090703 sshd[805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.27.26
...
2019-08-13 03:32:19
2001:e68:4429:46c7:5c07:2734:9b71:871a attack
C1,WP GET /wp-login.php
2019-08-13 03:02:33
196.196.34.41 attack
Automatic report - Banned IP Access
2019-08-13 03:26:52
76.68.130.107 attack
*Port Scan* detected from 76.68.130.107 (CA/Canada/toroon4318w-lp130-01-76-68-130-107.dsl.bell.ca). 4 hits in the last 15 seconds
2019-08-13 03:38:32
35.220.141.147 attackbots
www.goldgier.de 35.220.141.147 \[12/Aug/2019:14:16:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 8724 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 35.220.141.147 \[12/Aug/2019:14:16:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 8724 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-13 03:19:46
175.198.81.71 attackbotsspam
Aug 12 20:02:09 xeon sshd[51887]: Failed password for invalid user n from 175.198.81.71 port 45956 ssh2
2019-08-13 03:31:56
171.25.193.20 attackspambots
Aug 12 20:31:37 debian sshd\[11736\]: Invalid user user from 171.25.193.20 port 42425
Aug 12 20:31:37 debian sshd\[11736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20
...
2019-08-13 03:34:29
185.159.32.15 attackspam
$f2bV_matches_ltvn
2019-08-13 03:06:45
84.3.2.59 attack
Aug 12 19:20:27 localhost sshd\[126105\]: Invalid user kodi from 84.3.2.59 port 34206
Aug 12 19:20:27 localhost sshd\[126105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.3.2.59
Aug 12 19:20:29 localhost sshd\[126105\]: Failed password for invalid user kodi from 84.3.2.59 port 34206 ssh2
Aug 12 19:25:25 localhost sshd\[126397\]: Invalid user marcus from 84.3.2.59 port 55790
Aug 12 19:25:25 localhost sshd\[126397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.3.2.59
...
2019-08-13 03:34:45
188.213.28.140 attackspambots
Automatic report - Banned IP Access
2019-08-13 03:28:47
203.99.62.158 attackspambots
Aug 12 14:17:02 xtremcommunity sshd\[17909\]: Invalid user ibmuser from 203.99.62.158 port 14097
Aug 12 14:17:02 xtremcommunity sshd\[17909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
Aug 12 14:17:04 xtremcommunity sshd\[17909\]: Failed password for invalid user ibmuser from 203.99.62.158 port 14097 ssh2
Aug 12 14:22:14 xtremcommunity sshd\[18034\]: Invalid user theresa from 203.99.62.158 port 38411
Aug 12 14:22:14 xtremcommunity sshd\[18034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
...
2019-08-13 03:24:28
162.247.72.199 attackbotsspam
Splunk® : Brute-Force login attempt on SSH:
Aug 12 14:44:51 testbed sshd[14091]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=root
2019-08-13 03:01:41
198.108.67.21 attackspam
5902/tcp 4567/tcp 21/tcp...
[2019-06-14/08-12]15pkt,12pt.(tcp)
2019-08-13 03:38:54

Recently Reported IPs

177.41.249.239 24.28.145.96 104.131.197.193 68.172.45.119
176.69.169.247 45.76.33.120 123.216.162.45 169.219.243.50
146.106.111.217 91.133.20.219 82.242.209.255 86.130.18.38
18.36.45.74 105.16.176.87 53.12.67.182 199.247.48.42
147.211.75.64 146.56.85.111 91.250.218.242 171.210.170.221