Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.102.66.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36945
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.102.66.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:25:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
164.66.102.93.in-addr.arpa domain name pointer 93.102.66.164.rev.optimus.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.66.102.93.in-addr.arpa	name = 93.102.66.164.rev.optimus.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.15.93.206 attackbotsspam
51.15.93.206 was recorded 55 times by 21 hosts attempting to connect to the following ports: 4839,4986,4680,4200,4810,4952,4225,4016,4414,4779,4154,4715,4017,4741,4102,4128,4841,4694,4738,4605,4276,4375,4592,4323,4995,4797,4459,4859,4185,4748,4262,4707,4215,4599,4157,4109,4941,4889,4918,4503,4473,4274,4706,4108,4637,4692,4223,4905,4846,4666,4482,4579,4829. Incident counter (4h, 24h, all-time): 55, 196, 196
2019-11-19 16:16:27
148.66.132.190 attackspam
2019-11-19T07:32:19.659890abusebot.cloudsearch.cf sshd\[743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
2019-11-19 16:11:31
145.239.253.29 attackbotsspam
pfaffenroth-photographie.de 145.239.253.29 \[19/Nov/2019:07:26:59 +0100\] "POST /wp-login.php HTTP/1.1" 200 8452 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 145.239.253.29 \[19/Nov/2019:07:27:00 +0100\] "POST /wp-login.php HTTP/1.1" 200 8452 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 145.239.253.29 \[19/Nov/2019:07:27:01 +0100\] "POST /wp-login.php HTTP/1.1" 200 8452 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-19 16:20:50
212.129.138.198 attackbotsspam
Nov 19 12:32:56 gw1 sshd[3127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
Nov 19 12:32:58 gw1 sshd[3127]: Failed password for invalid user knoebel from 212.129.138.198 port 54586 ssh2
...
2019-11-19 15:53:00
61.187.135.168 attackbots
Nov 18 22:02:24 sachi sshd\[18413\]: Invalid user 1234\#@! from 61.187.135.168
Nov 18 22:02:24 sachi sshd\[18413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.187.135.168
Nov 18 22:02:27 sachi sshd\[18413\]: Failed password for invalid user 1234\#@! from 61.187.135.168 port 39722 ssh2
Nov 18 22:07:50 sachi sshd\[9240\]: Invalid user rootroot from 61.187.135.168
Nov 18 22:07:50 sachi sshd\[9240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.187.135.168
2019-11-19 16:26:22
102.141.114.28 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-19 16:22:31
185.176.27.18 attack
11/19/2019-09:03:47.679711 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-19 16:09:46
103.219.112.1 attack
F2B jail: sshd. Time: 2019-11-19 07:28:02, Reported by: VKReport
2019-11-19 15:54:26
139.219.7.243 attackbots
Nov 19 06:26:06 nxxxxxxx sshd[11863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.7.243  user=r.r
Nov 19 06:26:09 nxxxxxxx sshd[11863]: Failed password for r.r from 139.219.7.243 port 40854 ssh2
Nov 19 06:26:09 nxxxxxxx sshd[11863]: Received disconnect from 139.219.7.243: 11: Bye Bye [preauth]
Nov 19 06:48:12 nxxxxxxx sshd[13695]: Invalid user rcust from 139.219.7.243
Nov 19 06:48:12 nxxxxxxx sshd[13695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.7.243 
Nov 19 06:48:14 nxxxxxxx sshd[13695]: Failed password for invalid user rcust from 139.219.7.243 port 50946 ssh2
Nov 19 06:48:15 nxxxxxxx sshd[13695]: Received disconnect from 139.219.7.243: 11: Bye Bye [preauth]
Nov 19 06:53:58 nxxxxxxx sshd[14117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.7.243  user=r.r
Nov 19 06:54:01 nxxxxxxx sshd[14117]: Failed password for ........
-------------------------------
2019-11-19 16:16:58
51.254.37.192 attackspam
Nov 19 08:28:26 SilenceServices sshd[19261]: Failed password for mysql from 51.254.37.192 port 50730 ssh2
Nov 19 08:31:57 SilenceServices sshd[20256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192
Nov 19 08:31:58 SilenceServices sshd[20256]: Failed password for invalid user fee_office from 51.254.37.192 port 58746 ssh2
2019-11-19 15:53:29
222.186.169.194 attackspam
Nov 17 18:26:24 microserver sshd[13002]: Failed none for root from 222.186.169.194 port 50198 ssh2
Nov 17 18:26:25 microserver sshd[13002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Nov 17 18:26:26 microserver sshd[13002]: Failed password for root from 222.186.169.194 port 50198 ssh2
Nov 17 18:26:29 microserver sshd[13002]: Failed password for root from 222.186.169.194 port 50198 ssh2
Nov 17 18:26:33 microserver sshd[13002]: Failed password for root from 222.186.169.194 port 50198 ssh2
Nov 18 08:10:38 microserver sshd[57285]: Failed none for root from 222.186.169.194 port 22792 ssh2
Nov 18 08:10:39 microserver sshd[57285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Nov 18 08:10:41 microserver sshd[57285]: Failed password for root from 222.186.169.194 port 22792 ssh2
Nov 18 08:10:44 microserver sshd[57285]: Failed password for root from 222.186.169.194 port 22792 ssh2
2019-11-19 15:51:15
185.175.93.18 attackspambots
11/19/2019-08:34:11.675317 185.175.93.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-19 15:56:01
103.219.112.61 attackspambots
Nov 19 08:30:16 h2177944 sshd\[2804\]: Invalid user PCORP1000 from 103.219.112.61 port 59892
Nov 19 08:30:16 h2177944 sshd\[2804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.61
Nov 19 08:30:18 h2177944 sshd\[2804\]: Failed password for invalid user PCORP1000 from 103.219.112.61 port 59892 ssh2
Nov 19 08:34:51 h2177944 sshd\[2956\]: Invalid user kouba from 103.219.112.61 port 54920
...
2019-11-19 16:21:56
159.224.226.164 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-19 15:51:36
45.253.26.34 attackbotsspam
Failed password for root from 45.253.26.34 port 55520 ssh2
Invalid user ip6 from 45.253.26.34 port 34146
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.253.26.34
Failed password for invalid user ip6 from 45.253.26.34 port 34146 ssh2
Invalid user monem from 45.253.26.34 port 41014
2019-11-19 16:14:49

Recently Reported IPs

66.173.215.35 132.101.26.50 18.20.121.48 123.30.86.56
122.11.151.32 20.205.227.31 48.183.217.245 153.145.220.89
167.141.195.40 253.233.242.191 119.218.232.8 214.5.50.71
26.213.19.169 190.226.216.53 8.23.59.133 242.77.35.224
199.175.167.223 6.189.216.170 176.19.82.69 69.38.3.177