Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Baschi

Region: Umbria

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: Forinicom S.r.l.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.189.138.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42846
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.189.138.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 01:46:52 CST 2019
;; MSG SIZE  rcvd: 117

Host info
66.138.189.93.in-addr.arpa domain name pointer customer-93-189-138-66.com-com.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.138.189.93.in-addr.arpa	name = customer-93-189-138-66.com-com.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
94.102.56.215 attackspambots
94.102.56.215 was recorded 19 times by 10 hosts attempting to connect to the following ports: 24265,24292,21234. Incident counter (4h, 24h, all-time): 19, 123, 7072
2020-03-08 21:11:09
218.35.55.60 attackbotsspam
23/tcp
[2020-03-08]1pkt
2020-03-08 20:56:01
175.212.9.94 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 20:46:54
118.36.21.28 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-08 21:18:54
49.205.151.201 attackbotsspam
Honeypot attack, port: 5555, PTR: broadband.actcorp.in.
2020-03-08 20:44:33
5.112.60.187 attackspam
1583642847 - 03/08/2020 05:47:27 Host: 5.112.60.187/5.112.60.187 Port: 445 TCP Blocked
2020-03-08 21:16:56
217.182.78.153 attackspam
Jan 14 15:02:57 ms-srv sshd[20254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.78.153
Jan 14 15:02:59 ms-srv sshd[20254]: Failed password for invalid user indiana from 217.182.78.153 port 50290 ssh2
2020-03-08 21:24:08
142.44.185.242 attackspambots
$f2bV_matches
2020-03-08 21:19:26
185.71.117.233 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 21:21:56
116.108.115.68 attackspambots
Automatic report - Port Scan Attack
2020-03-08 21:20:01
180.250.248.170 attackbots
Sep 10 07:18:10 ms-srv sshd[52810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.170
Sep 10 07:18:11 ms-srv sshd[52810]: Failed password for invalid user ts3srv from 180.250.248.170 port 53744 ssh2
2020-03-08 21:11:56
61.7.142.187 attack
Unauthorized connection attempt from IP address 61.7.142.187 on Port 445(SMB)
2020-03-08 20:54:36
50.116.101.52 attackspam
Mar  8 02:49:20 firewall sshd[19073]: Invalid user hadoop from 50.116.101.52
Mar  8 02:49:22 firewall sshd[19073]: Failed password for invalid user hadoop from 50.116.101.52 port 43738 ssh2
Mar  8 02:54:07 firewall sshd[19156]: Invalid user sysadmin from 50.116.101.52
...
2020-03-08 21:00:24
182.253.66.123 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-03-08 20:54:02
5.196.65.74 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-08 20:41:34

Recently Reported IPs

159.105.82.67 93.158.161.55 94.98.105.121 118.111.245.230
124.123.106.104 61.14.67.72 111.239.246.140 86.132.77.254
190.248.151.26 165.244.201.236 80.90.200.8 172.109.101.201
55.203.38.234 23.242.200.228 55.160.29.223 17.111.241.132
99.14.132.10 47.243.29.172 120.112.109.203 199.217.122.48