Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.182.0.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.182.0.66.			IN	A

;; AUTHORITY SECTION:
.			422	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090101 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 10:37:12 CST 2020
;; MSG SIZE  rcvd: 116
Host info
66.0.182.102.in-addr.arpa domain name pointer 102-182-0-66.ip.airmobile.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.0.182.102.in-addr.arpa	name = 102-182-0-66.ip.airmobile.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.229.103.67 attackbotsspam
May 29 07:14:21 ns382633 sshd\[23320\]: Invalid user testuser from 111.229.103.67 port 51074
May 29 07:14:21 ns382633 sshd\[23320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67
May 29 07:14:23 ns382633 sshd\[23320\]: Failed password for invalid user testuser from 111.229.103.67 port 51074 ssh2
May 29 07:19:55 ns382633 sshd\[24172\]: Invalid user adsl from 111.229.103.67 port 46188
May 29 07:19:55 ns382633 sshd\[24172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67
2020-05-29 16:47:15
104.244.73.193 attackbotsspam
Repeated RDP login failures. Last user: Administrator
2020-05-29 16:40:07
138.99.216.92 attackbotsspam
port
2020-05-29 16:29:26
160.153.146.165 attackspam
Attempts to probe web pages for vulnerable PHP or other applications
2020-05-29 16:42:38
104.5.109.148 attackbots
Invalid user admin from 104.5.109.148 port 53978
2020-05-29 16:21:09
45.14.150.51 attack
<6 unauthorized SSH connections
2020-05-29 16:38:15
127.0.0.1 attackbotsspam
Test Connectivity
2020-05-29 16:25:59
37.18.40.167 attack
Invalid user djones from 37.18.40.167 port 53470
2020-05-29 16:43:02
85.209.0.101 attackbots
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(05291023)
2020-05-29 16:28:21
182.151.214.29 attackbots
Failed password for invalid user admin from 182.151.214.29 port 2048 ssh2
2020-05-29 16:35:33
106.75.141.160 attackspambots
2020-05-29T07:36:38.682336abusebot-2.cloudsearch.cf sshd[9887]: Invalid user doug from 106.75.141.160 port 36482
2020-05-29T07:36:38.687810abusebot-2.cloudsearch.cf sshd[9887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
2020-05-29T07:36:38.682336abusebot-2.cloudsearch.cf sshd[9887]: Invalid user doug from 106.75.141.160 port 36482
2020-05-29T07:36:40.996648abusebot-2.cloudsearch.cf sshd[9887]: Failed password for invalid user doug from 106.75.141.160 port 36482 ssh2
2020-05-29T07:45:57.356990abusebot-2.cloudsearch.cf sshd[9982]: Invalid user markus from 106.75.141.160 port 53088
2020-05-29T07:45:57.361398abusebot-2.cloudsearch.cf sshd[9982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
2020-05-29T07:45:57.356990abusebot-2.cloudsearch.cf sshd[9982]: Invalid user markus from 106.75.141.160 port 53088
2020-05-29T07:45:59.409552abusebot-2.cloudsearch.cf sshd[9982]: Failed p
...
2020-05-29 16:32:59
27.71.227.197 attackspam
Failed password for invalid user caleb from 27.71.227.197 port 58948 ssh2
2020-05-29 16:16:26
113.70.181.32 attack
Email rejected due to spam filtering
2020-05-29 16:28:06
62.21.33.141 attack
5x Failed Password
2020-05-29 16:17:44
174.138.18.157 attack
2020-05-29T10:37:43.585503mail.broermann.family sshd[11810]: Failed password for root from 174.138.18.157 port 38744 ssh2
2020-05-29T10:41:30.909016mail.broermann.family sshd[11962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157  user=root
2020-05-29T10:41:33.523532mail.broermann.family sshd[11962]: Failed password for root from 174.138.18.157 port 42974 ssh2
2020-05-29T10:45:19.418609mail.broermann.family sshd[12112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157  user=root
2020-05-29T10:45:21.802422mail.broermann.family sshd[12112]: Failed password for root from 174.138.18.157 port 47198 ssh2
...
2020-05-29 16:50:53

Recently Reported IPs

199.1.92.165 164.77.94.212 154.90.202.196 11.68.137.60
100.166.173.47 87.231.251.6 165.73.32.54 194.161.188.212
138.129.14.35 148.168.205.77 184.248.192.244 199.138.200.42
13.51.184.240 222.6.41.217 168.66.253.14 74.206.131.192
49.22.99.45 198.89.135.59 88.104.104.156 208.74.104.147