Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cradock

Region: Eastern Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.66.234.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.66.234.52.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 09:51:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 52.234.66.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.234.66.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.82.47.47 attack
Unauthorized connection attempt from IP address 74.82.47.47 on Port 3389(RDP)
2019-07-25 08:20:29
51.38.150.105 attackbots
Jul 24 18:34:01 lnxmail61 sshd[19542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.150.105
Jul 24 18:34:02 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
Jul 24 18:34:05 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
Jul 24 18:34:07 lnxmail61 sshd[19542]: Failed password for invalid user admin from 51.38.150.105 port 59154 ssh2
2019-07-25 07:41:40
74.82.47.5 attackbotsspam
3389BruteforceFW21
2019-07-25 08:09:45
123.162.181.55 attack
Unauthorized connection attempt from IP address 123.162.181.55 on Port 445(SMB)
2019-07-25 08:04:29
107.173.51.220 attackspam
(From edwardfleetwood1@gmail.com) Greetings!

Have you ever thought about increasing the number of visits your website gets? Are you confident your business website gets enough exposure from potential clients who are searching online? To have your site optimized can also substantially boost how much profit you can make out of your website. I can help you achieve it!

I've worked with many clients in the past six years, and they were all extremely pleased with the work I accomplished for them. I'll show you some case studies if you're curious about how this works. For now, I'm offering you a free consultation over the phone, so I can show you the data about your site's potential. Kindly write back with the best number to reach you out with and your preferred time for a call. I look forward to speaking with you soon. 

Best regards,
Edward Fleetwood
2019-07-25 07:56:09
102.165.49.175 attack
Unauthorized connection attempt from IP address 102.165.49.175 on Port 445(SMB)
2019-07-25 08:15:59
77.240.89.44 attackspambots
Unauthorized connection attempt from IP address 77.240.89.44 on Port 445(SMB)
2019-07-25 07:45:02
92.63.196.7 attack
RDP Bruteforce
2019-07-25 08:07:23
221.162.255.70 attackspambots
2019-07-24T23:26:47.621325abusebot-2.cloudsearch.cf sshd\[5293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.70  user=root
2019-07-25 07:42:36
210.56.20.181 attack
2019-07-24T23:47:40.547646abusebot-8.cloudsearch.cf sshd\[6510\]: Invalid user postgres from 210.56.20.181 port 38582
2019-07-25 08:17:18
188.36.112.109 attackspam
Unauthorized connection attempt from IP address 188.36.112.109 on Port 445(SMB)
2019-07-25 07:49:57
199.15.252.250 attackbotsspam
Unauthorised access (Jul 24) SRC=199.15.252.250 LEN=48 TTL=116 ID=17251 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-25 07:40:06
66.240.205.34 attackbots
ZeroAccess.Gen Command and Control Traffic
2019-07-25 07:34:56
1.179.137.10 attackspam
Jul 25 02:06:36 SilenceServices sshd[16098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
Jul 25 02:06:38 SilenceServices sshd[16098]: Failed password for invalid user share from 1.179.137.10 port 54598 ssh2
Jul 25 02:11:39 SilenceServices sshd[20925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10
2019-07-25 08:22:06
156.223.114.251 attackbots
Unauthorized connection attempt from IP address 156.223.114.251 on Port 445(SMB)
2019-07-25 07:41:16

Recently Reported IPs

102.66.233.237 102.66.234.7 102.66.239.106 102.68.85.184
103.101.161.220 103.101.230.74 103.109.101.97 103.110.23.131
103.111.137.69 103.113.3.238 6.205.167.200 103.120.135.64
103.120.81.232 103.123.86.174 103.124.95.104 103.129.178.189
103.129.200.150 103.130.218.202 103.130.70.250 103.133.111.59