Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.66.149.229 attackspam
Dec  8 09:52:42 esmtp postfix/smtpd[12149]: lost connection after AUTH from unknown[117.66.149.229]
Dec  8 09:52:52 esmtp postfix/smtpd[12149]: lost connection after AUTH from unknown[117.66.149.229]
Dec  8 09:53:00 esmtp postfix/smtpd[12149]: lost connection after AUTH from unknown[117.66.149.229]
Dec  8 09:53:12 esmtp postfix/smtpd[12184]: lost connection after AUTH from unknown[117.66.149.229]
Dec  8 09:53:20 esmtp postfix/smtpd[12149]: lost connection after AUTH from unknown[117.66.149.229]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.66.149.229
2019-12-09 03:08:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.66.149.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.66.149.149.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 22:07:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 149.149.66.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.149.66.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.142.20.30 attackbots
Port scan on 1 port(s): 1433
2020-06-08 14:34:18
222.186.190.14 attackbotsspam
Jun  8 02:23:19 NPSTNNYC01T sshd[19508]: Failed password for root from 222.186.190.14 port 32735 ssh2
Jun  8 02:23:28 NPSTNNYC01T sshd[19514]: Failed password for root from 222.186.190.14 port 20479 ssh2
...
2020-06-08 14:25:21
1.209.171.34 attack
Jun  7 21:36:56 mockhub sshd[14875]: Failed password for root from 1.209.171.34 port 57454 ssh2
...
2020-06-08 14:05:08
220.102.43.235 attackbots
Brute force attempt
2020-06-08 14:01:48
222.186.42.136 attackspambots
Jun  8 06:28:21 IngegnereFirenze sshd[25292]: User root from 222.186.42.136 not allowed because not listed in AllowUsers
...
2020-06-08 14:36:28
103.81.85.9 attackbotsspam
Trolling for resource vulnerabilities
2020-06-08 14:28:20
50.224.240.154 attackbotsspam
odoo8
...
2020-06-08 14:08:01
211.58.123.59 attackspam
Jun  7 19:57:17 wbs sshd\[27249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.123.59  user=root
Jun  7 19:57:19 wbs sshd\[27249\]: Failed password for root from 211.58.123.59 port 36822 ssh2
Jun  7 20:00:41 wbs sshd\[27468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.123.59  user=root
Jun  7 20:00:43 wbs sshd\[27468\]: Failed password for root from 211.58.123.59 port 33436 ssh2
Jun  7 20:04:02 wbs sshd\[27696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.123.59  user=root
2020-06-08 14:06:43
94.231.178.226 attack
Wordpress login scanning
2020-06-08 14:13:19
193.112.56.245 attackbots
Jun  8 03:53:32 *** sshd[24449]: User root from 193.112.56.245 not allowed because not listed in AllowUsers
2020-06-08 14:04:36
180.254.105.63 attackbots
20/6/7@23:53:06: FAIL: Alarm-Network address from=180.254.105.63
20/6/7@23:53:06: FAIL: Alarm-Network address from=180.254.105.63
...
2020-06-08 14:22:55
106.51.230.186 attackspam
Jun  8 02:07:37 ws12vmsma01 sshd[47024]: Failed password for root from 106.51.230.186 port 53174 ssh2
Jun  8 02:11:56 ws12vmsma01 sshd[47608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.230.186  user=root
Jun  8 02:11:58 ws12vmsma01 sshd[47608]: Failed password for root from 106.51.230.186 port 54932 ssh2
...
2020-06-08 14:26:42
185.100.87.207 attackspam
Jun  8 08:02:04 [Censored Hostname] sshd[23116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.207 
Jun  8 08:02:07 [Censored Hostname] sshd[23116]: Failed password for invalid user feng from 185.100.87.207 port 38256 ssh2[...]
2020-06-08 14:20:26
170.253.31.218 attackbotsspam
Automatic report - Port Scan Attack
2020-06-08 14:09:42
116.24.67.167 attack
$lgm
2020-06-08 14:17:43

Recently Reported IPs

117.66.149.168 117.66.149.175 117.66.149.146 117.66.149.188
117.66.149.170 117.66.149.181 117.66.149.192 117.66.149.191
117.66.149.197 117.66.149.215 117.66.149.218 117.66.149.217
117.66.149.22 117.66.149.225 114.229.33.182 117.66.149.200
117.66.149.202 117.66.149.21 117.66.149.222 117.66.149.220