Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Netcom Broadband Corporation Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
SSH Brute-Force Attack
2020-04-28 12:01:34
attackspam
$f2bV_matches
2020-04-25 08:16:17
attack
Invalid user qp from 120.132.66.117 port 48865
2020-04-24 06:19:52
attackbots
Apr 21 21:37:58 xeon sshd[32288]: Failed password for invalid user td from 120.132.66.117 port 51852 ssh2
2020-04-22 05:14:07
attack
SSH Invalid Login
2020-04-19 07:19:53
attackspam
Apr 10 09:57:01 ks10 sshd[3582711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.66.117 
Apr 10 09:57:03 ks10 sshd[3582711]: Failed password for invalid user ubuntu from 120.132.66.117 port 49251 ssh2
...
2020-04-10 18:56:42
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.132.66.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;120.132.66.117.			IN	A

;; AUTHORITY SECTION:
.			282	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 01:00:23 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 117.66.132.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.66.132.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.76.218.197 attack
Scan port
2022-11-30 13:55:33
106.111.46.122 bots
hacking accounts of multiple big platforms
2022-11-12 16:33:19
66.254.114.38 attack
Scan port
2022-11-29 19:24:09
212.0.195.16 attack
Scan port
2022-11-29 13:42:02
192.241.192.92 proxy
ATTACK RDP
2022-12-01 14:11:45
5.188.28.188 attack
phishing
2022-11-25 21:15:52
104.236.174.101 attack
Hack port
2022-11-25 13:41:13
199.232.18.113 attack
scan port
2022-11-21 22:20:14
45.142.192.11 attack
DDoS
2022-12-01 13:53:34
122.102.27.153 attack
unauthorize attempt
2022-11-27 19:12:02
49.71.146.249 spambotsattack
Tentativa de roubo de senhas ...
2022-11-25 22:42:25
45.134.144.101 attack
Brute scan
2022-11-29 13:40:26
92.63.196.66 attack
Brute scan port
2022-11-16 13:50:24
185.224.128.12 attack
Brute force port
2022-11-23 22:14:46
2001:470:1:c84::12 attack
sshd attack
2022-11-14 16:53:20

Recently Reported IPs

36.152.127.70 134.122.121.188 189.59.5.91 165.227.85.62
125.109.76.197 213.180.203.54 106.52.178.254 27.79.147.109
93.119.178.8 123.16.237.243 206.189.235.233 188.26.175.67
58.255.67.8 118.69.20.74 110.232.65.83 122.51.75.30
201.81.212.81 213.180.203.173 58.210.180.180 117.87.219.167