Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.6.66.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.6.66.121.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 18 04:05:03 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 121.66.6.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.66.6.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.186.140.42 attackspam
Sep 28 03:32:09 vps8769 sshd[5617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.186.140.42
Sep 28 03:32:10 vps8769 sshd[5617]: Failed password for invalid user csgoserver from 220.186.140.42 port 53196 ssh2
...
2020-09-28 22:21:41
159.65.84.183 attackspam
Time:     Sun Sep 27 10:40:32 2020 +0000
IP:       159.65.84.183 (GB/United Kingdom/kroki.om)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 10:35:25 3 sshd[1393]: Failed password for invalid user support from 159.65.84.183 port 37084 ssh2
Sep 27 10:38:38 3 sshd[10041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.183  user=root
Sep 27 10:38:40 3 sshd[10041]: Failed password for root from 159.65.84.183 port 57640 ssh2
Sep 27 10:40:26 3 sshd[14251]: Invalid user testadmin from 159.65.84.183 port 39690
Sep 27 10:40:27 3 sshd[14251]: Failed password for invalid user testadmin from 159.65.84.183 port 39690 ssh2
2020-09-28 22:44:29
192.241.238.94 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-28 22:35:48
115.85.53.91 attackbots
Time:     Sun Sep 27 14:05:16 2020 +0000
IP:       115.85.53.91 (PH/Philippines/91.53.85.115.dsl.service.static.eastern-tele.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 13:49:36 3 sshd[9462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.85.53.91  user=root
Sep 27 13:49:39 3 sshd[9462]: Failed password for root from 115.85.53.91 port 44068 ssh2
Sep 27 14:03:23 3 sshd[18016]: Invalid user compras from 115.85.53.91 port 39990
Sep 27 14:03:25 3 sshd[18016]: Failed password for invalid user compras from 115.85.53.91 port 39990 ssh2
Sep 27 14:05:13 3 sshd[24947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.85.53.91  user=root
2020-09-28 22:53:04
107.175.115.67 attackspam
Time:     Mon Sep 28 01:13:14 2020 +0000
IP:       107.175.115.67 (US/United States/107-175-115-67-host.colocrossing.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 28 01:13:06 1-1 sshd[63016]: Invalid user fake from 107.175.115.67 port 59017
Sep 28 01:13:08 1-1 sshd[63016]: Failed password for invalid user fake from 107.175.115.67 port 59017 ssh2
Sep 28 01:13:09 1-1 sshd[63023]: Invalid user admin from 107.175.115.67 port 60382
Sep 28 01:13:11 1-1 sshd[63023]: Failed password for invalid user admin from 107.175.115.67 port 60382 ssh2
Sep 28 01:13:11 1-1 sshd[63027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.115.67  user=root
2020-09-28 22:48:57
64.227.126.134 attack
Sep 28 14:57:14 dhoomketu sshd[3427637]: Failed password for invalid user debian from 64.227.126.134 port 56986 ssh2
Sep 28 14:58:46 dhoomketu sshd[3427663]: Invalid user yuan from 64.227.126.134 port 44756
Sep 28 14:58:46 dhoomketu sshd[3427663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.126.134 
Sep 28 14:58:46 dhoomketu sshd[3427663]: Invalid user yuan from 64.227.126.134 port 44756
Sep 28 14:58:49 dhoomketu sshd[3427663]: Failed password for invalid user yuan from 64.227.126.134 port 44756 ssh2
...
2020-09-28 22:40:30
82.64.132.50 attackbotsspam
s2.hscode.pl - SSH Attack
2020-09-28 22:42:16
119.28.75.179 attack
2020-09-27T20:35:18.499154abusebot.cloudsearch.cf sshd[22125]: Invalid user ubuntu from 119.28.75.179 port 37330
2020-09-27T20:35:18.504643abusebot.cloudsearch.cf sshd[22125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.75.179
2020-09-27T20:35:18.499154abusebot.cloudsearch.cf sshd[22125]: Invalid user ubuntu from 119.28.75.179 port 37330
2020-09-27T20:35:20.695719abusebot.cloudsearch.cf sshd[22125]: Failed password for invalid user ubuntu from 119.28.75.179 port 37330 ssh2
2020-09-27T20:41:22.731851abusebot.cloudsearch.cf sshd[22250]: Invalid user test2 from 119.28.75.179 port 43772
2020-09-27T20:41:22.737431abusebot.cloudsearch.cf sshd[22250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.75.179
2020-09-27T20:41:22.731851abusebot.cloudsearch.cf sshd[22250]: Invalid user test2 from 119.28.75.179 port 43772
2020-09-27T20:41:24.566953abusebot.cloudsearch.cf sshd[22250]: Failed password for
...
2020-09-28 22:47:56
37.139.1.197 attackspambots
Sep 28 11:39:01 staging sshd[131204]: Failed password for root from 37.139.1.197 port 39864 ssh2
Sep 28 11:46:58 staging sshd[131245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197  user=root
Sep 28 11:47:00 staging sshd[131245]: Failed password for root from 37.139.1.197 port 45119 ssh2
Sep 28 11:55:02 staging sshd[131326]: Invalid user igor from 37.139.1.197 port 50369
...
2020-09-28 22:43:13
177.129.40.117 attackbots
 TCP (SYN) 177.129.40.117:11279 -> port 23, len 44
2020-09-28 22:32:07
14.18.154.186 attack
fail2ban -- 14.18.154.186
...
2020-09-28 22:41:25
37.187.135.130 attackbots
37.187.135.130 - - [28/Sep/2020:13:43:41 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 2480 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.135.130 - - [28/Sep/2020:13:43:42 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 2429 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.135.130 - - [28/Sep/2020:13:43:42 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-28 22:24:48
49.234.126.244 attackspam
[Mon Sep 28 09:51:34 2020] 49.234.126.244
...
2020-09-28 22:46:31
43.229.153.13 attack
Time:     Sun Sep 27 01:11:19 2020 +0000
IP:       43.229.153.13 (HK/Hong Kong/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 00:53:40 activeserver sshd[21110]: Invalid user walter from 43.229.153.13 port 41503
Sep 27 00:53:42 activeserver sshd[21110]: Failed password for invalid user walter from 43.229.153.13 port 41503 ssh2
Sep 27 00:57:13 activeserver sshd[31110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.13  user=root
Sep 27 00:57:15 activeserver sshd[31110]: Failed password for root from 43.229.153.13 port 33297 ssh2
Sep 27 01:11:15 activeserver sshd[6764]: Invalid user deploy from 43.229.153.13 port 56940
2020-09-28 22:56:50
192.241.233.220 attack
Port scan denied
2020-09-28 22:49:45

Recently Reported IPs

80.52.39.243 70.159.23.192 34.56.72.164 83.108.141.160
23.86.120.52 151.221.47.141 194.161.213.15 45.230.76.23
192.99.88.236 93.231.119.5 146.55.27.220 203.72.6.125
191.29.43.230 154.108.215.35 34.9.22.196 59.93.79.218
126.107.107.4 164.238.129.77 65.45.244.221 109.122.68.74