Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.232.105.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.232.105.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:36:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 66.105.232.146.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 66.105.232.146.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
46.39.224.200 attackspambots
Aug 31 04:44:45 mail sshd\[15360\]: Failed password for invalid user nagios from 46.39.224.200 port 34876 ssh2
Aug 31 05:01:17 mail sshd\[15534\]: Invalid user muhammad from 46.39.224.200 port 41194
...
2019-08-31 16:35:20
14.225.17.9 attackspam
Aug 31 05:45:51 [host] sshd[5983]: Invalid user teamspeak3-user from 14.225.17.9
Aug 31 05:45:51 [host] sshd[5983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9
Aug 31 05:45:53 [host] sshd[5983]: Failed password for invalid user teamspeak3-user from 14.225.17.9 port 49362 ssh2
2019-08-31 15:56:22
36.69.218.184 attack
Unauthorized connection attempt from IP address 36.69.218.184 on Port 445(SMB)
2019-08-31 16:12:16
131.147.10.28 attackbots
Unauthorized connection attempt from IP address 131.147.10.28 on Port 445(SMB)
2019-08-31 16:18:27
117.102.108.46 attack
Unauthorized connection attempt from IP address 117.102.108.46 on Port 445(SMB)
2019-08-31 16:14:36
106.12.116.185 attack
Aug 31 07:53:06 MK-Soft-VM6 sshd\[1409\]: Invalid user atkchance39 from 106.12.116.185 port 58516
Aug 31 07:53:06 MK-Soft-VM6 sshd\[1409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.116.185
Aug 31 07:53:08 MK-Soft-VM6 sshd\[1409\]: Failed password for invalid user atkchance39 from 106.12.116.185 port 58516 ssh2
...
2019-08-31 16:29:24
49.147.121.59 attack
Unauthorized connection attempt from IP address 49.147.121.59 on Port 445(SMB)
2019-08-31 15:50:56
132.145.170.174 attackbots
Aug 30 21:29:44 tdfoods sshd\[27469\]: Invalid user upload from 132.145.170.174
Aug 30 21:29:44 tdfoods sshd\[27469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
Aug 30 21:29:46 tdfoods sshd\[27469\]: Failed password for invalid user upload from 132.145.170.174 port 20986 ssh2
Aug 30 21:34:44 tdfoods sshd\[27919\]: Invalid user carol from 132.145.170.174
Aug 30 21:34:44 tdfoods sshd\[27919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174
2019-08-31 15:45:04
115.239.21.170 attack
Unauthorized connection attempt from IP address 115.239.21.170 on Port 445(SMB)
2019-08-31 16:17:42
54.222.219.87 attackspambots
Aug 31 10:13:12 plex sshd[7771]: Invalid user dados from 54.222.219.87 port 59332
2019-08-31 16:15:00
27.72.88.40 attack
Aug 31 09:03:54 rotator sshd\[29345\]: Address 27.72.88.40 maps to dynamic-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 31 09:03:54 rotator sshd\[29345\]: Invalid user charles from 27.72.88.40Aug 31 09:03:56 rotator sshd\[29345\]: Failed password for invalid user charles from 27.72.88.40 port 39628 ssh2Aug 31 09:09:11 rotator sshd\[30173\]: Address 27.72.88.40 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 31 09:09:11 rotator sshd\[30173\]: Invalid user kong from 27.72.88.40Aug 31 09:09:13 rotator sshd\[30173\]: Failed password for invalid user kong from 27.72.88.40 port 56566 ssh2
...
2019-08-31 16:32:25
23.129.64.168 attackspam
$f2bV_matches
2019-08-31 16:35:48
49.88.112.66 attackbotsspam
2019-08-31T05:05:32.833112abusebot-6.cloudsearch.cf sshd\[19507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
2019-08-31 15:54:17
51.15.112.152 attack
2019-08-31T06:46:16.079107abusebot-3.cloudsearch.cf sshd\[14788\]: Invalid user dn from 51.15.112.152 port 40206
2019-08-31 16:38:46
23.129.64.202 attackbotsspam
Invalid user michael from 23.129.64.202 port 46390
2019-08-31 16:21:17

Recently Reported IPs

249.203.186.168 62.164.188.161 61.162.47.53 88.54.64.52
87.179.28.154 197.138.49.13 161.176.113.73 128.53.109.166
254.104.22.243 144.73.183.79 240.111.160.223 54.239.206.124
78.228.1.77 138.164.114.75 130.48.197.96 134.134.179.63
248.221.139.34 151.239.14.10 245.210.47.165 150.30.6.164