Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.66.132.190 attack
Ssh brute force
2020-10-04 09:05:57
148.66.132.190 attackbotsspam
2020-10-03T03:22:43.911310n23.at sshd[2066088]: Failed password for invalid user git from 148.66.132.190 port 36800 ssh2
2020-10-03T03:37:20.303913n23.at sshd[2077902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
2020-10-03T03:37:22.404701n23.at sshd[2077902]: Failed password for root from 148.66.132.190 port 35436 ssh2
...
2020-10-04 01:42:25
148.66.132.190 attack
2020-10-03T03:22:43.911310n23.at sshd[2066088]: Failed password for invalid user git from 148.66.132.190 port 36800 ssh2
2020-10-03T03:37:20.303913n23.at sshd[2077902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
2020-10-03T03:37:22.404701n23.at sshd[2077902]: Failed password for root from 148.66.132.190 port 35436 ssh2
...
2020-10-03 17:27:56
148.66.132.190 attackspambots
SSH brute
2020-09-29 03:25:49
148.66.132.190 attackbotsspam
Sep 28 07:57:34 nextcloud sshd\[8903\]: Invalid user guest from 148.66.132.190
Sep 28 07:57:34 nextcloud sshd\[8903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Sep 28 07:57:36 nextcloud sshd\[8903\]: Failed password for invalid user guest from 148.66.132.190 port 55886 ssh2
2020-09-28 19:37:03
148.66.132.190 attackspambots
Aug 24 14:55:44 ip-172-31-16-56 sshd\[1591\]: Invalid user web from 148.66.132.190\
Aug 24 14:55:46 ip-172-31-16-56 sshd\[1591\]: Failed password for invalid user web from 148.66.132.190 port 58242 ssh2\
Aug 24 15:00:41 ip-172-31-16-56 sshd\[1617\]: Invalid user db2inst1 from 148.66.132.190\
Aug 24 15:00:43 ip-172-31-16-56 sshd\[1617\]: Failed password for invalid user db2inst1 from 148.66.132.190 port 38126 ssh2\
Aug 24 15:05:31 ip-172-31-16-56 sshd\[1667\]: Invalid user postgres from 148.66.132.190\
2020-08-25 00:43:51
148.66.132.190 attackbotsspam
Aug 17 04:15:49 itv-usvr-01 sshd[24156]: Invalid user brisa from 148.66.132.190
Aug 17 04:15:49 itv-usvr-01 sshd[24156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Aug 17 04:15:49 itv-usvr-01 sshd[24156]: Invalid user brisa from 148.66.132.190
Aug 17 04:15:51 itv-usvr-01 sshd[24156]: Failed password for invalid user brisa from 148.66.132.190 port 39092 ssh2
2020-08-17 05:32:23
148.66.132.190 attack
Aug 12 23:53:24 cosmoit sshd[26793]: Failed password for root from 148.66.132.190 port 59358 ssh2
2020-08-13 06:02:42
148.66.132.190 attack
Aug  3 00:06:49 itv-usvr-01 sshd[6849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
Aug  3 00:06:51 itv-usvr-01 sshd[6849]: Failed password for root from 148.66.132.190 port 34194 ssh2
Aug  3 00:11:32 itv-usvr-01 sshd[7198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
Aug  3 00:11:34 itv-usvr-01 sshd[7198]: Failed password for root from 148.66.132.190 port 47582 ssh2
Aug  3 00:16:02 itv-usvr-01 sshd[7400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
Aug  3 00:16:04 itv-usvr-01 sshd[7400]: Failed password for root from 148.66.132.190 port 60950 ssh2
2020-08-03 02:05:23
148.66.132.190 attack
Invalid user jogoon from 148.66.132.190 port 38050
2020-08-01 14:04:33
148.66.132.190 attackspambots
Jul 30 08:05:54 piServer sshd[21143]: Failed password for backup from 148.66.132.190 port 35484 ssh2
Jul 30 08:09:27 piServer sshd[21521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 
Jul 30 08:09:29 piServer sshd[21521]: Failed password for invalid user xiehs from 148.66.132.190 port 56024 ssh2
...
2020-07-30 16:40:13
148.66.132.190 attack
Jul 18 00:02:02 [host] sshd[25700]: Invalid user e
Jul 18 00:02:02 [host] sshd[25700]: pam_unix(sshd:
Jul 18 00:02:05 [host] sshd[25700]: Failed passwor
2020-07-18 08:22:35
148.66.132.190 attackspam
Jun 26 04:57:54 dignus sshd[8727]: Failed password for invalid user ejabberd from 148.66.132.190 port 37842 ssh2
Jun 26 05:01:36 dignus sshd[9084]: Invalid user deploy from 148.66.132.190 port 38318
Jun 26 05:01:36 dignus sshd[9084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190
Jun 26 05:01:37 dignus sshd[9084]: Failed password for invalid user deploy from 148.66.132.190 port 38318 ssh2
Jun 26 05:05:27 dignus sshd[9474]: Invalid user roberto from 148.66.132.190 port 38806
...
2020-06-26 22:54:01
148.66.132.190 attackbots
Jun 12 08:05:27 Tower sshd[14390]: Connection from 148.66.132.190 port 37990 on 192.168.10.220 port 22 rdomain ""
Jun 12 08:05:29 Tower sshd[14390]: Invalid user monitor from 148.66.132.190 port 37990
Jun 12 08:05:29 Tower sshd[14390]: error: Could not get shadow information for NOUSER
Jun 12 08:05:29 Tower sshd[14390]: Failed password for invalid user monitor from 148.66.132.190 port 37990 ssh2
Jun 12 08:05:29 Tower sshd[14390]: Received disconnect from 148.66.132.190 port 37990:11: Bye Bye [preauth]
Jun 12 08:05:29 Tower sshd[14390]: Disconnected from invalid user monitor 148.66.132.190 port 37990 [preauth]
2020-06-12 23:58:08
148.66.132.190 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-08 04:18:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.66.132.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.66.132.100.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:30:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 100.132.66.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.132.66.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.154.38.177 attack
Feb  9 07:13:12 legacy sshd[5535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177
Feb  9 07:13:14 legacy sshd[5535]: Failed password for invalid user hnd from 195.154.38.177 port 57392 ssh2
Feb  9 07:16:05 legacy sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177
...
2020-02-09 18:02:24
58.153.224.179 attack
23/tcp
[2020-02-09]1pkt
2020-02-09 18:20:11
200.194.45.208 attackspambots
Automatic report - Port Scan Attack
2020-02-09 18:39:21
45.173.179.88 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-09 18:28:05
139.199.115.210 attackspambots
Feb  9 06:36:54 sxvn sshd[1729875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210
2020-02-09 18:30:08
68.183.22.85 attackbotsspam
Feb  9 00:21:13 tdfoods sshd\[17872\]: Invalid user kwt from 68.183.22.85
Feb  9 00:21:13 tdfoods sshd\[17872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.22.85
Feb  9 00:21:15 tdfoods sshd\[17872\]: Failed password for invalid user kwt from 68.183.22.85 port 46706 ssh2
Feb  9 00:22:46 tdfoods sshd\[17966\]: Invalid user tzz from 68.183.22.85
Feb  9 00:22:46 tdfoods sshd\[17966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.22.85
2020-02-09 18:34:21
202.63.195.32 attack
2020-02-0905:50:551j0eYY-00026R-5Q\<=verena@rs-solution.chH=\(localhost\)[123.21.92.131]:56494P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2122id=979224777CA88635E9ECA51DE99089F4@rs-solution.chT="curiositysake"forcallumceltic91@hotmail.co.uk2020-02-0905:49:491j0eXT-0001x3-Rj\<=verena@rs-solution.chH=\(localhost\)[41.41.51.202]:39077P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2088id=5752E4B7BC6846F5292C65DD29E58981@rs-solution.chT="Ihopeyouareadecentperson"forgems007braunk@gmail.com2020-02-0905:50:041j0eXj-0001xX-Lr\<=verena@rs-solution.chH=\(localhost\)[202.63.195.32]:47050P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2158id=CECB7D2E25F1DF6CB0B5FC44B0B47CE5@rs-solution.chT="Ihopeyouareadecentperson"forbobbflht0405@yahoo.com2020-02-0905:50:181j0eXx-00025g-8o\<=verena@rs-solution.chH=\(localhost\)[14.231.148.77]:49692P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA3
2020-02-09 18:29:22
125.63.69.57 attackspambots
Port scan on 1 port(s): 22
2020-02-09 18:40:49
104.248.133.35 attack
Feb  9 08:58:06 ns381471 sshd[20054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.133.35
Feb  9 08:58:07 ns381471 sshd[20054]: Failed password for invalid user okr from 104.248.133.35 port 54956 ssh2
2020-02-09 18:12:04
27.254.130.60 attackbotsspam
Feb  6 22:27:23 HOST sshd[24045]: Failed password for invalid user kwy from 27.254.130.60 port 52469 ssh2
Feb  6 22:27:24 HOST sshd[24045]: Received disconnect from 27.254.130.60: 11: Bye Bye [preauth]
Feb  6 22:32:23 HOST sshd[24215]: Failed password for invalid user tsn from 27.254.130.60 port 49784 ssh2
Feb  6 22:32:24 HOST sshd[24215]: Received disconnect from 27.254.130.60: 11: Bye Bye [preauth]
Feb  6 22:34:52 HOST sshd[24298]: Failed password for invalid user eqg from 27.254.130.60 port 34565 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.254.130.60
2020-02-09 18:14:25
193.254.135.252 attack
Feb  9 06:29:40 firewall sshd[9081]: Invalid user cvw from 193.254.135.252
Feb  9 06:29:42 firewall sshd[9081]: Failed password for invalid user cvw from 193.254.135.252 port 34324 ssh2
Feb  9 06:31:54 firewall sshd[9189]: Invalid user eex from 193.254.135.252
...
2020-02-09 18:14:53
34.97.222.104 attack
Lines containing failures of 34.97.222.104
Feb  4 17:59:53 shared03 sshd[30304]: Invalid user kojima from 34.97.222.104 port 59384
Feb  4 17:59:53 shared03 sshd[30304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.97.222.104
Feb  4 17:59:56 shared03 sshd[30304]: Failed password for invalid user kojima from 34.97.222.104 port 59384 ssh2
Feb  4 17:59:56 shared03 sshd[30304]: Received disconnect from 34.97.222.104 port 59384:11: Bye Bye [preauth]
Feb  4 17:59:56 shared03 sshd[30304]: Disconnected from invalid user kojima 34.97.222.104 port 59384 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.97.222.104
2020-02-09 18:11:07
193.148.69.60 attackspam
Feb  9 08:02:22 *** sshd[1539]: Invalid user xct from 193.148.69.60
2020-02-09 18:00:12
77.87.19.101 attack
Automatic report - Port Scan
2020-02-09 18:48:03
51.255.109.162 attackspambots
unauthorized connection attempt
2020-02-09 17:59:42

Recently Reported IPs

148.66.132.239 148.66.133.213 148.66.134.216 148.66.134.217
148.66.135.62 148.66.135.6 148.66.137.19 148.66.136.61
148.66.136.8 148.66.138.133 148.66.138.112 148.66.138.118
148.66.138.116 148.66.138.121 148.66.138.137 148.66.138.128
148.66.138.117 148.66.138.148 148.66.138.155 148.66.138.138