Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.34.63.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.34.63.66.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:50:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 66.63.34.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.63.34.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.3.226.230 attack
5x Failed Password
2020-03-25 03:21:47
181.30.28.59 attack
Brute force SMTP login attempted.
...
2020-03-25 03:13:24
196.43.155.209 attack
(sshd) Failed SSH login from 196.43.155.209 (UG/Uganda/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 24 14:17:48 localhost sshd[12638]: Invalid user la from 196.43.155.209 port 56142
Mar 24 14:17:50 localhost sshd[12638]: Failed password for invalid user la from 196.43.155.209 port 56142 ssh2
Mar 24 14:27:45 localhost sshd[13293]: Invalid user sysadmin from 196.43.155.209 port 58886
Mar 24 14:27:47 localhost sshd[13293]: Failed password for invalid user sysadmin from 196.43.155.209 port 58886 ssh2
Mar 24 14:31:28 localhost sshd[13518]: Invalid user izi from 196.43.155.209 port 46618
2020-03-25 03:24:06
178.34.191.205 attack
Unauthorized connection attempt from IP address 178.34.191.205 on Port 445(SMB)
2020-03-25 03:45:20
222.186.42.75 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-25 03:18:38
220.117.115.10 attack
Mar 24 20:03:52 vps691689 sshd[9002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.115.10
Mar 24 20:03:53 vps691689 sshd[9002]: Failed password for invalid user admin from 220.117.115.10 port 44494 ssh2
Mar 24 20:06:25 vps691689 sshd[9112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.115.10
...
2020-03-25 03:08:31
110.227.172.169 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-25 03:27:59
178.62.183.219 attackbots
Unauthorized connection attempt from IP address 178.62.183.219 on Port 445(SMB)
2020-03-25 03:13:41
89.199.183.196 attackspambots
Unauthorized connection attempt from IP address 89.199.183.196 on Port 445(SMB)
2020-03-25 03:20:44
51.68.84.36 attackbots
$f2bV_matches
2020-03-25 03:31:37
103.141.229.101 attackspam
Unauthorized connection attempt from IP address 103.141.229.101 on Port 445(SMB)
2020-03-25 03:11:47
92.63.194.35 attackspambots
[MK-VM5] Blocked by UFW
2020-03-25 03:39:58
158.69.63.54 attackbots
Mar 24 19:31:26 vpn01 sshd[18157]: Failed password for root from 158.69.63.54 port 34652 ssh2
Mar 24 19:31:28 vpn01 sshd[18157]: Failed password for root from 158.69.63.54 port 34652 ssh2
...
2020-03-25 03:25:16
36.67.197.52 attackbotsspam
$f2bV_matches
2020-03-25 03:16:07
150.109.78.69 attack
Brute force SMTP login attempted.
...
2020-03-25 03:01:54

Recently Reported IPs

71.220.142.185 189.89.211.105 120.85.182.209 46.170.71.204
54.201.37.151 117.170.253.209 58.47.155.126 182.116.65.25
94.29.126.186 130.164.162.145 66.249.69.221 93.99.106.25
77.126.34.253 34.83.166.55 1.13.181.56 23.108.79.114
64.227.180.141 193.202.81.139 180.149.126.95 200.53.18.137