Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tlalpan

Region: Ciudad de Mexico

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.245.66.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.245.66.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:55:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
6.66.245.189.in-addr.arpa domain name pointer host-6-66-static-245-189.uninet-ide.com.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.66.245.189.in-addr.arpa	name = host-6-66-static-245-189.uninet-ide.com.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.247.219.170 attack
SMB Server BruteForce Attack
2019-07-18 17:25:18
149.202.56.194 attack
Jul 17 12:06:36 vtv3 sshd\[28036\]: Invalid user exim from 149.202.56.194 port 42476
Jul 17 12:06:36 vtv3 sshd\[28036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.56.194
Jul 17 12:06:38 vtv3 sshd\[28036\]: Failed password for invalid user exim from 149.202.56.194 port 42476 ssh2
Jul 17 12:13:51 vtv3 sshd\[31718\]: Invalid user lee from 149.202.56.194 port 46168
Jul 17 12:13:51 vtv3 sshd\[31718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.56.194
Jul 17 12:26:42 vtv3 sshd\[5748\]: Invalid user ftptest from 149.202.56.194 port 41102
Jul 17 12:26:42 vtv3 sshd\[5748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.56.194
Jul 17 12:26:44 vtv3 sshd\[5748\]: Failed password for invalid user ftptest from 149.202.56.194 port 41102 ssh2
Jul 17 12:31:12 vtv3 sshd\[8008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= r
2019-07-18 17:11:10
211.195.12.33 attack
Jul 18 11:02:03 localhost sshd\[25612\]: Invalid user ubuntu from 211.195.12.33 port 42057
Jul 18 11:02:03 localhost sshd\[25612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
Jul 18 11:02:05 localhost sshd\[25612\]: Failed password for invalid user ubuntu from 211.195.12.33 port 42057 ssh2
2019-07-18 17:13:16
189.125.2.234 attackbotsspam
Jul 18 10:43:52 nextcloud sshd\[31232\]: Invalid user pinturabh from 189.125.2.234
Jul 18 10:43:52 nextcloud sshd\[31232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234
Jul 18 10:43:53 nextcloud sshd\[31232\]: Failed password for invalid user pinturabh from 189.125.2.234 port 36516 ssh2
...
2019-07-18 17:17:43
81.111.52.38 attack
Jul 15 22:08:34 sanyalnet-awsem3-1 sshd[32574]: Connection from 81.111.52.38 port 36968 on 172.30.0.184 port 22
Jul 15 22:08:37 sanyalnet-awsem3-1 sshd[32574]: Invalid user mao from 81.111.52.38
Jul 15 22:08:39 sanyalnet-awsem3-1 sshd[32574]: Failed password for invalid user mao from 81.111.52.38 port 36968 ssh2
Jul 15 22:08:39 sanyalnet-awsem3-1 sshd[32574]: Received disconnect from 81.111.52.38: 11: Bye Bye [preauth]
Jul 15 22:55:25 sanyalnet-awsem3-1 sshd[2119]: Connection from 81.111.52.38 port 53888 on 172.30.0.184 port 22
Jul 15 22:55:29 sanyalnet-awsem3-1 sshd[2119]: Invalid user xk from 81.111.52.38
Jul 15 22:55:31 sanyalnet-awsem3-1 sshd[2119]: Failed password for invalid user xk from 81.111.52.38 port 53888 ssh2
Jul 15 22:55:31 sanyalnet-awsem3-1 sshd[2119]: Received disconnect from 81.111.52.38: 11: Bye Bye [preauth]
Jul 15 23:22:53 sanyalnet-awsem3-1 sshd[3332]: Connection from 81.111.52.38 port 54772 on 172.30.0.184 port 22
Jul 15 23:22:57 sanyalnet-awsem3-........
-------------------------------
2019-07-18 16:54:03
1.191.66.4 attackbots
Jul 16 12:39:41 new sshd[16391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.191.66.4  user=r.r
Jul 16 12:39:44 new sshd[16391]: Failed password for r.r from 1.191.66.4 port 54132 ssh2
Jul 16 12:39:46 new sshd[16391]: Failed password for r.r from 1.191.66.4 port 54132 ssh2
Jul 16 12:39:48 new sshd[16391]: Failed password for r.r from 1.191.66.4 port 54132 ssh2
Jul 16 12:39:51 new sshd[16391]: Failed password for r.r from 1.191.66.4 port 54132 ssh2
Jul 16 12:39:53 new sshd[16391]: Failed password for r.r from 1.191.66.4 port 54132 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.191.66.4
2019-07-18 16:53:36
202.40.183.234 attack
proto=tcp  .  spt=37655  .  dpt=25  .     (listed on Blocklist de  Jul 17)     (87)
2019-07-18 17:38:58
46.166.151.47 attack
\[2019-07-18 05:09:46\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:09:46.628-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146313113291",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51055",ACLName="no_extension_match"
\[2019-07-18 05:12:13\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:12:13.287-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46363302946",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59825",ACLName="no_extension_match"
\[2019-07-18 05:13:47\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:13:47.736-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607533",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64372",ACLName="no_extens
2019-07-18 17:21:46
220.180.223.138 attackbotsspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-18 03:14:19]
2019-07-18 16:52:51
180.246.69.29 attackbots
Jul 18 03:14:24 server sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.246.69.29
...
2019-07-18 17:40:13
162.247.74.74 attack
Jul 18 09:10:26 db sshd\[5031\]: Invalid user admin from 162.247.74.74
Jul 18 09:10:26 db sshd\[5031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wiebe.tor-exit.calyxinstitute.org 
Jul 18 09:10:29 db sshd\[5031\]: Failed password for invalid user admin from 162.247.74.74 port 60060 ssh2
Jul 18 09:10:31 db sshd\[5031\]: Failed password for invalid user admin from 162.247.74.74 port 60060 ssh2
Jul 18 09:10:34 db sshd\[5031\]: Failed password for invalid user admin from 162.247.74.74 port 60060 ssh2
...
2019-07-18 17:03:18
36.89.209.22 attackbotsspam
Jul 18 07:18:05 rpi sshd[1678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.209.22 
Jul 18 07:18:07 rpi sshd[1678]: Failed password for invalid user c&a from 36.89.209.22 port 42932 ssh2
2019-07-18 17:07:04
113.215.221.36 attack
Jul 18 07:46:11 pl3server sshd[2937894]: Invalid user admin from 113.215.221.36
Jul 18 07:46:11 pl3server sshd[2937894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.215.221.36
Jul 18 07:46:12 pl3server sshd[2937894]: Failed password for invalid user admin from 113.215.221.36 port 60461 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.215.221.36
2019-07-18 16:50:38
119.159.229.140 attackspam
Unauthorised access (Jul 18) SRC=119.159.229.140 LEN=40 TOS=0x08 PREC=0x20 TTL=235 ID=57634 TCP DPT=445 WINDOW=1024 SYN
2019-07-18 16:47:15
58.185.164.83 attackbotsspam
Total attacks: 2
2019-07-18 17:02:50

Recently Reported IPs

7.20.156.51 189.121.18.156 211.1.169.135 191.58.212.224
145.178.250.113 19.89.133.248 209.22.120.11 217.206.144.10
236.40.55.180 133.199.196.97 163.72.98.128 204.167.88.41
196.5.193.91 45.44.203.71 87.83.27.105 106.7.38.206
76.134.33.38 8.77.65.175 65.93.12.215 168.107.155.91