Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kazakhstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.39.66.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.39.66.117.			IN	A

;; AUTHORITY SECTION:
.			581	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:17:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 117.66.39.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.66.39.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.119.116.226 attack
Jul 23 15:20:43 marvibiene sshd[14526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.119.116.226 
Jul 23 15:20:45 marvibiene sshd[14526]: Failed password for invalid user campbell from 186.119.116.226 port 51508 ssh2
2020-07-23 23:18:58
42.116.183.234 attack
Unauthorized IMAP connection attempt
2020-07-23 23:17:44
41.221.86.21 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-23 23:24:20
45.72.25.135 attackspambots
(From jessika.bean@yahoo.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com
2020-07-23 23:12:50
140.238.186.37 attackbotsspam
Unauthorized connection attempt from IP address 140.238.186.37 on Port 445(SMB)
2020-07-23 23:13:26
218.92.0.216 attack
Unauthorized connection attempt detected from IP address 218.92.0.216 to port 22
2020-07-23 23:02:55
104.215.151.21 attack
...
2020-07-23 23:14:28
104.248.66.115 attackspam
SSH brutforce
2020-07-23 23:13:51
206.189.222.181 attack
Jul 23 16:45:31 meumeu sshd[1386940]: Invalid user alexandra from 206.189.222.181 port 35856
Jul 23 16:45:31 meumeu sshd[1386940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 
Jul 23 16:45:31 meumeu sshd[1386940]: Invalid user alexandra from 206.189.222.181 port 35856
Jul 23 16:45:34 meumeu sshd[1386940]: Failed password for invalid user alexandra from 206.189.222.181 port 35856 ssh2
Jul 23 16:49:34 meumeu sshd[1387066]: Invalid user couchdb from 206.189.222.181 port 48888
Jul 23 16:49:34 meumeu sshd[1387066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 
Jul 23 16:49:34 meumeu sshd[1387066]: Invalid user couchdb from 206.189.222.181 port 48888
Jul 23 16:49:36 meumeu sshd[1387066]: Failed password for invalid user couchdb from 206.189.222.181 port 48888 ssh2
Jul 23 16:53:48 meumeu sshd[1387266]: Invalid user ubuntu from 206.189.222.181 port 33690
...
2020-07-23 22:57:46
129.211.13.226 attackspam
2020-07-23 11:47:55,846 fail2ban.actions        [937]: NOTICE  [sshd] Ban 129.211.13.226
2020-07-23 12:24:00,096 fail2ban.actions        [937]: NOTICE  [sshd] Ban 129.211.13.226
2020-07-23 13:05:25,967 fail2ban.actions        [937]: NOTICE  [sshd] Ban 129.211.13.226
2020-07-23 13:47:33,095 fail2ban.actions        [937]: NOTICE  [sshd] Ban 129.211.13.226
2020-07-23 14:23:52,478 fail2ban.actions        [937]: NOTICE  [sshd] Ban 129.211.13.226
...
2020-07-23 23:02:08
124.93.222.211 attackspambots
Jul 23 17:27:47 dhoomketu sshd[1788515]: Invalid user boon from 124.93.222.211 port 43132
Jul 23 17:27:47 dhoomketu sshd[1788515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.222.211 
Jul 23 17:27:47 dhoomketu sshd[1788515]: Invalid user boon from 124.93.222.211 port 43132
Jul 23 17:27:49 dhoomketu sshd[1788515]: Failed password for invalid user boon from 124.93.222.211 port 43132 ssh2
Jul 23 17:31:32 dhoomketu sshd[1788563]: Invalid user tibero6 from 124.93.222.211 port 34918
...
2020-07-23 23:11:06
94.243.26.170 attack
Attempting to exploit via a http POST
2020-07-23 23:09:05
159.203.162.186 attackspambots
Jul 23 18:45:46 gw1 sshd[11534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.162.186
Jul 23 18:45:48 gw1 sshd[11534]: Failed password for invalid user pracownik from 159.203.162.186 port 54003 ssh2
...
2020-07-23 23:25:14
139.59.173.249 attackbotsspam
Mailserver and mailaccount attacks
2020-07-23 23:00:42
106.13.167.3 attack
2020-07-23T17:02:52.593623sd-86998 sshd[13227]: Invalid user yiling from 106.13.167.3 port 58784
2020-07-23T17:02:52.595896sd-86998 sshd[13227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3
2020-07-23T17:02:52.593623sd-86998 sshd[13227]: Invalid user yiling from 106.13.167.3 port 58784
2020-07-23T17:02:55.011443sd-86998 sshd[13227]: Failed password for invalid user yiling from 106.13.167.3 port 58784 ssh2
2020-07-23T17:10:27.743558sd-86998 sshd[15108]: Invalid user shyh from 106.13.167.3 port 51676
...
2020-07-23 23:25:38

Recently Reported IPs

194.39.64.51 194.39.196.23 194.4.209.226 194.4.56.139
194.4.58.136 194.39.227.103 194.4.59.209 194.4.56.202
194.4.208.20 194.4.58.30 194.4.59.205 194.39.65.170
194.4.57.18 194.4.58.39 194.40.216.11 194.40.216.15
194.40.218.30 194.40.245.176 194.40.216.12 194.40.144.142