Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.66.96.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.66.96.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:30:07 CST 2025
;; MSG SIZE  rcvd: 104
Host info
134.96.66.3.in-addr.arpa domain name pointer ec2-3-66-96-134.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.96.66.3.in-addr.arpa	name = ec2-3-66-96-134.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.216.154.64 attackspambots
Invalid user sammy from 103.216.154.64 port 64777
2020-04-20 23:12:53
50.78.106.236 attackspam
Unauthorized SSH login attempts
2020-04-20 23:28:34
8.209.73.223 attack
2020-04-20 04:35:20 server sshd[35597]: Failed password for invalid user admin2 from 8.209.73.223 port 58108 ssh2
2020-04-20 23:40:06
80.211.53.68 attackspambots
Invalid user test from 80.211.53.68 port 34880
2020-04-20 23:19:50
221.122.67.66 attack
2020-04-20T13:54:51.306707abusebot.cloudsearch.cf sshd[13938]: Invalid user bu from 221.122.67.66 port 40770
2020-04-20T13:54:51.312759abusebot.cloudsearch.cf sshd[13938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66
2020-04-20T13:54:51.306707abusebot.cloudsearch.cf sshd[13938]: Invalid user bu from 221.122.67.66 port 40770
2020-04-20T13:54:52.581707abusebot.cloudsearch.cf sshd[13938]: Failed password for invalid user bu from 221.122.67.66 port 40770 ssh2
2020-04-20T13:58:53.615951abusebot.cloudsearch.cf sshd[14182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66  user=root
2020-04-20T13:58:55.441174abusebot.cloudsearch.cf sshd[14182]: Failed password for root from 221.122.67.66 port 48014 ssh2
2020-04-20T14:02:37.205623abusebot.cloudsearch.cf sshd[14457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66  user=root
2020-04-
...
2020-04-20 23:44:16
45.131.5.25 attackbots
Invalid user IWONTWORK from 45.131.5.25 port 54946
2020-04-20 23:31:35
106.13.63.151 attackbots
Invalid user a from 106.13.63.151 port 50564
2020-04-20 23:11:26
78.176.29.171 attack
Invalid user user from 78.176.29.171 port 61354
2020-04-20 23:20:21
49.234.52.176 attackspam
$f2bV_matches
2020-04-20 23:28:48
42.101.44.158 attackbotsspam
Apr 20 10:36:21 r.ca sshd[13372]: Failed password for admin from 42.101.44.158 port 60975 ssh2
2020-04-20 23:32:36
78.36.97.216 attackspambots
2020-04-20T13:20:30.166497homeassistant sshd[14243]: Invalid user admin from 78.36.97.216 port 41746
2020-04-20T13:20:30.173879homeassistant sshd[14243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.36.97.216
...
2020-04-20 23:20:49
83.82.124.106 attackbotsspam
Invalid user pi from 83.82.124.106 port 38364
2020-04-20 23:19:31
36.156.158.207 attackspambots
Invalid user test from 36.156.158.207 port 58465
2020-04-20 23:33:24
51.254.32.102 attackspam
Invalid user dr from 51.254.32.102 port 42206
2020-04-20 23:26:10
221.229.196.134 attackbots
Apr 20 17:00:56 odroid64 sshd\[19853\]: Invalid user cpsrvsid from 221.229.196.134
Apr 20 17:00:56 odroid64 sshd\[19853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.196.134
...
2020-04-20 23:42:50

Recently Reported IPs

54.71.146.252 249.162.246.243 74.197.209.109 178.160.136.70
198.113.69.53 247.155.220.101 23.73.56.24 194.155.130.78
189.169.128.172 221.212.23.229 94.206.219.113 227.240.49.121
90.131.77.83 242.109.203.179 224.156.138.215 115.151.90.10
9.181.53.149 122.81.170.255 134.85.129.104 226.183.30.188