Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.140.2.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.140.2.66.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 20 17:44:48 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 66.2.140.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.2.140.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.66.72 attackspam
firewall-block, port(s): 80/tcp
2019-07-03 05:03:56
138.68.171.25 attackbots
2019-07-02T20:34:18.915206abusebot.cloudsearch.cf sshd\[7481\]: Invalid user www from 138.68.171.25 port 48300
2019-07-03 05:00:57
111.254.176.107 attackbotsspam
445/tcp
[2019-07-02]1pkt
2019-07-03 05:02:53
37.139.21.75 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-03 05:18:13
185.176.27.54 attack
Port scan: Attack repeated for 24 hours
2019-07-03 04:46:32
206.189.24.239 attack
206.189.24.239 - - [02/Jul/2019:15:39:22 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.239 - - [02/Jul/2019:15:39:22 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.239 - - [02/Jul/2019:15:39:23 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.239 - - [02/Jul/2019:15:39:23 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.239 - - [02/Jul/2019:15:39:24 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.239 - - [02/Jul/2019:15:39:24 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 05:28:25
110.44.123.47 attackspambots
SSH invalid-user multiple login try
2019-07-03 05:15:56
138.197.171.124 attackspam
Jul  2 20:45:23 mail sshd\[21375\]: Invalid user tester from 138.197.171.124
Jul  2 20:45:23 mail sshd\[21375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.171.124
Jul  2 20:45:24 mail sshd\[21375\]: Failed password for invalid user tester from 138.197.171.124 port 41343 ssh2
...
2019-07-03 04:59:29
180.254.120.148 attackspam
23/tcp
[2019-07-02]1pkt
2019-07-03 04:52:00
142.93.168.48 attackbots
Brute force attempt
2019-07-03 05:13:51
193.169.252.140 attackspam
Jul  2 21:21:52 mail postfix/smtpd\[23854\]: warning: unknown\[193.169.252.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 21:38:35 mail postfix/smtpd\[25323\]: warning: unknown\[193.169.252.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 21:55:38 mail postfix/smtpd\[25585\]: warning: unknown\[193.169.252.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 22:30:00 mail postfix/smtpd\[26265\]: warning: unknown\[193.169.252.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-03 05:22:40
51.38.33.178 attackspam
Jan 12 02:57:51 motanud sshd\[23806\]: Invalid user nextcloud from 51.38.33.178 port 44589
Jan 12 02:57:51 motanud sshd\[23806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.33.178
Jan 12 02:57:53 motanud sshd\[23806\]: Failed password for invalid user nextcloud from 51.38.33.178 port 44589 ssh2
2019-07-03 05:11:55
196.120.45.39 attack
Trying to deliver email spam, but blocked by RBL
2019-07-03 05:26:01
141.98.80.67 attack
Jul  2 21:49:03 mail postfix/smtpd\[25585\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 21:49:11 mail postfix/smtpd\[25585\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 22:27:32 mail postfix/smtpd\[26265\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  2 22:27:43 mail postfix/smtpd\[26265\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-03 04:57:24
132.145.130.166 attackspambots
firewall-block, port(s): 5800/tcp
2019-07-03 05:15:31

Recently Reported IPs

175.74.30.48 111.156.26.112 111.152.63.141 175.63.218.254
111.129.9.113 142.93.218.201 228.118.26.249 220.223.76.134
49.208.193.202 42.115.14.228 201.82.242.113 122.149.35.40
139.244.93.134 250.253.214.154 229.189.23.63 112.218.150.7
97.141.222.226 81.202.84.179 69.88.5.152 179.229.243.72