Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.14.52.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.14.52.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:44:39 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 66.52.14.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.52.14.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.213.63.120 attack
Sep  9 02:44:26 friendsofhawaii sshd\[3621\]: Invalid user odoo from 129.213.63.120
Sep  9 02:44:26 friendsofhawaii sshd\[3621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120
Sep  9 02:44:28 friendsofhawaii sshd\[3621\]: Failed password for invalid user odoo from 129.213.63.120 port 34340 ssh2
Sep  9 02:50:32 friendsofhawaii sshd\[4138\]: Invalid user testuser from 129.213.63.120
Sep  9 02:50:32 friendsofhawaii sshd\[4138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120
2019-09-09 21:04:56
165.132.120.231 attackbotsspam
SSH Bruteforce attempt
2019-09-09 21:21:32
203.146.242.34 attackbots
Unauthorized connection attempt from IP address 203.146.242.34 on Port 445(SMB)
2019-09-09 21:10:02
197.43.31.224 attack
Unauthorized connection attempt from IP address 197.43.31.224 on Port 445(SMB)
2019-09-09 21:16:40
129.204.158.83 attackbots
Sep  9 02:43:08 web1 sshd\[22470\]: Invalid user insserver from 129.204.158.83
Sep  9 02:43:08 web1 sshd\[22470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.158.83
Sep  9 02:43:10 web1 sshd\[22470\]: Failed password for invalid user insserver from 129.204.158.83 port 35648 ssh2
Sep  9 02:49:35 web1 sshd\[23075\]: Invalid user test from 129.204.158.83
Sep  9 02:49:35 web1 sshd\[23075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.158.83
2019-09-09 20:51:54
167.71.14.214 attackbots
Sep  9 09:42:45 MK-Soft-Root1 sshd\[11389\]: Invalid user 123321 from 167.71.14.214 port 33536
Sep  9 09:42:45 MK-Soft-Root1 sshd\[11389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.14.214
Sep  9 09:42:47 MK-Soft-Root1 sshd\[11389\]: Failed password for invalid user 123321 from 167.71.14.214 port 33536 ssh2
...
2019-09-09 20:41:46
193.112.4.12 attackspam
Sep  9 14:26:18 bouncer sshd\[9966\]: Invalid user testftp from 193.112.4.12 port 51466
Sep  9 14:26:18 bouncer sshd\[9966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12 
Sep  9 14:26:20 bouncer sshd\[9966\]: Failed password for invalid user testftp from 193.112.4.12 port 51466 ssh2
...
2019-09-09 21:00:39
181.48.29.35 attack
Sep  9 15:00:32 yabzik sshd[23088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.29.35
Sep  9 15:00:34 yabzik sshd[23088]: Failed password for invalid user teamspeak3 from 181.48.29.35 port 35562 ssh2
Sep  9 15:08:33 yabzik sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.29.35
2019-09-09 20:31:16
189.126.168.43 attackbots
SMB Server BruteForce Attack
2019-09-09 20:53:27
220.76.107.50 attack
Sep  9 02:36:46 hpm sshd\[3817\]: Invalid user 123123 from 220.76.107.50
Sep  9 02:36:46 hpm sshd\[3817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Sep  9 02:36:48 hpm sshd\[3817\]: Failed password for invalid user 123123 from 220.76.107.50 port 55772 ssh2
Sep  9 02:43:42 hpm sshd\[4654\]: Invalid user temp1 from 220.76.107.50
Sep  9 02:43:42 hpm sshd\[4654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
2019-09-09 20:45:36
222.173.24.186 attackspam
Unauthorized connection attempt from IP address 222.173.24.186 on Port 445(SMB)
2019-09-09 21:28:15
62.234.127.88 attack
Sep  9 01:53:53 php1 sshd\[3274\]: Invalid user kafka from 62.234.127.88
Sep  9 01:53:53 php1 sshd\[3274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.88
Sep  9 01:53:56 php1 sshd\[3274\]: Failed password for invalid user kafka from 62.234.127.88 port 59326 ssh2
Sep  9 01:58:51 php1 sshd\[3869\]: Invalid user upload from 62.234.127.88
Sep  9 01:58:51 php1 sshd\[3869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.88
2019-09-09 21:03:16
61.69.254.46 attack
Sep  9 09:25:17 *** sshd[14542]: Invalid user testuser from 61.69.254.46
2019-09-09 20:34:27
158.69.185.135 attackspambots
Sep  9 07:43:25 game-panel sshd[15939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.185.135
Sep  9 07:43:28 game-panel sshd[15939]: Failed password for invalid user guest from 158.69.185.135 port 33214 ssh2
Sep  9 07:52:10 game-panel sshd[16273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.185.135
2019-09-09 21:17:41
66.133.76.21 attackspam
Sep  9 06:32:03 lenivpn01 kernel: \[236332.234725\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.133.76.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=30810 DF PROTO=TCP SPT=54524 DPT=927 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  9 06:32:04 lenivpn01 kernel: \[236333.247656\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.133.76.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=30811 DF PROTO=TCP SPT=54524 DPT=927 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  9 06:32:06 lenivpn01 kernel: \[236335.262145\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=66.133.76.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=30812 DF PROTO=TCP SPT=54524 DPT=927 WINDOW=64240 RES=0x00 SYN URGP=0 
...
2019-09-09 21:02:52

Recently Reported IPs

5.250.43.169 106.9.182.105 108.63.210.162 218.102.20.121
79.237.181.83 167.243.177.8 156.48.150.30 87.43.252.58
21.84.235.16 155.174.160.109 104.161.67.14 147.184.171.136
26.175.231.182 244.215.92.42 4.169.187.33 145.18.158.167
36.138.43.74 92.6.63.79 19.236.191.179 139.192.5.145