Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: UPC Schweiz GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
2019-12-02T12:23:49.726830abusebot-3.cloudsearch.cf sshd\[28372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch  user=root
2019-12-02 20:59:54
attack
2019-12-02T08:20:24.874564abusebot-3.cloudsearch.cf sshd\[26875\]: Invalid user tshort from 62.2.148.66 port 53409
2019-12-02 16:26:46
attackbots
Nov  1 06:03:30 legacy sshd[9458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.2.148.66
Nov  1 06:03:32 legacy sshd[9458]: Failed password for invalid user aleksandir from 62.2.148.66 port 57529 ssh2
Nov  1 06:07:51 legacy sshd[9585]: Failed password for root from 62.2.148.66 port 50285 ssh2
...
2019-11-01 13:22:35
attackbotsspam
Oct 27 22:25:40 SilenceServices sshd[7138]: Failed password for root from 62.2.148.66 port 43440 ssh2
Oct 27 22:29:51 SilenceServices sshd[9802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.2.148.66
Oct 27 22:29:53 SilenceServices sshd[9802]: Failed password for invalid user elf from 62.2.148.66 port 36111 ssh2
2019-10-28 05:31:48
attack
Oct 26 01:00:27 uapps sshd[19747]: User r.r from 62-2-148-66.static.cablecom.ch not allowed because not listed in AllowUsers
Oct 26 01:00:27 uapps sshd[19747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch  user=r.r
Oct 26 01:00:29 uapps sshd[19747]: Failed password for invalid user r.r from 62.2.148.66 port 58377 ssh2
Oct 26 01:00:29 uapps sshd[19747]: Received disconnect from 62.2.148.66: 11: Bye Bye [preauth]
Oct 26 01:21:32 uapps sshd[19966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch
Oct 26 01:21:34 uapps sshd[19966]: Failed password for invalid user ts3 from 62.2.148.66 port 43424 ssh2
Oct 26 01:21:34 uapps sshd[19966]: Received disconnect from 62.2.148.66: 11: Bye Bye [preauth]
Oct 26 01:25:46 uapps sshd[19991]: User r.r from 62-2-148-66.static.cablecom.ch not allowed because not listed in AllowUsers
Oct 26 01:25:46 ........
-------------------------------
2019-10-27 18:14:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.2.148.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;62.2.148.66.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102700 1800 900 604800 86400

;; Query time: 182 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 27 18:14:34 CST 2019
;; MSG SIZE  rcvd: 115
Host info
66.148.2.62.in-addr.arpa domain name pointer 62-2-148-66.static.cablecom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.148.2.62.in-addr.arpa	name = 62-2-148-66.static.cablecom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
107.172.250.174 attack
Unauthorized connection attempt detected from IP address 107.172.250.174 to port 2220 [J]
2020-01-27 19:07:44
61.7.133.56 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 19:20:46
159.89.165.127 attackbotsspam
none
2020-01-27 19:30:55
118.173.240.239 attack
20/1/27@04:55:52: FAIL: Alarm-Network address from=118.173.240.239
20/1/27@04:55:52: FAIL: Alarm-Network address from=118.173.240.239
...
2020-01-27 19:52:20
198.108.66.46 attackbotsspam
3306/tcp 1911/tcp 5903/tcp...
[2019-12-01/2020-01-27]5pkt,5pt.(tcp)
2020-01-27 19:44:47
106.54.54.254 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-01-27 19:41:41
117.34.66.245 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 19:24:13
196.24.162.219 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 19:51:34
218.92.0.199 attack
Jan 27 11:41:39 legacy sshd[32664]: Failed password for root from 218.92.0.199 port 27061 ssh2
Jan 27 11:41:40 legacy sshd[32667]: Failed password for root from 218.92.0.199 port 42251 ssh2
Jan 27 11:41:41 legacy sshd[32664]: Failed password for root from 218.92.0.199 port 27061 ssh2
...
2020-01-27 19:50:58
91.237.15.208 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-27 19:13:31
178.237.0.229 attack
Unauthorized connection attempt detected from IP address 178.237.0.229 to port 2220 [J]
2020-01-27 19:43:03
182.61.39.254 attack
Jan 27 00:22:52 eddieflores sshd\[21769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254  user=root
Jan 27 00:22:53 eddieflores sshd\[21769\]: Failed password for root from 182.61.39.254 port 52316 ssh2
Jan 27 00:25:44 eddieflores sshd\[22213\]: Invalid user hr from 182.61.39.254
Jan 27 00:25:44 eddieflores sshd\[22213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254
Jan 27 00:25:46 eddieflores sshd\[22213\]: Failed password for invalid user hr from 182.61.39.254 port 46632 ssh2
2020-01-27 19:10:51
118.99.103.181 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 19:37:14
148.72.206.225 attack
Unauthorized connection attempt detected from IP address 148.72.206.225 to port 2220 [J]
2020-01-27 19:55:24
182.156.249.250 attack
Honeypot attack, port: 445, PTR: static-250.249.156.182-tataidc.co.in.
2020-01-27 19:41:11

Recently Reported IPs

151.75.111.157 80.158.32.174 46.176.12.226 185.76.34.87
78.25.89.80 139.59.93.112 58.245.125.48 62.234.155.56
103.52.147.175 139.59.95.125 123.11.78.148 192.129.26.102
96.80.238.22 103.131.200.96 217.61.63.7 70.132.32.91
178.128.153.185 140.115.53.154 222.93.145.43 95.191.243.128