Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: UPC Schweiz GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
2019-12-02T12:23:49.726830abusebot-3.cloudsearch.cf sshd\[28372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch  user=root
2019-12-02 20:59:54
attack
2019-12-02T08:20:24.874564abusebot-3.cloudsearch.cf sshd\[26875\]: Invalid user tshort from 62.2.148.66 port 53409
2019-12-02 16:26:46
attackbots
Nov  1 06:03:30 legacy sshd[9458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.2.148.66
Nov  1 06:03:32 legacy sshd[9458]: Failed password for invalid user aleksandir from 62.2.148.66 port 57529 ssh2
Nov  1 06:07:51 legacy sshd[9585]: Failed password for root from 62.2.148.66 port 50285 ssh2
...
2019-11-01 13:22:35
attackbotsspam
Oct 27 22:25:40 SilenceServices sshd[7138]: Failed password for root from 62.2.148.66 port 43440 ssh2
Oct 27 22:29:51 SilenceServices sshd[9802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.2.148.66
Oct 27 22:29:53 SilenceServices sshd[9802]: Failed password for invalid user elf from 62.2.148.66 port 36111 ssh2
2019-10-28 05:31:48
attack
Oct 26 01:00:27 uapps sshd[19747]: User r.r from 62-2-148-66.static.cablecom.ch not allowed because not listed in AllowUsers
Oct 26 01:00:27 uapps sshd[19747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch  user=r.r
Oct 26 01:00:29 uapps sshd[19747]: Failed password for invalid user r.r from 62.2.148.66 port 58377 ssh2
Oct 26 01:00:29 uapps sshd[19747]: Received disconnect from 62.2.148.66: 11: Bye Bye [preauth]
Oct 26 01:21:32 uapps sshd[19966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch
Oct 26 01:21:34 uapps sshd[19966]: Failed password for invalid user ts3 from 62.2.148.66 port 43424 ssh2
Oct 26 01:21:34 uapps sshd[19966]: Received disconnect from 62.2.148.66: 11: Bye Bye [preauth]
Oct 26 01:25:46 uapps sshd[19991]: User r.r from 62-2-148-66.static.cablecom.ch not allowed because not listed in AllowUsers
Oct 26 01:25:46 ........
-------------------------------
2019-10-27 18:14:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.2.148.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;62.2.148.66.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102700 1800 900 604800 86400

;; Query time: 182 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 27 18:14:34 CST 2019
;; MSG SIZE  rcvd: 115
Host info
66.148.2.62.in-addr.arpa domain name pointer 62-2-148-66.static.cablecom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.148.2.62.in-addr.arpa	name = 62-2-148-66.static.cablecom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
160.124.48.188 attackspambots
" "
2020-09-09 05:29:59
202.22.14.132 attackspambots
Icarus honeypot on github
2020-09-09 05:48:34
112.85.42.174 attack
Sep  8 23:52:35 mail sshd\[23686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep  8 23:52:37 mail sshd\[23686\]: Failed password for root from 112.85.42.174 port 46253 ssh2
Sep  8 23:52:53 mail sshd\[23699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep  8 23:52:55 mail sshd\[23699\]: Failed password for root from 112.85.42.174 port 8260 ssh2
Sep  8 23:53:11 mail sshd\[23699\]: Failed password for root from 112.85.42.174 port 8260 ssh2
...
2020-09-09 05:56:06
209.141.54.153 attackbotsspam
(sshd) Failed SSH login from 209.141.54.153 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 17:08:46 server sshd[20049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.54.153  user=root
Sep  8 17:08:48 server sshd[20049]: Failed password for root from 209.141.54.153 port 45763 ssh2
Sep  8 17:08:51 server sshd[20049]: Failed password for root from 209.141.54.153 port 45763 ssh2
Sep  8 17:08:53 server sshd[20049]: Failed password for root from 209.141.54.153 port 45763 ssh2
Sep  8 17:08:56 server sshd[20049]: Failed password for root from 209.141.54.153 port 45763 ssh2
2020-09-09 05:37:19
222.186.15.115 attack
Sep  8 23:34:29 santamaria sshd\[4191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Sep  8 23:34:30 santamaria sshd\[4191\]: Failed password for root from 222.186.15.115 port 22376 ssh2
Sep  8 23:34:37 santamaria sshd\[4194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
...
2020-09-09 05:40:40
121.52.154.36 attack
Sep  8 20:01:24 srv-ubuntu-dev3 sshd[50022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36  user=root
Sep  8 20:01:26 srv-ubuntu-dev3 sshd[50022]: Failed password for root from 121.52.154.36 port 38696 ssh2
Sep  8 20:04:44 srv-ubuntu-dev3 sshd[50378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36  user=root
Sep  8 20:04:46 srv-ubuntu-dev3 sshd[50378]: Failed password for root from 121.52.154.36 port 51568 ssh2
Sep  8 20:08:10 srv-ubuntu-dev3 sshd[50747]: Invalid user ubnt from 121.52.154.36
Sep  8 20:08:10 srv-ubuntu-dev3 sshd[50747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36
Sep  8 20:08:10 srv-ubuntu-dev3 sshd[50747]: Invalid user ubnt from 121.52.154.36
Sep  8 20:08:12 srv-ubuntu-dev3 sshd[50747]: Failed password for invalid user ubnt from 121.52.154.36 port 36208 ssh2
Sep  8 20:11:25 srv-ubuntu-dev3 sshd[51210]: 
...
2020-09-09 05:20:03
34.70.217.179 attackbotsspam
Sep  8 20:53:50 ns382633 sshd\[5220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.70.217.179  user=root
Sep  8 20:53:52 ns382633 sshd\[5220\]: Failed password for root from 34.70.217.179 port 12246 ssh2
Sep  8 21:00:37 ns382633 sshd\[6751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.70.217.179  user=root
Sep  8 21:00:39 ns382633 sshd\[6751\]: Failed password for root from 34.70.217.179 port 12233 ssh2
Sep  8 21:03:54 ns382633 sshd\[7008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.70.217.179  user=root
2020-09-09 05:54:30
138.59.40.168 attack
failed_logins
2020-09-09 05:38:58
222.240.122.41 attackspambots
Icarus honeypot on github
2020-09-09 05:36:03
104.248.130.17 attackbots
Automatic report BANNED IP
2020-09-09 05:40:02
189.8.68.19 attackbotsspam
Sep  8 23:24:59 ns37 sshd[21062]: Failed password for root from 189.8.68.19 port 49990 ssh2
Sep  8 23:24:59 ns37 sshd[21062]: Failed password for root from 189.8.68.19 port 49990 ssh2
2020-09-09 05:38:31
222.186.173.201 attack
SSH Brute Force
2020-09-09 05:48:01
49.233.15.54 attackbotsspam
k+ssh-bruteforce
2020-09-09 05:22:50
51.77.220.127 attackspambots
51.77.220.127 - - [09/Sep/2020:01:47:52 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-09 05:57:31
222.186.175.163 attack
$f2bV_matches
2020-09-09 05:45:41

Recently Reported IPs

151.75.111.157 80.158.32.174 46.176.12.226 185.76.34.87
78.25.89.80 139.59.93.112 58.245.125.48 62.234.155.56
103.52.147.175 139.59.95.125 123.11.78.148 192.129.26.102
96.80.238.22 103.131.200.96 217.61.63.7 70.132.32.91
178.128.153.185 140.115.53.154 222.93.145.43 95.191.243.128