Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.100.26.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.100.26.242.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 20:16:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.26.100.66.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 66.100.26.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
77.247.109.2 attackbotsspam
SIPVicious Scanner Detection
2020-06-18 13:26:36
203.255.57.76 attackbotsspam
Unauthorized connection attempt detected from IP address 203.255.57.76 to port 22
2020-06-18 12:50:43
161.35.218.104 attackspam
Jun 18 00:47:33 ny01 sshd[30874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.218.104
Jun 18 00:47:35 ny01 sshd[30874]: Failed password for invalid user element from 161.35.218.104 port 57684 ssh2
Jun 18 00:51:04 ny01 sshd[31386]: Failed password for root from 161.35.218.104 port 34280 ssh2
2020-06-18 12:55:41
103.36.103.48 attackbotsspam
Jun 18 07:00:35 localhost sshd\[26551\]: Invalid user abcd from 103.36.103.48
Jun 18 07:00:35 localhost sshd\[26551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.103.48
Jun 18 07:00:37 localhost sshd\[26551\]: Failed password for invalid user abcd from 103.36.103.48 port 57366 ssh2
Jun 18 07:08:56 localhost sshd\[26941\]: Invalid user loic from 103.36.103.48
Jun 18 07:08:56 localhost sshd\[26941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.103.48
...
2020-06-18 13:20:48
43.226.53.59 attackspambots
k+ssh-bruteforce
2020-06-18 12:57:35
138.94.136.69 attack
Automatic report - Port Scan Attack
2020-06-18 12:59:12
221.13.203.102 attack
Invalid user a1 from 221.13.203.102 port 3074
2020-06-18 13:13:24
139.155.71.154 attackspam
2020-06-17T23:52:44.267259devel sshd[7689]: Invalid user storm from 139.155.71.154 port 42172
2020-06-17T23:52:45.967851devel sshd[7689]: Failed password for invalid user storm from 139.155.71.154 port 42172 ssh2
2020-06-17T23:55:18.545804devel sshd[7898]: Invalid user team from 139.155.71.154 port 36876
2020-06-18 13:11:05
195.34.243.122 attackspambots
Invalid user test from 195.34.243.122 port 40826
2020-06-18 13:03:47
134.209.226.157 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-18 12:54:38
91.121.177.45 attackbots
Jun 18 05:52:40 ovpn sshd[14596]: Did not receive identification string from 91.121.177.45
Jun 18 05:53:18 ovpn sshd[14760]: Did not receive identification string from 91.121.177.45
Jun 18 05:54:01 ovpn sshd[14898]: Invalid user ftpuser from 91.121.177.45
Jun 18 05:54:01 ovpn sshd[14898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.177.45
Jun 18 05:54:02 ovpn sshd[14898]: Failed password for invalid user ftpuser from 91.121.177.45 port 36808 ssh2
Jun 18 05:54:02 ovpn sshd[14898]: Received disconnect from 91.121.177.45 port 36808:11: Normal Shutdown, Thank you for playing [preauth]
Jun 18 05:54:02 ovpn sshd[14898]: Disconnected from 91.121.177.45 port 36808 [preauth]
Jun 18 05:54:39 ovpn sshd[15068]: Invalid user ghostname from 91.121.177.45
Jun 18 05:54:39 ovpn sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.177.45
Jun 18 05:54:41 ovpn sshd[15068]: Failed passwo........
------------------------------
2020-06-18 12:53:56
43.252.103.150 attackspam
xmlrpc attack
2020-06-18 13:14:53
43.254.153.74 attackbotsspam
Invalid user prince from 43.254.153.74 port 26427
2020-06-18 13:07:11
188.166.147.211 attack
Jun 18 06:59:23 vps639187 sshd\[8086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211  user=root
Jun 18 06:59:25 vps639187 sshd\[8086\]: Failed password for root from 188.166.147.211 port 60320 ssh2
Jun 18 07:03:45 vps639187 sshd\[8151\]: Invalid user alba from 188.166.147.211 port 60942
Jun 18 07:03:45 vps639187 sshd\[8151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.147.211
...
2020-06-18 13:13:55
69.45.19.145 attack
Automatic report - Banned IP Access
2020-06-18 13:16:41

Recently Reported IPs

82.153.165.233 187.161.169.194 90.232.168.172 156.118.185.198
219.99.234.47 222.157.114.46 164.10.153.159 102.168.223.111
62.213.186.119 250.54.27.144 71.40.193.179 124.72.83.5
226.55.146.146 18.64.199.177 165.155.203.115 74.125.217.20
223.24.170.153 190.78.33.0 21.172.131.17 172.144.118.232