Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
66.102.6.10 attackbotsspam
[Mon Apr 27 18:48:56.427777 2020] [:error] [pid 5592:tid 140574997767936] [client 66.102.6.10:63881] [client 66.102.6.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/2787-kalender-tanam-katam-terpadu-pulau-sulawesi/kalender-tanam-katam-terpadu-provinsi-sulawesi-barat/kalender-tanam-katam-terpadu-kabupaten-mamasa-provinsi-sulawesi-barat/kalender-tanam-katam-terpadu-ke
...
2020-04-28 03:48:25
66.102.6.6 attackbotsspam
[Mon Apr 27 10:53:12.561278 2020] [:error] [pid 11638:tid 139751813748480] [client 66.102.6.6:51847] [client 66.102.6.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/profil/meteorologi/list-of-all-tags/analisis-klimatologi"] [unique_id "XqZXKNsUVPp--jG8n2jRgQAAALU"]
...
2020-04-27 16:59:31
66.102.6.93 attackspambots
This is supposedly my IP. I've been hacked for 4years. I'm in Canada
2020-03-28 18:14:53
66.102.6.55 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5437e31cf9dac560 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: searchEngine | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 4.2.1; en-us; Nexus 5 Build/JOP40D) AppleWebKit/535.19 (KHTML, like Gecko; googleweblight) Chrome/38.0.1025.166 Mobile Safari/535.19 | CF_DC: ORD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 02:02:50
66.102.6.34 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5413884e7a2d9d83 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: searchEngine | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 4.2.1; en-us; Nexus 5 Build/JOP40D) AppleWebKit/535.19 (KHTML, like Gecko; googleweblight) Chrome/38.0.1025.166 Mobile Safari/535.19 | CF_DC: ORD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:04:47
66.102.6.185 attackspambots
Automatic report - Banned IP Access
2019-07-30 07:23:10
66.102.6.14 bots
也是谷歌爬虫不是真实流量
66.102.6.14 - - [29/Mar/2019:08:22:44 +0800] "GET / HTTP/1.1" 200 3237 "http://www.google.com/search" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko; Google Web Preview) Chrome/41.0.2272.118 Safari/537.36"
2019-03-29 09:19:24
66.102.6.142 bots
谷歌icon爬虫
66.102.6.142 - - [29/Mar/2019:09:01:33 +0800] "GET / HTTP/1.1" 200 29010 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 Google Favicon"
2019-03-29 09:18:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.102.6.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.102.6.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 22:10:30 CST 2025
;; MSG SIZE  rcvd: 104
Host info
68.6.102.66.in-addr.arpa domain name pointer google-proxy-66-102-6-68.google.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.6.102.66.in-addr.arpa	name = google-proxy-66-102-6-68.google.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.136.19.143 attack
Unauthorized connection attempt detected from IP address 116.136.19.143 to port 222
2020-05-31 23:29:02
118.186.244.152 attackspambots
Unauthorized connection attempt detected from IP address 118.186.244.152 to port 1433
2020-05-31 23:25:53
112.78.3.126 attackspambots
Unauthorized connection attempt detected from IP address 112.78.3.126 to port 23
2020-05-31 23:31:08
185.8.243.135 attackbots
Unauthorized connection attempt detected from IP address 185.8.243.135 to port 80
2020-05-31 23:18:30
49.51.160.47 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 1467
2020-05-31 23:42:26
107.6.169.250 attack
Unauthorized connection attempt detected from IP address 107.6.169.250 to port 1200
2020-05-31 23:32:42
223.247.137.54 attack
Unauthorized connection attempt detected from IP address 223.247.137.54 to port 4733
2020-05-31 23:06:55
151.197.194.78 attackspambots
Unauthorized connection attempt detected from IP address 151.197.194.78 to port 5555
2020-05-31 23:23:27
218.75.98.230 attackbotsspam
Unauthorized connection attempt detected from IP address 218.75.98.230 to port 1433
2020-05-31 23:49:21
59.55.142.211 attackbotsspam
Unauthorized connection attempt detected from IP address 59.55.142.211 to port 445
2020-05-31 23:41:39
185.232.65.105 attackbotsspam
SSH Bruteforce
2020-05-31 23:17:18
71.6.146.186 attackbots
May 31 17:10:05 host proftpd[5771]: 0.0.0.0 (71.6.146.186[71.6.146.186]) - USER anonymous: no such user found from 71.6.146.186 [71.6.146.186] to 163.172.107.87:21
...
2020-05-31 23:39:24
60.213.214.126 attackspam
Unauthorized connection attempt detected from IP address 60.213.214.126 to port 23
2020-05-31 23:41:06
198.20.70.114 attack
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 2404
2020-05-31 23:13:39
201.13.47.192 attack
Unauthorized connection attempt detected from IP address 201.13.47.192 to port 80
2020-05-31 23:12:57

Recently Reported IPs

224.232.70.242 184.151.239.65 16.212.168.45 221.176.147.121
133.23.213.102 86.118.220.101 224.222.121.4 230.62.121.101
161.70.6.140 19.28.20.187 101.33.36.12 228.205.108.47
177.12.198.171 95.1.240.91 149.59.0.188 21.132.92.226
234.33.148.72 192.226.52.28 89.31.242.122 170.243.146.94